32nd week of 2011 patent applcation highlights part 52 |
Patent application number | Title | Published |
20110197040 | STORAGE SYSTEM AND STORAGE CONTROL METHOD - A storage system to copy data from a copying origin to a copying destination. The storage system includes a storing area creating unit. The storing area creating unit causes a storing unit in a storage to create a status information storing area to have status information stored therein, based on grouping, the grouping being executed on data that is divided into plural pieces, the grouping being executed when the divided data is stored in the storage. The status information of each group is stored in the status information storing area that is created by the storing unit. | 2011-08-11 |
20110197041 | STORAGE APPARATUS, STORAGE APPARATUS CONTROL PROGRAM, AND STORAGE APPARATUS CONTROL METHOD - A save control section included in a storage apparatus continuously performs writeback by which a data group is read out from a plurality of storage sections of the storage apparatus and by which the data group is saved in a data group storage section of the storage apparatus, or staging by which a data group saved in the data group storage section is distributed and stored in the plurality of storage sections according to storage areas of the data group storage section which store a plurality of data groups. An output section of the storage apparatus outputs in block a data group including the data stored in each of the plurality of storage sections. The data group storage section has the storage areas for storing a data group. | 2011-08-11 |
20110197042 | STORAGE DEVICE AND STORAGE DEVICE CONTROL METHOD - A storage device for storing data includes, a first storage part which stores data, a second storage part which stores backup data of the data stored in the first storage part, a writing order determination part which determines a writing order of data to the second storage part such that the writing order is an order from data whose storage period remains longest to data whose storage period remains shortest, and a writing control part which performs control such that the data stored in the first storage part is written to the second storage part in accordance with the writing order. | 2011-08-11 |
20110197043 | METHOD FOR ADJUSTING PERFORMANCE OF SYSTEM MEMORY AND COMPUTER SYSTEM THEREOF - A method for adjusting performance of a system memory used in a computer system with a system memory includes the following steps: in an operating system in operating, preventing the computer system from accessing data of the system memory when an event is triggered; giving a memory control command to execute a performance adjust program of the system memory after the computer system is completely prevented from accessing the data of the system memory; and permitting accessing the data of the system memory after the performance adjust program is completed. | 2011-08-11 |
20110197044 | STORAGE SYSTEM FOR REALLOCATING DATA IN VIRTUAL VOLUMES AND METHODS OF THE SAME - A storage system comprises a virtual volume configured of multiple virtual areas and a pool configured of multiple actual area groups of different performances. The controller of the storage system manages which actual areas are assigned to which virtual areas and the access load on the actual areas assigned to the virtual areas. The controller, if the access load of a first actual area assigned to a first virtual area is inappropriate for a first actual area group comprising the first actual area, migrates data to a second actual area in a second actual area group which is appropriate for the access load of the first actual area from the first actual area. The controller performs data migration between actual areas for achieving data allocation at a certain point of time based on history information which is the information related to a virtual area at a point of time in the past and an actual area assigned to the virtual area. Data allocation is the allocation of data in a virtual area to an actual area in an actual area group. | 2011-08-11 |
20110197045 | MEMORY SYSTEM - According to the embodiments, a memory system includes a nonvolatile semiconductor memory and a writing-loop-count monitoring unit that monitors a loop count of an applied voltage to the nonvolatile semiconductor memory required for data writing of the nonvolatile semiconductor memory as a writing loop count. Moreover, the memory system includes a management table for managing the writing loop count in block unit that is a unit of data erasing and a life managing unit that determines a degraded state of the nonvolatile semiconductor memory based on the management table. | 2011-08-11 |
20110197046 | STORAGE APPLICATION PERFORMANCE MATCHING - A method for matching storage application performance in a multiple tier storage system is disclosed. Input/output (I/O) activity in the multiple tier storage system is monitored to collect statistical information. The statistical information is recurrently transformed into an exponential moving average (EMA) of the I/O activity having a predefined smoothing factor. Data portions in the multiple tier storage system are sorted into buckets of varying temperatures corresponding to the EMA. At least one data migration plan is recurrently generated for matching the sorted data portions to at least one of an available plurality of storage device classes. One data portion sorted into a higher temperature bucket is matched with a higher performance storage device class of the available plurality of storage device classes than another data portion sorted into a lower temperature bucket. | 2011-08-11 |
20110197047 | METHOD FOR FORMING A PARALLEL PROCESSING SYSTEM - A definition file included in the present invention includes a plurality of parallel descriptions that respectively define a plurality of parallel processes performed independently. The plurality of parallel descriptions include a first parallel description showing a first parallel process with a plurality of data inputs including at least one data input into which output data of another parallel process is inputted, with data with the same latency from input in a parallel processing system are inputted into the plurality of data inputs. A forming method includes a first step of generating, based on a hardware library in which information on a plurality of types of elements is stored, hardware configuration information including circuit configurations for executing the parallel processes that include at least one of the plurality of types of elements; and a second step of adding a delay element to the hardware configuration information so that data with a same latency from input into the parallel processing system are inputted into the plurality of data inputs of the circuit configuration for executing the first parallel process, and therefore the hardware configuration information is generated by this method. | 2011-08-11 |
20110197048 | DYNAMIC RECONFIGURABLE HETEROGENEOUS PROCESSOR ARCHITECTURE WITH LOAD BALANCING AND DYNAMIC ALLOCATION METHOD THEREOF - A dynamic reconfigurable heterogeneous processor architecture with load balancing and dynamic allocation method thereof is disclosed. The present invention uses a work control logic unit to detect load imbalance between different types of processors, and employs a number of dynamically reconfigurable heterogeneous processors to offload the heavier loaded processors. Hardware utilization of such design can be enhanced, and variation in computation needs among different computation phases can be better handled. To design the dynamic reconfigurable heterogeneous processors, a method of how to choose the basic building blocks and place the routing components is included. With the present invention, performance can be maximized at a minimal hardware cost. Hence the dynamic reconfigurable heterogeneous processor(s) so constructed and the load balancing and dynamic allocation method together will have the best performance at least cost. | 2011-08-11 |
20110197049 | TWO PASS TEST CASE GENERATION USING SELF-MODIFYING INSTRUCTION REPLACEMENT - A test code generation technique that replaces instructions having a machine state dependent result with special redirection instructions provides generation of test code in which state dependent execution choices are made without a state model. Redirection instructions cause execution of a handler than examines the machine state and replaces the redirection instruction with a replacement instruction having a desired result resolved in accordance with the current machine state. The instructions that are replaced may be conditional branch instructions and the result a desired execution path. The examination of the machine state permits determination of a branch condition for the replacement instruction so that the next pass of the test code executes along the desired path. Alternatively, the handler can execute a jump to the branch instruction, causing immediate execution of the desired branch path. The re-direction instructions may be illegal instructions, which cause execution of an interrupt handler that performs the replacement. | 2011-08-11 |
