Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


35th week of 2011 patent applcation highlights part 48
Patent application numberTitlePublished
20110213970PROACTIVE FORCED RENEWAL OF CONTENT PROTECTION IMPLEMENTATIONS - A method, apparatus, and system for proactive forced renewal of content protection implementations in devices. The method includes, on a first substantially periodic basis, automatically pushing a new content protection implementation to a device that contains an existing content protection implementation; wherein the existing content protection implementation comprises (a) existing software for presenting protected content and (b) an existing key to facilitate presentation of protected content; and wherein the new content protection implementation comprises a new key to supersede the existing key for facilitating presentation of protected content. On a second substantially periodic basis, the method includes automatically pushing revocation data to the device, the revocation data to identify a plurality of revoked keys, each revoked key of the plurality of revoked keys comprising a key that has been superseded by the new key of the new content protection implementation.2011-09-01
20110213971METHOD AND APPARATUS FOR PROVIDING RIGHTS MANAGEMENT AT FILE SYSTEM LEVEL - An approach is presented for providing rights management at file system level. A virtual file system rights management application receives a request to access a protected file. The rights management application binds the access request to the protected file in the file system, determines credentials associated with the request for accessing the protected file according to the binding and causes, at least in part, verification of the credentials according to a rights management system associated with the protected file. Based, at least in part, on the determination, the rights management application causes decryption of the protected content.2011-09-01
20110213972METHOD OF EXECUTING A CRYPTOGRAPHIC CALCULATION - A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining (2011-09-01
20110213973IC CARD FOR ENCRYPTION OR DECRYPTION PROCESS AND ENCRYPTED COMMUNICATION SYSTEM AND ENCRYPTED COMMUNICATION METHOD USING THE SAME - It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff α and a staff β belonging to the same project group, α of the transmission side writes an arbitrary variable code V(2011-09-01
20110213974IDENTIFYING RELATIONSHIPS BETWEEN USERS OF A COMMUNICATIONS DOMAIN - The invention enables identifying relationships between users of a online communications domain such as a social networking website. First identification tokens 2011-09-01
20110213975SECRET INTEREST GROUPS IN ONLINE SOCIAL NETWORKS - Described herein are methods and systems for creating a framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks. SIGs are self-managed groups formed outside of the social network, around secret, sensitive, or private topics. A set of cryptographic algorithms are used for the framework implementation.2011-09-01
20110213976METHOD FOR DOWNLOADING CONDITIONAL ACCESS SYSTEM FOR DIGITAL BROADCASTING - The present invention relates to a method of downloading a conditional access system (CAS) for digital broadcasting in a digital broadcasting system. More specifically, the present invention includes a transmitter which includes a DCAS authentication proxy (AP), a personalization server, a DCAS provisioning server, and a head-end, and a set-top box as a receiver, which includes a DCAS host. In particular, a mutual authentication occurs between the DCAS AP and the DCAS host and key distribution, between the personalization server and the DCAS host and key distribution, and between the DCAS provisioning server and the DCAS host and key distribution in order to protecting a conditional access system that descrambles scrambled broadcasting contents when broadcasting contents are downloaded from an IP-TV broadcasting system and viewed.2011-09-01
20110213977METHODS AND DEVICES FOR COMPUTING A SHARED ENCRYPTION KEY - Embodiments described herein are generally directed to methods and devices in which computing devices, and mobile devices in particular, establish a shared encryption key for a device group comprising at least three mobile devices. In accordance with one example embodiment, a public key of a mobile device is computed using a shared password as performed in accordance with authentication acts of a password-authenticated key exchange protocol, and transmitted to at least one other mobile device of the group. A public value is computed as a function of a mobile device private key and of a public key of at least one other mobile device of the device group, in accordance with a group key establishment protocol. The public values of the mobile devices of the device group are used to compute a shared encryption key.2011-09-01
20110213978SECURE METHODS OF TRANSMITTING AND RECEIVING DATA BETWEEN TERMINALS COMPRISING NEAR-FIELD COMMUNICATION, AND CORRESPONDING TERMINALS - A method is provided for secure transmission of a data file from a sender terminal to at least one recipient terminal, each including a near-field communication device and implementing an encryption of the file, as a function of at least one item of encryption information that is known or determined by the sender terminal. The includes the following steps, in the sender terminal: dividing the file into a first file portion and a second file portion; sending with the near-field communication device a first data set including at least one portion of the encryption information item and the first file portion to the recipient terminal or terminals; sending with a radiofrequency transmitter a second data set including at least the second file portion to the recipient terminal or terminals.2011-09-01
20110213979QUANTUM KEY DISTRIBUTION - The invention relates to methods and apparatus for Quantum key distribution. Such methods including authenticating a first node in a communications network with a remote node in the communications network. The authentication may include connecting an authentication device to the first node, agreeing a quantum key between the first node and the remote node based on a quantum signal transmitted or received by the first node and performing an authentication step between the authentication device and the remote node on an encrypted channel. Authentication between the authentication device and remote node may be taken as authentication of the first node.2011-09-01
20110213980METHOD FOR ACCESSING A PLURALITY OF SERVICES BY A MOBILE TERMINAL USER, AND RELATED SECURE DEVICE - A method for enabling the user of at least one mobile terminal to access a plurality of services, includes: creating (E2011-09-01
20110213981REVOCATION OF A BIOMETRIC REFERENCE TEMPLATE - A system, method and program product for generating a biometric reference template revocation message on demand. The method includes generating, using a biometric reference template revocation engine, a biometric reference template revocation message and loading the biometric reference template revocation engine onto a secure portable device for generating on demand of the individual the biometric reference template revocation message.2011-09-01