20110197050 | Wait Instruction - A microprogrammable electronic device comprises a code memory storing a plurality of instructions. At least one instruction, when executed by the device, causes the device to enter into a wait state associated with a plurality of predefined wait state exit conditions. The device is configured to load into an electronic table each condition together with a corresponding code memory address of an instruction to be executed when the condition occurs; to execute, when is in the wait state, a wait instruction stored in the code memory and which, when executed, is such as to cause the device to check simultaneously the conditions loaded into said electronic table to detect if condition occurs; and, if a condition occurs, to exit from said wait state and to execute the instruction stored in the code memory at the code memory address loaded into the electronic table together with the condition that occurred. | 2011-08-11 |
20110197051 | System and Method for Information Handling System Image Management Deployment - Images for information handling system manufacture and maintenance are created and managed by manipulating the images as virtual machines through a secure remote network interface, such as a virtual private network or virtual desktop infrastructure. Operating system and application installation and updates, such as service packs and patches, are performed on a virtual machine of the image to adjust the image as desired, and then the image is transformed for loading on physical information handling systems, such as newly manufactured information handling systems or deployed information handling systems in need of maintenance. | 2011-08-11 |
20110197052 | Fast Machine Booting Through Streaming Storage - Described is a technology by which a virtual hard disk is maintained between a far (e.g., remote) backing store and a near (e.g., local) backing store, which among other advantages facilitates fast booting of a machine coupled to the virtual hard disk. Read requests are serviced from the near backing store (e.g., a differencing layer) when the data is available thereon, or from the far backing store (e.g., a base layer) when not. The near backing store may be configured with a cache layer that corresponds to the base layer and a write differencing layer that stores writes, or a single differencing layer may be used for both caching read data and for storing write data. A background copy operation may be used to fill the cache until the far backing store data is no longer needed. | 2011-08-11 |
20110197053 | SIMPLIFYING MANAGEMENT OF PHYSICAL AND VIRTUAL DEPLOYMENTS - A deployment system allows an administrator to convert virtual deployments to physical deployments so that an administrator can easily move between the virtual and physical world. The deployment system allows an administrator to directly deploy an operating system image in the form of a VHD file to the hard disks of a physical machine as a directly bootable and natively installed operating system. Thus, the deployment system relieves administrators from separately managing physical and virtual deployment images. Instead, administrators can manage only virtual deployment images and convert virtual images to physical deployments as needed. | 2011-08-11 |
20110197054 | METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures. | 2011-08-11 |
20110197055 | FIRMWARE STORAGE MEDIUM WITH CUSTOMIZED IMAGE - In at least some embodiments, a computer system includes a processor and a firmware storage medium in communication with the processor. The firmware storage medium stores a default image invoked during a boot process and selectively stores a customized image. If the customized image is stored by the firmware storage medium, the boot process selectively substitutes at least part of the default image with at least part of the customized image. | 2011-08-11 |
20110197056 | SECURE DISTRIBUTED STORAGE SYSTEM AND METHOD - Moving from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. The Data Division and Out-of-order keystream Generation technique provides a cryptographic method to protect data in the distributed storage environments. In the technique, the Treating the data as a binary bit stream, our self-encryption (SE) scheme generates a keystream by randomly extracting bits from the stream. The length of the keystream depends on the user's security requirements. The bit stream is encrypted and the ciphertext is stored on the mobile device, whereas the keystream is stored separately. This makes it computationally not feasible to recover the original data stream from the ciphertext alone. | 2011-08-11 |
20110197057 | SYSTEM AND METHOD FOR STORING AND ACCESSING DIGITAL MEDIA CONTENT USING SMART CARD TECHNOLOGY - A system and method for delivering digital media content to a user over a network is disclosed. The illustrative embodiment of the present invention enables multiple types of electronic devices to access the same digital media content for the same end user through the use of a smart card equipped with a license for the digital media content. Depending on the format of the digital media content, devices such as phones, pagers, internet appliances or PDAs can be used to present the digital media content to a user, as can traditional consumer electronic devices such as DVD players and VCRs. The encrypted content may be freely transferred and stored without copyright concerns since the decryption key is generated by the smart card containing the license. | 2011-08-11 |
20110197058 | HIDING A DEVICE IDENTITY - The present invention relates to hiding a device identifier (IMEI) in a communication system. Identifying a device is done by indicating an international mobile equipment identity (IMEI) as an instance identifier of the device of a user. Generating aglobally routable user agent uniform resource identifier (GRUU) for the user is done by encrypting the instance identifier so that the GRUU comprises an identity of the user and the encrypted instance identifier. | 2011-08-11 |
20110197059 | SECURING OUT-OF-BAND MESSAGES - Securing an out-of-band message from a server to a mobile computing device. After requesting a service ticket from a trusted third party (e.g., via a pre-existing ticketing infrastructure), the requested service ticket and a shared secret are obtained from the trusted third party via a first channel. The mobile computing device thereafter sends the service ticket with the shared secret to a server via a second channel. The server encrypts a message (e.g., an SMS message) using the shared secret. The mobile computing device receives the encrypted message from the server via a third channel that is out-of-band relative to the first channel. The encrypted message is decrypted via the shared secret and the decrypted message is provided to a user of the mobile computing device. In some embodiments, the message includes commands for controlling the mobile computing device. | 2011-08-11 |
20110197060 | Externally Managed Security and Validation Processing Device - An externally managed security and validation processing device includes a cryptographic processing subsystem configured for performing security or validation services; an application interface configured for communicating security or validation services with an application system; and a secure management interface configured for communicating information, including configuration information for the cryptographic processing system for performing said security or validation services, with a service profile system external to the apparatus without passing said configuration information through the application system. The service profile system can typically also migrate security services provided by one apparatus to another apparatus. | 2011-08-11 |
20110197061 | CONFIGURABLE ONLINE PUBLIC KEY INFRASTRUCTURE (PKI) MANAGEMENT FRAMEWORK - A method and apparatus is provided for establishing a process for provisioning a digital certificate service delivered by a PKI system. The method includes receiving a request for a digital certificate service and receiving data specifying a project that includes at least one product to be provisioned with a digital certificate. Data specifying an identification of an owner organization of the project and at least one participant organization participating in the project is also received. Attributes with which PKI data to be included in the digital certificates is to comply is received from the owner organization. Based on the received data and attributes, an account is established for each of the organizations associated with the project through which users associated with each of the organizations can respectively request digital certificates for the at least one product in accordance with the attributes received from the owner organization. | 2011-08-11 |
20110197062 | METHOD AND SYSTEM FOR LICENSE MANAGEMENT - Embodiments of the invention relate to methods, apparatus and systems, including computer program products for license management in one or more computer systems. A first computer runs a master license server process instance. The master license service process instance is associated with a hardware identifier relates to the first computer and has a license to run a predefined number of concurrent production license server process instances that are responsible for license management towards clients. A request is received by the master license server process instance for a license from a production license server process instance in a second computer. The master license server process instance provides a virtual identifier to the production license server process instance to be used as a unique identifier for license management purposes towards clients by the production license server process instance. The virtual identifier is cryptographically secured against modification. | 2011-08-11 |
20110197063 | NEAR FIELD REGISTRATION OF HOME SYSTEM AUDIO-VIDEO DEVICE - A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC interface and IR-transmits it to a home network server. Once the client is connected to the network, it encrypts its own device information with the key and sends the encrypted information to the server, which decrypts the data with the key sent from the remote commander. In this way, client device registration is executed easily and securely. | 2011-08-11 |
20110197064 | METHOD FOR OPERATING A NETWORK, A SYSTEM MANAGEMENT DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network ( | 2011-08-11 |
20110197065 | SECURE AND AUTOMATED CREDENTIAL INFORMATION TRANSFER MECHANISM - A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the central server sends it a secret text string. The virtual machine requests the credentials from the central server by transmitting the secret string and its instance ID. The central server validates the secret string and source IP to determine whether they are authentic. Once verified, the central server transmits the credentials to the virtual machine in a secure channel and invalidates the secret string. The credentials can now be used to authenticate API calls. | 2011-08-11 |
20110197066 | MULTI-FUNCTIONAL SYSTEM, SECURITY METHOD, SECURITY PROGRAM, AND STORAGE MEDIUM - A multi-functional system includes a main system, and sub-systems operated by sub-programs and the main system. The sub-systems includes a first memory storing a first public key, and a second memory storing an encrypted sub-program and second public key, a first communication controller transmitting the first public key for encrypted communication, a decryption unit decrypting the encrypted sub-program and second public key using an encryption key, and a second controller transmitting the decrypted second public key for encrypted communication. The main system includes a first public key, a second public key, a security device, and first and second communication controllers. The sub-systems execute a plurality of corresponding subprograms under the control of the main system. | 2011-08-11 |
20110197067 | SECURE TELEMETRIC LINK - A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and from implantable medical devices in a body area network. In certain embodiments, encryption, message integrity, and message freshness are provided through use of token-like nonces and ephemeral session-keys derived from device identification numbers and pseudorandom numbers. | 2011-08-11 |
20110197068 | METHODS FOR PROVIDING SECURITY OVER UNTRUSTED NETWORKS - Methods for providing for secure communications across data networks, including untrusted networks. In one embodiment, the method comprises establishing security associations between devices on the network using a digital certificate and key exchange protocol. In one variant, the digital certificate comprises a public encryption key; the recipient of the certificate authenticates the sender using at least the signature, and then generates a cryptographic element (e.g., key), and initialization vector. The key is encrypted and sent back to the originator, where it is decrypted and used to encrypt datagrams sent between the devices. The initialization vector may be used to initialize the encryption algorithm on the receiving device. | 2011-08-11 |
20110197069 | METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS - Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box. | 2011-08-11 |
20110197070 | SYSTEM AND METHOD FOR IN- AND OUT-OF-BAND MULTI-FACTOR SERVER-TO-USER AUTHENTICATION - A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An authentication session is initiated upon receiving a client identifier at the server-side resources. A current session instance of the grid is presented to the client, populated with characters. The process includes sharing between the client and the server a challenge identifying a random subset of the plurality of predefined locations in the server path, and a response including characters that match the characters in the locations on the server path identified by the challenge. As a result, client is capable of verifying that the server has access to the first shared secret. Then a protocol is executed to authenticate the client to the server. | 2011-08-11 |
20110197071 | Determining Response Signature Commonalities - An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding to each of the multiple channels. Based on similarities between signatures, the analyzer may then identify clusters of signatures associated with devices that share channels or portions of channels. | 2011-08-11 |
20110197072 | METHOD AND APPARATUS FOR VERIFYING CGA SIGNATURE - A method and apparatuses for verifying Cryptographically Generated Address (CGA) signature are provided. The method includes: receiving a message sent by a CGA address owner, wherein a RSA public key, a first RSA public key signature, a second public key, and a second public key signature are carried in the message, the first RSA public key binds one or more second public keys, and a part protected by the first public key signature includes the one or more second public keys; verifying the first RSA public key signature according to the message; extracting the second public key, and verifying the second public key signature. According to the method and apparatuses of the embodiment, the effect of supporting other public key can be achieved, the change of the IP address can be omitted, and public key deployment and computing resources are saved. | 2011-08-11 |
20110197073 | METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF DIGITAL CONTENT - A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it uses to allow reauthorization of a first content sink for access to first content from a first content source when the first content sink has a first content sink entry on the authorized content sink list. In accordance with at least one embodiment, reauthorization is conditioned upon a first content sink entry currency status having not yet expired. In accordance with at least one embodiment, the intermediate device allows authentication of the first content sink by the first content source when no first content sink entry exists on the authorized content sink list or when the first content sink entry currency status has expired. | 2011-08-11 |
20110197074 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 2011-08-11 |
20110197075 | ELECTRONIC DEVICE AND POWER ADAPTER THEREOF AND METHOD FOR IDENTIFYING POWER ADAPTER - An electronic device includes a detection module, an identification code generation module, a decryption module, a comparison module, and a control module. The detection module transmits a detection signal after detecting that a power adapter is connected to the electronic device. The identification code generation module randomly generates an encrypted identification code after receiving the detection signal. The decryption module decrypts the identification code to generate a first decryption code. The comparison module compares a second decryption code that has been fed back from the power adapter after the power adapter receiving the detection signal, with the first decryption code. The control module controls the electronic device to receive power from the power adapter when the first decryption code is the same as the second decryption code. | 2011-08-11 |
20110197076 | Total computer security - A total security system for a computer which permits a user to render the entire computer's contents beyond access by any third party. A security program grants a user access to the directory of files stored on the computer. The security program is capable of selectively corrupting the directory of files with the capability also to selectively restore the directory of files to its original condition. | 2011-08-11 |
20110197077 | SOFTWARE FEATURE AUTHORIZATION THROUGH DELEGATED AGENTS - A method enables selected features of a software product residing on an end user electronic device with a license delivered from a licensing provider to a service provider of the end user electronic device. The method includes requesting at least one license to authorize a first service provider. An encrypted installation key uniquely associated with the first service provider is received as well as an authorization agent module for installation on one or more authorization agent devices associated with the first service provider. The encrypted installation key and the authorization agent module are installed on the authorization agent devices. A device-unique identifier (DUID) is generated for each authorization agent device based on hardware characteristics of the respective authorization agent devices. The DUID and the encrypted installation key are sent from the authorization agent device to a licensing provider to obtain the requested license. The requested license is received by the authorization agent devices if the DUID and the encrypted installation key are validated by the licensing provider. The license on authorization agent device authorizes and enables the selected features of the software product on an end user electronic device. | 2011-08-11 |
20110197078 | RIGHTS ENFORCEMENT AND USAGE REPORTING ON A CLIENT DEVICE - An integrity hash is obtained of rights information stored at a client device. The rights information is associated with content stored at the client device. The integrity hash is encrypted using a client device key to generate an encrypted hash. The client device key is externally inaccessible from the client device. The encrypted hash is stored on the client device. | 2011-08-11 |
20110197079 | PERIPHERAL DEVICE AND METHOD OF OPERATING THE SAME - In a peripheral device of the invention, a signal line monitor is activated to monitor the status of a signal line included in an external bus. In response to detection of signal absence on the signal line, the peripheral device stops power supply from the power supply device to a primary device. Power supply from the power supply device to the signal line monitor is maintained or stopped, in response to supply or stop of electric power via a power line included in the external bus. When there is no signal transmission via the external bus, power supply to the primary device is cut off. The cut-off of power supply via the power line in the external bus leads to the cut-off of even the power supply to the signal line monitor. This mechanism effectively reduces power consumption in the peripheral device connected with the external bus having the power line. | 2011-08-11 |
20110197080 | REMOTE POWER CONTROL SYSTEM WITH TICKLE CAPABILITY - An SNMP network comprises a power manager with an SNMP agent in TCP/IP communication over a network with an SNMP network manager. The power manager is connected to control several intelligent power modules each able to independently control the power on/off status of several network appliances. Power-on and load sensors within each intelligent power module are able to report the power status of each network appliance to the SNMP network manager with MIB variables in response to GET commands. Each intelligent power module is equipped with an output that is connected to cause an interrupt signal to the network appliance being controlled. The SNMP network manager is able to test which network appliance is actually responding before any cycling of the power to the corresponding appliance is tried. | 2011-08-11 |
20110197081 | METHOD AND SYSTEM FOR DISTRIBUTING POWER TO NETWORKED DEVICES - One embodiment disclosed relates to a system for power distribution to network devices. The system includes a plurality of network switches each having an internal power supply and a plurality of ports for connecting to the network devices and an external power supply having a plurality of output ports for connecting to the network switches. The external power supply communicates power available to the network switches. Each network switch determines amounts and priority levels of power for the network devices connected thereto, sums together the amounts at each priority level, determines additional amounts and priority levels of power required beyond the internal power supply capability, and sends a power request to the external power supply. The external power supply allocates power to the network switches depending on the power requests received. | 2011-08-11 |
20110197082 | DATA CENTER MANAGEMENT UNIT WITH PROTECTION AGAINST NETWORK ISOLATION - A data center management unit (DCMU, | 2011-08-11 |
20110197083 | STORAGE SYSTEM COMPRISING POWER SAVING FUNCTION - A storage system constituted such that power saving to an administrator-desired storage device can be performed from a management device. That is, the storage system comprises a power-saving indication receiving section for receiving from a management console a power-saving indication specifying at least one storage device of a plurality of RAID groups, a plurality of logical units, and a plurality of physical storage devices; and a power-saving controller for saving on power to one or more physical storage devices corresponding to the storage device specified in this power-saving indication. | 2011-08-11 |
20110197084 | POWER SAVING SYSTEM AND METHOD EMPLOYED IN COMPUTER - A power saving system for a computer incorporating a standby power source includes a setting module, a detecting module and a controlling module. The setting module communicates with the BIOS of the computer and is configured for setting power saving modes on an interface provided by the BIOS for at least one function circuit, during the time the computer powered on. The detecting module is configured for detecting “enable” and/or “disable” signals output from the BIOS. The controlling module includes at least one switching circuit configured for correspondingly interrupting the power supply from the standby power source to one or more of the at least one function circuit after the computer is shut down and the detecting module receives “enable” signals. | 2011-08-11 |
20110197085 | POWER LINE COMMUNICATION DEVICE - A power line communication (PLC) device is connected to a television power line to detect a working state of a television. When the television is turned off, the PLC device notifies a set-top box to enter a standby mode via a main power line. When the television is turned on, the PLC device notifies the set-to box to enter a normal working mode via the main power line. | 2011-08-11 |
20110197086 | DATA PROCESSING UNIT AND A METHOD OF PROCESSING DATA - A data processing unit has a time information provider for processing a clock or a strobe signal, configured to provide a digitized clock or strobe time information on the basis of the clock or strobe signal and at least one data extraction unit, coupled to the time information provider and configured to select data from a sequence of data samples of a data signal depending on the digitized clock or strobe time information. | 2011-08-11 |
20110197087 | MEMORY DEVICE INCLUDING A MEMORY BLOCK HAVING A FIXED LATENCY DATA OUTPUT - A memory block includes a memory circuit and a clock generation unit. The memory circuit may output read data in response to being clocked by a clock signal having a selectable delay that may be dependent upon a time taken for the read data to be output by a memory core after the read command is received at the memory block. The clock generation unit may cause the read data to be provided as an output of the memory block in response to being clocked by a selected data clock signal. The data clock signal may be selected from one of several clock edges generated by one of several clock edges of a system clock such that regardless of the frequency of the system clock, the read data is provided by the memory block a predetermined amount of time after the read command is received at the memory block. | 2011-08-11 |
20110197088 | METHOD AND SYSTEM TO PROVIDE A COMPLIANCE CLOCK SERVICE SUITABLE FOR CLOUD DEPLOYMENT - A method and system for providing an improved compliance clock service are described. An example method comprises establishing a system compliance clock (SCC) for a storage system that provides a compliant storage service, and establishing, for a volume in the storage system, a volume compliance clock (VCC). A current value of the SCC may be periodically updated based on hardware ticks monitored at the associated storage node. The volume compliance clock is to update its value based on a current value of the SCC. | 2011-08-11 |
20110197089 | DATA PROCESSING APPARATUS AND CONTROL METHOD THEREOF - A data processing apparatus includes: a plurality of processing units adapted to process data according to input operation clocks; and a control unit adapted to measure response times of the plurality of processing units when the operation clocks of a common frequency are supplied to the plurality of processing units, and to control a frequency of the operation clocks to be supplied to at least one of the plurality of processing units so that a plurality of measured response times become closer to each other. | 2011-08-11 |
20110197090 | Error Reporting Through Observation Correlation - A software component is executed to carry out a task, the task including a subtask. An external function is called to perform the subtask, the external function executing in a separate thread or process. The component receives an observation recorded by the external function, the observation including an identifier of a possible error condition and instance data associated with the possible error condition. The possible error condition being a cause of the failure of the external function to carry out the subtask. If the task cannot be completed, then a new observation is recorded along with the received observation, the new observation being related to a possible error condition of the component, which is a cause of the failure of the component to carry out the task. When the task can be completed despite the failure of the external function, the observation recorded by the external function is cleared. | 2011-08-11 |
20110197091 | SWITCH DEVICE, SWITCH CONTROL METHOD AND STORAGE SYSTEM - A switch device includes a memory unit for storing therein an error response for each error event to be sent in response at the time of a failure with respect to a control signal that controls a storage device connected to the switch device, an error response output unit for receiving input of the control signal and sequentially outputting each error response stored in the memory unit, an operation information computing unit for detecting an operation of a calculating device, which is connected to the switch device, corresponding to each error response output by the error response output unit and for obtaining, as operation information, a condition defining the operation of the calculating device upon receiving each error response, and an operation setting unit for setting operation condition at the time of a failure based on the operation information. | 2011-08-11 |
20110197092 | A METHOD FOR REQUESTING A FILE REPAIR DISTRIBUTION MODE - The present invention concerns a receiver terminal and method at the receiver for requesting a missing symbol from a repair service, the method comprising the steps of receiving from a first server a list of at least one repair server and at least one transmission mode used by the at least one repair server, receiving from a second server a file comprising a plurality of symbols, checking the correct reception of the symbols, and if a missing has been identified, selecting a repair server and a transmissions mode and requesting the repair server to transmit missing symbols using the transmission mode. | 2011-08-11 |
20110197093 | REDUCED WIRELESS INTERNET CONNECT TIME - A method for reducing the connect time for server access by wireless devices connecting to the server via a gateway is described. A connection from the wireless device to the gateway is established and a request for information on the server is received from the wireless device and transmitted to the server. A determination is made that a response from the server is not forthcoming and a busy indicator response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted. In another embodiment, a response is received from the server and a determination is made that the received server response is not the requested information and a response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted. | 2011-08-11 |
20110197094 | SYSTEMS AND METHODS FOR VISUAL CORRELATION OF LOG EVENTS, CONFIGURATION CHANGES AND CONDITIONS PRODUCING ALERTS IN A VIRTUAL - Embodiments of the present disclosure provide methods and systems for detecting and correlating log events, configuration changes and conditions producing alerts within a virtual infrastructure. Other embodiments may be described and claimed. | 2011-08-11 |
20110197095 | Information processing apparatus and method - An information processing apparatus comprising: a plurality of processing units; a plurality of individual monitoring units provided for each of the plurality of processing units, that monitor an operation condition of a corresponding processing unit, and judge whether or not the corresponding processing unit is operating normally, and notify the judgment result for the corresponding processing unit to outside; and an administrative unit connected to the plurality of individual monitoring units, that receives notification from any of the individual monitoring units, and performs troubleshooting processing on a processing unit corresponding to an individual monitoring unit that has made a notification that a corresponding processing unit is not operating normally. | 2011-08-11 |
20110197096 | Highly Reliable Storage System and Internal Network Thereof - The disk controller has a plurality of channel control units, a plurality of cache memories, a plurality of disk control units, and a plurality of internal switch units. Each channel control unit or disk control unit sends to one of the cache memory units a request packet requesting execution of processing. The cache memory unit sends a response packet in response to the received request packet. Each internal switch unit monitors the request packet sent from the channel control unit or disk control unit, and judges whether or not the response packet to the request packet has passed through the internal switch unit within a first given time period since the passage of the request packet. In the case where the response packet has not passed through the internal switch unit within the first given time period, the internal switch unit sends a failure notification. | 2011-08-11 |
20110197097 | INCREMENTAL PROBLEM DETERMINATION AND RESOLUTION IN CLOUD ENVIRONMENTS - Installation files are annotated, which annotations may trigger system snapshots to be taken at a plurality of points during the execution of the installation files and/or collected. During a test run, the generated snapshots are examined incrementally to determine whether the installation is success or failure at that point. Checkpoint snapshots are stored, and those indicating failure are recorded with description of the error and/or remediation that suggest how the errors may be resolved or fixed. During a production run, the annotated installation files may be executed and the checkpoint snapshots generated during the production run may be compared with those stored of the test run to incrementally identify and resolve potential problems in the production run. | 2011-08-11 |
20110197098 | METHOD AND APPARATUS FOR TEST COVERAGE ANALYSIS - A method provides for a way to test coverage data used in testing small computing platforms by assigning unique signatures to each node in the control flow graph and embedding control function calls. Signatures are embedded into the program during compilation time using the custom parser. When the program is executed the “exercised” signatures sequence is checked for correctness and used for deriving test coverage metric. This metric is used for improving unit and black-box tests. Thus, a way to collect the path-based test coverage with minimal memory and code/size impact on target system is provided. | 2011-08-11 |
20110197099 | OBJECTIVE ASSESSMENT OF APPLICATION CRASHES FROM A CUSTOMER ENVIRONMENT - A computerized method for collecting error data and providing error reports relating to occurrences of errors of software applications installed on one or more computing devices is disclosed. Data for describing software applications and identifying software application errors is collected from the computing devices and stored in a catalog. Data associated with error occurrences is obtained and combined with related data being stored in the catalog. A report is generated based on the error occurrences and related catalog data. | 2011-08-11 |
20110197100 | NON-VOLATILE REDUNDANT VERIFIABLE INDICATION OF DATA STORAGE STATUS - A non-volatile redundant verifiable indication of data storage status is provided with respect to data storage operations conducted with respect to removable data storage media, and store the indication with an auxiliary non-volatile memory of the data storage media, such that the indication stays with the media. At least one state value indicating the status of the data storage operation is written to one page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the one page of the auxiliary non-volatile memory; and the same state value is written to a second page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the second page of the auxiliary non-volatile memory. The redundancy checks indicate the validity of the state values. | 2011-08-11 |
20110197101 | SEMICONDUCTOR DEVICE AND TEST METHOD THEREOF - A semiconductor device includes a first management area storing a plurality of inspection results, the plurality of inspection results being obtained by executing inspections for each of a plurality of storage areas which store a plurality of data; and a second management area storing the plurality of inspection results. The first and second management areas are independent from each other. | 2011-08-11 |
20110197102 | AUTOMATABLE SCAN PARTITIONING FOR LOW POWER USING EXTERNAL CONTROL - Scan architectures are commonly used to test digital circuitry in integrated circuits. The present invention describes a method of adapting conventional scan architectures into a low power scan architecture. The low power scan architecture maintains the test time of conventional scan architectures, while requiring significantly less operational power than conventional scan architectures. The low power scan architecture is advantageous to IC/die manufacturers since it allows a larger number of circuits (such as DSP or CPU core circuits) embedded in an IC/die to be tested in parallel without consuming too much power within the IC/die. Since the low power scan architecture reduces test power consumption, it is possible to simultaneously test more die on a wafer than previously possible using conventional scan architectures. This allows wafer test times to be reduced which reduces the manufacturing cost of each die on the wafer. | 2011-08-11 |
20110197103 | DECODING METHOD AND APPARATUS OF RETRANSMISSION COMMUNICATION SYSTEM - A decoding method and apparatus of a retransmission communication system are provided. In the decoding method and apparatus, weights are applied to error data and retransmitted data, and the resulting error data and the resulting retransmitted data are chase-combined. Therefore, it is possible to reduce the coding rate of combined data and enhance the reliability of decoding. | 2011-08-11 |
20110197104 | METHOD AND APPARATUS FOR ENCODING AND DECODING DATA - A method and apparatus for selecting interleaver sizes for turbo codes is provided herein. During operation information block of size K is received. An interleaver size K′ is determined that is related to K″, where K″ from a set of sizes; wherein the set of sizes comprise K″=a | 2011-08-11 |
20110197105 | ENCODER, TRANSMISSION DEVICE, AND ENCODING METHOD - Disclosed are an encoder, a transmission device, and an encoding method with which the transmission amount is reduced and a deterioration in transmission efficiency is suppressed while improving reception quality when QC-LDPC or a like block encoding is used. A puncture pattern setting unit ( | 2011-08-11 |
20110197106 | WIRELESS TRANSMISSION DEVICE, WIRELESS RECEIVING DEVICE, AND METHOD FOR TRANSMITTING ENCODED DATA - Disclosed are a wireless transmission device, wireless receiving device, and method for transmitting encoded data with which power consumption can be reduced at the receiving end in accordance with reception conditions, while resource-saving is maintained by employing an erasure correcting code (ECC). In a wireless communication device ( | 2011-08-11 |
20110197107 | NON-VOLATILE MEMORY DEVICE AND DATA PROCESSING METHOD THEREOF - A data processing method for a non-volatile memory device is provided. The non-volatile memory device includes a controller and a NAND flash memory. First, a target command and a corresponding target address are serially transmitted from the controller to the NAND flash memory. Then, the NAND flash memory calculates a first value according to the target address. Moreover, a cyclic redundancy check code corresponding to the target address is transmitted from the controller transmits to the NAND flash memory. Next, the NAND flash memory determines whether a transmission error has occurred by performing a cyclic redundancy check according to the first value and the cyclic redundancy check code. When the transmission error has occurred, a status register is set to inform the controller to re-transmit the target command and the corresponding target address. | 2011-08-11 |
20110197108 | MEMORY CARD AND MEMORY CONTROLLER - A memory card has a plurality of non-volatile memories and a main controller for controlling the operation of the non-volatile memories. The main controller performs an access control to the non-volatile memories in response to an external access instruction, and an alternate control for alternating an access error-related storage area of the non-volatile memory with other storage area. In the access control, the speeding up of the data transfer between flash memories is achieved by causing the plurality of non-volatile memories to parallel access operate. In the alternation control, the storage areas is made alternative for each non-volatile memory in which an access error occurs. | 2011-08-11 |
20110197109 | SEMICONDUCTOR MEMORY DEVICE AND METHOD OF CONTROLLING THE SAME - A semiconductor memory device includes a plurality of detecting code generators configured to generate a plurality of detecting codes to detect errors in a plurality of data items, respectively, a plurality of first correcting code generators configured to generate a plurality of first correcting codes to correct errors in a plurality of first data blocks, respectively, each of the first data blocks containing one of the data items and a corresponding detecting code, a second correcting code generators configured to generate a second correcting code to correct errors in a second data block, the second data block containing the first data blocks, and a semiconductor memory configured to nonvolatilely store the second data block, the first correcting codes, and the second correcting code. | 2011-08-11 |
20110197110 | SEMICONDUCTOR MEMORY DEVICE AND METHOD OF CONTROLLING THE SAME - A semiconductor memory device includes a plurality of detecting code generators configured to generate a plurality of detecting codes to detect errors in a plurality of data items, respectively, a plurality of first correcting code generators configured to generate a plurality of first correcting codes to correct errors in a plurality of first data blocks, respectively, each of the first data blocks containing one of the data items and a corresponding detecting code, a second correcting code generators configured to generate a second correcting code to correct errors in a second data block, the second data block containing the first data blocks, and a semiconductor memory configured to nonvolatilely store the second data block, the first correcting codes, and the second correcting code. | 2011-08-11 |
20110197111 | Method and apparatus for error-correction in and processing of GFP-T superblocks - The present invention discloses a method and apparatus for processing and error correction of a GFP-T superblock, where the 64 bytes of payload data of a first superblock are buffered in the first page of a two-page buffer. The flag byte is buffered in a separate buffer, and a CRC operation is performed in a separate logic element. The result of the CRC operation is checked against a single syndrome table which may indicate single- or multi-bit errors. As the payload data of the first superblock is processed and read out of the first page of the two-page buffer, the payload data of a second superblock is written into the second page of the two-page buffer to be processed and corrected. | 2011-08-11 |
20110197112 | Max-log-map equivalence log likelihood ratio generation soft Viterbi architecture system and method - A modified soft output Viterbi algorithm (SOVA) detector receives a sequence of soft information values and determines a best path and an alternate path for each soft information value and further determines, when the best and alternate paths lead to the same value for a given soft information value, whether there is a third path departing from the alternate path that leads to an opposite decision with respect to the best path for a given soft information value. The SOVA detector then considers this third path when updating the reliability of the best path. The modified SOVA detector achieves max-log-map equivalence effectively through the Fossorier approach and includes modified reliability metric units for the first N stages of the SOVA detector, where N is the memory depth of a given path, and includes conventional reliability metric units for the remaining stages of the detector. | 2011-08-11 |
20110197113 | ABNORMALITY DETECTION SYSTEM, ABNORMALITY DETECTION METHOD, AND ABNORMALITY DETECTION PROGRAM STORAGE MEDIUM - Even if data includes a defect or an outlier in features thereof, the influence of the defect or the outlier of the features is suppressed to perform a highly precise abnormality detection, and data including high-dimensional features is processable to accomplish the highly stable detection of an abnormality. | 2011-08-11 |
20110197114 | ELECTRONIC MESSAGE RESPONSE AND REMEDIATION SYSTEM AND METHOD - Provided is a method, system and software for responding to an incoming electronic message, including determining whether the incoming electronic message is relevant or irrelevant to a user, and if the incoming electronic message is irrelevant to the user, parsing the incoming electronic message for message origination information and replying to the message using the message origination information. | 2011-08-11 |
20110197115 | METHOD AND SYSTEM TO AUTOMATICALLY INSERT A RELEVANT HYPERLINK INTO A WEBPAGE - A method and system to automatically insert a hyperlink into a webpage containing text is described. The system comprises at least one processor and at least one software component. The at least one software component is executable by the at least one processor to receive, via, a network, the text. The at least one software component further compares a portion of the text to at least one character string that is stored in a database to identify the portion of the text as included in both the webpage and the database. The portion of the text is a name of a product and is associated with the hyperlink. The at least one software component is further executable to cause an insertion of the hyperlink into the webpage and to communicate the name of the product to a producer of the text. The name of the product is included in the webpage by the producer of the portion of the text. | 2011-08-11 |
20110197116 | METHOD AND APPARATUS FOR SELECTING HYPERLINKS - A method and apparatus for selecting a hyperlink are provided, including obtaining a coordinate corresponding to a touch or a click input when the touch or click input to a web page is sensed; searching for at least one candidate hyperlink existing near the coordinate; enlarging a region including the at least one candidate hyperlink; and changing the at least one candidate hyperlink to be distinguishable from other hyperlinks. | 2011-08-11 |
20110197117 | SYSTEMS AND METHODS FOR PROCESSING COLOR INFORMATION IN SPREADSHEETS - Methods to facilitate the processing of color information in spreadsheets described using markup languages are presented. In some embodiments, a method for storing color information for objects in a spreadsheet document described in a markup language may comprise obtaining distinct color values from a plurality of spreadsheet color table objects. The color values in the plurality of spreadsheet color table objects are referenced by spreadsheet objects through a plurality of indexes and each index corresponds to a distinct color table object. The distinct color values are stored in a color palette table object and are accessed using a color palette index. Index values in each of the plurality of color tables are mapped to the color palette index, if the index value and the color palette index value point to the same color value. The mapping permits objects to reference color values in the color palette object table. | 2011-08-11 |
20110197118 | SYSTEMS AND METHODS FOR PROCESSING MARKUP LANGUAGE SPECIFIED SPREADSHEET STYLES - Methods to facilitate the processing of formatting information for cells in a spreadsheet document described in a markup language are presented. For spreadsheet documents that include a plurality of style objects, cell formatting information may be obtained from a master style object that stores master formatting information. In addition, named style information may be obtained from a style name object that stores named styles. Further, cell specific formatting information, which can override master formatting information, may be obtained from a cell-specific style object that includes cell specific formatting information. Combined cell formatting information for cells may be stored in a cell format object, wherein the combined cell formatting information can comprise named styles, cell-specific formatting information that overrides formatting information in the master style object, and master formatting information that has not been overridden by the cell-specific formatting information. | 2011-08-11 |
20110197119 | SYSTEM AND METHOD FOR VISUALLY MAPPING AND AUTOMATICALLY COMPLETING ELECTRONIC FORMS - A computer apparatus and method are provided for visually mapping fields of various electronic forms to a common object model. The forms may then be dynamically completed via a runtime engine that retrieves mapping data from a relational database and uses the mapping data to automatically populate corresponding fields of the forms without manual input by the user. Specifically, a visual mapping tool displays the objects of the common object model as well as the fields of a form to be mapped. A user drags and drops one or more of the displayed objects into a mapping area, and drags and drops a field to which the one or more objects are to be mapped. The user also identifies a type of association between the selected objects and the field. A mapping entry is then generated in a map file to map the selected objects to the field. | 2011-08-11 |
20110197120 | Document Flagging And Indexing System - An improved document flag and series of flags is useful in highlighting information within documents. Indicia on the flags can be used to indicate and quickly access different topics and sub topics within a document. In certain embodiments the flags include a perforation that facilitates easy removal and a copier invisible correlating indicator that facilitates replacement of the flag in its original location after a copy of the document is made. In another embodiment an electronic flagging system facilitates electronic document review and organization. | 2011-08-11 |
20110197121 | EFFECTIVE SYSTEM AND METHOD FOR VISUAL DOCUMENT COMPARISON USING LOCALIZED TWO-DIMENSIONAL VISUAL FINGERPRINTS - A method and system detects and highlights changes in documents and displays those documents in a side-by-side aligned view. Aspects of a source document and a revised document are detected and compared. Similarities and/or differences between the source document and the revised document are identified and visual identifiers are introduced to maintain consistent and accurate alignment between content in the source document and content in the revised document. A merged single file is output containing the aligned side-by-side view of the source document and the revised document, with all differences between the source document and the revised document visually identified. | 2011-08-11 |
20110197122 | Generating and Displaying Active Reports - Embodiments of the present invention enable the generation and display of active reports. Applications of the present invention include its use in embodiments of a web-based product for managing an Information Technology (IT) infrastructure although the present invention is not limited to such applications. In embodiments, an active report is an active report file comprising report data and a user interface (UI) reference to a network location of code that defines an interactive UI comprising graphical user interface (GUI) components to be rendered when displaying the report data. In embodiments, the interactive UI is defined by UI code (such as an Adobe Flash Small Web Format (SWF) file) that also defines the UI of a rich internet application (RIA). In embodiments, the UI reference may be a link designating a location to the location of the UI code on a network, such as the Internet. | 2011-08-11 |
20110197123 | System and Method for Linking Images Between Websites to Provide High-Resolution Images From Low-Resolution Websites - A system and method that combines features of existing websites to link images between websites to create products with high-resolution images from sites that support only low-resolution data is provided. Even further, a system and method are provided for an integrated account management, image storage and product ordering means to upload images to multiple sites at once. | 2011-08-11 |
20110197124 | Automatic Creation And Management Of Dynamic Content - A computer implemented method and system for creating and managing dynamic content on a web page is provided. An application programming interface that interacts with a user's browser application is provided. The browser application comprises multiple document objects contained in a document object model. A user input triggers retrieval of one or more dynamic content objects on the web page. The application programming interface dynamically retrieves the dynamic content objects from local and/or remotely hosted memory locations. The application programming interface updates the document object model using the retrieved dynamic content objects. The retrieved dynamic content objects define the document objects in the document object model. The application programming interface dynamically renders the retrieved dynamic content objects onto the web page from the document objects contained in the updated document object model. The application programming interface updates functionality of the rendered dynamic content objects on the web page at runtime. | 2011-08-11 |
20110197125 | Web Page Loading Method and Apparatus - A The present invention discloses a web page loading method and apparatus. The method includes: judging whether there is parsed data matching resources to the loaded; and if there is parsed data matching the resources to be loaded, loading the parsed data directly. Through the sharing of parsed data, the present invention prevents repeated parsing of shared resources and thereby shortens the loading time, increases the loading speed, and reduces the memory occupancy. | 2011-08-11 |
20110197126 | Display Placeholders For Rich Media Content - Methods, systems, devices, and programming structures for providing temporary substitute placeholder content for rich media content in data sets downloaded to wireless communications devices. The substitute placeholder content may be logically related to the rich content for which it substitutes, and may be displayed in the same relative size and location as the rich content ultimately to be displayed. | 2011-08-11 |
20110197127 | HANDHELD ELECTRONIC DEVICE AND METHOD EMPLOYING LOGICAL PROXIMITY OF CHARACTERS IN SPELL CHECKING - An improved handheld electronic device and associated method employing an improved spell checking routine enable proposed spelling corrections having a close logical proximity to an active input to be output at a position of preference for easy selection by the user. By way of example, a base character and the various accented forms thereof can be said to have a logical proximity to one another that is closer than their logical proximity to any character having a different base character, whether additionally having a diacritical element or not. | 2011-08-11 |
20110197128 | Device and Method Incorporating an Improved Text Input Mechanism - The present invention relates to a device incorporating an improved text input mechanism, a method for improved text input and a computer program for performing the method. A device comprising a display screen for displaying m-words and an input device for entering characters is disclosed. The device further comprises a processor receiving characters from the input device, and a context comprising K words directly preceding a desired word and wherein K is greater than one. Furthermore, the device comprises a dictionary, comprising a plurality of occurrence indicators associated with k | 2011-08-11 |
20110197129 | MEDIA FILE ACCESS CONTROL METHOD FOR DIGITAL MEDIA PLAYER, AND METHOD AND DEVICE FOR ADDING MY FAVORITES FOLDER - A media file access control method for a digital media player includes a) receiving a mode selection instruction; b) determining whether the mode selection instruction corresponds to a lite mode or a computer file mode; and c) if the mode selection instruction corresponds to the lite mode, performing steps of loading a plurality of multimedia files according to content of a pre-established favorites list recording respective names and storage locations of the multimedia files, and displaying thumbnails of the multimedia files in a first region of a screen of a display element. The thumbnails of the multimedia files are capable of being selected such that the multimedia files can be played directly and instantly. | 2011-08-11 |
20110197130 | Method and system for determining viewing time of an online video - A method and system for approximating the viewing time of a video posted on a website of a plurality of websites on the Internet is disclosed herein. The method and system is able to approximate the viewing time of the online video by a visitor computer and transmit the information to a compiling server. | 2011-08-11 |
20110197131 | CONTEXTUAL CHAPTER NAVIGATION - A system and a method are disclosed for on-screen display that indicates to the user the current point in the playback of the video within the context of the chapter delineations. The user can access a chapter selection feature that presents a preview image from each chapter along with a timeline representing the video, and an indication on the timeline of where the chapters fall along the timeline. Alternatively, short video segments replace the still images as representing the chapters for some or all of the chapters. The user can select a chapter in which to resume playing the video by selecting one of the images or video segments. | 2011-08-11 |
20110197132 | Cloud Desktop System with Multi-Touch Capabilities - The present invention provides a collaborative tool which is a distributed multi-touch cloud-connected desktop tool comprising a client application and/or webtop with an integrated immersive Natural User Interface adapted for any input device having a touch screen. Thanks to the invention users can access their desktops from everywhere, at anytime and from any capable device, as the desktop is multiplatform and can be accessed from mobile devices, web browsers or from desktops as standalone application without the necessity of a desktop computer. Thanks to the invention, users can share digital content, edit it and interact with it in a cooperative and collaborative manner while still able to individually and independently arrange objects and/or applications in each of the clients for the best convenience of each user. | 2011-08-11 |
20110197133 | METHODS AND APPARATUSES FOR IDENTIFYING AND MONITORING INFORMATION IN ELECTRONIC DOCUMENTS OVER A NETWORK - Exemplary methods and apparatuses are provided which may be implemented using one or more computing devices to allow for certain information within an electronic document to be easily identified and monitored in an efficient manner. | 2011-08-11 |
20110197134 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR SETTING THE MOST PLAYED ITEMS OF MEDIA DATA AS RINGTONE ALERTS - An apparatus for assigning items of media content as ringtones corresponding to a contact(s) or group(s) of contacts is provided. The apparatus may include a processor and a memory storing executable computer program code that causes the apparatus to at least perform operations including determining an item(s) of media content, among a plurality of items of media content, that was played by the apparatus a highest number of times during a predetermined time period and assigning the item of media content as a ringtone associated with a contact(s) that has communicated with the apparatus. The computer program code may further cause the apparatus to play the data associated with the item of media content in response to receipt of a communication from the contact. Corresponding computer program products and methods are also provided. | 2011-08-11 |
20110197135 | MANIPULATION-MONITORING DEVICE - A manipulation-monitoring device may include a storage unit that stores page image data, the page image data being used for displaying a manipulation-monitoring-page, the manipulation-monitoring-page being displayed on a display unit based on data collected from a control device of a plant, the manipulation-monitoring-page being used for controlling operation of the plant, and a display control unit that controls the display unit to display a pseudo-manipulation-monitoring-page instead of the manipulation-monitoring-page, displaying the pseudo-manipulation-monitoring-page being performed by using the page image data without using data from the control device until data collection from the control device is completed, the pseudo-manipulation-monitoring-page showing a summary of the manipulation-monitoring-page. | 2011-08-11 |
20110197136 | WEB BROWSER INSTANCE PROFILING - A method of profiling a web browser instance associated with a computer, so as to determine the propensity of a user of the web browser instance to undertake certain actions, the method comprising the steps of: storing a web page on a web server, said web page including profiling code; uploading the web page to a visitor web browser instance responsive to a request from said web browser; and executing the profiling code on the web server and/or web browser to extract profiling data from the visitor web browser instance. Executing the profiling code includes initiating a series of queries of the visitor web browser instance, the queries including at least one of the following techniques: determining whether a specific URL ( | 2011-08-11 |
20110197137 | Systems and Methods for Rating Content - Systems and methods for rating content. In one embodiment, a method for rating content in a set of aggregated third party webpages is provided. The method can include providing a set of indicators for a user to rate at least a portion of the aggregated content for audience appropriateness; receiving a plurality of rating indications from a respective plurality of users for the portion of aggregated content; aggregating the received plurality of rating indications; based at least in part on the aggregated rating indications, determining a rating for the portion of aggregated content; and outputting the rating for the portion of aggregated content. | 2011-08-11 |
20110197138 | PREVIEW RELATED ACTION LIST - Previewing content included in an enterprise database associated with an enterprise system is disclosed. A first indication is received for an overlay object associated with an object from the enterprise database that is being displayed. an action list is dynamically determined associated with the object being displayed using a first method to retrieve actions from the enterprise system that are associated with the object being displayed. The action list is provided to the overlay object. Content associated with the object is dynamically determined using a second method to retrieve content from the enterprise system. The content is provided to the overlay object. The overlay object is displayed to preview the content included in the enterprise database and to provide the action list. | 2011-08-11 |
20110197139 | Displaying Personalized Information in a Handheld Device - One embodiment is a handheld electronic device ( | 2011-08-11 |