20110213982ELGAMAL SIGNATURE SCHEMES - There is disclosed a method of generating a digital signature of a message m. A signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive operation to combine the key d with a first value. The masked value is then multiplied by a second value to obtain component s. The first value is calculated using the message m and another component of the digital signature, and the second value is derived using the inverse of a component of the first value. In this way, the signature component s is generated using a method that counters the effectiveness of side channel attacks, such as differential side channel analysis, by avoiding a direct multiplication using long-term private key d.2011-09-01
20110213983AUTHENTICATION SYSTEM FOR A PLUG-IN ELECTRIC DRIVE VEHICLE - The invention relates to an authentication and/or energy auditing system for a plug-in electric drive vehicle. A first device connects to a first power apparatus and establishes an electrical power path between the first and a remote device. The latter is connectable to a second power apparatus. The authentication system preferably includes a powerline transceiver to receive a request containing an identifier from the remote device over the power path. Control means controls operation of the first device and responds to the request to initiate an authentication process to determine whether or not the remote device is authentic and authorised to exchange power with the first device, and to activate a control switch to electrically connect the first device to the first power apparatus only upon an authentic and authorised determination. The energy auditing system measures energy received by each device in a specified time interval and electrically disconnects the first device from the first power apparatus when a power loss between the respective devices is detected.2011-09-01
20110213984SERIAL ARCHITECTURE FOR HIGH ASSURANCE PROCESSING - A processing system (2011-09-01
20110213985TWO FACTOR AUTHENTICATION SCHEME - An improved method is provided for generating an authentication factor for authenticating a user. The method includes: assigning a unique identifier to a user of the computing resource; determining a value for a challenge to the user, where the value is determined by a random determination method; concatenating the identifier with the value to form an input string; encrypting the input string using a one-way hash function to yield an output string of characters; and selecting a subset of characters from the output string to serve as the authentication factor for the user. This improved method may be used to generate grids used in a grid authentication scheme.2011-09-01
20110213986Method for Activating Content and Content Reproduction Apparatus - A firmware verification section verifies whether a firmware for controlling the activating of contents has been falsified or not, prior to the activating of the contents; a decoding key setting section sets a key to the firmware; the key is used to decode an encrypted activation program for activating the contents, when the firmware has not been falsified; and an activation program decoding section decodes the encrypted activation program by using the firmware with the key set to the firmware.2011-09-01
20110213987CONTROLLER FOR DATA STORAGE DEVICE, DATA STORAGE DEVICE, AND CONTROL METHOD THEREOF - According to one embodiment, a controller that controls a data storage device provided with a storage module that stores data encrypted with a first key includes an input/output module, encryption/decryption modules, and a connector. The input/output module manages data input and output between the storage module and a host. The encryption/decryption modules are switched to function as an encryptor or a decryptor. The connector changes connection between the encryption/decryption modules and the host. When encrypted data is backed up, one of the encryption/decryption modules is switched to function as a decryptor, while the other is switched to function as an encryptor. The decryptor, the encryptor, and the host are connected in series. The encrypted data is decrypted by the decryptor with the first key and is then encrypted by the encryptor with a second key to be output to the host.2011-09-01
20110213988DIGITAL INFORMATION PROTECTING METHOD AND APPARATUS, AND COMPUTER ACCESSIBLE RECORDING MEDIUM - A method for protecting digital information includes: converting a protected address range into a plurality of address blocks based on a preset conversion unit, and generating an address block rearranging rule using the address blocks as a parameter; when it is desired to load data into an address batch of the protected address range, converting the address batch into a plurality address blocks based on the conversion unit; and locating rearranged addresses of the address blocks in the protected address range according to the address block rearranging rule, and loading the data into the rearranged addresses. Thus, the data can be stored in the address batch scatteredly, and the protected data cannot be recomposed into the original correct data when stolen.2011-09-01
20110213989OPTICAL STORAGE MEDIA AND THE CORRESPONDING CRYPTOGRAPHY FOR DATA ENCRYPTION THEREOF - Based on the demand of developing a data encryption technique for the optical storage media, the present invention discloses a cryptography for data encryption based on a design of specific hardware conditions, so as to achieve the security requirements for the encrypted digital data stored in the optical storage media and the design requirements for the security issues on the optical storage media for software vendors in the current market.2011-09-01
20110213990APPARATUS AND METHOD FOR CONTENT PROTECTION USING ONE-WAY BUFFERS - Method and apparatus for content protection using one-way buffers. In one embodiment, the method includes storage of content decrypted by a host processor within a reserved range of memory. In one embodiment, a peripheral device requires the host processor to decrypt the received content for playback by the peripheral device. The decrypted content is stored within a reserved range of memory that is not accessible by malicious software. Hence, content is transferred from the reserved range of memory to a device driver of the peripheral device. In one embodiment, access to the reserved range of memory consists of write-only access by the host processor and read-only access by the peripheral device. In one embodiment, prior to storage of the content within the reserved range of memory, the content is re-encrypted prior to storage and decryption prior to transfer to the peripheral device. Other embodiments are described and claimed.2011-09-01
20110213991PROCESSOR CORE COMMUNICATION IN MULTI-CORE PROCESSOR - Embodiments of the disclosure generally set forth techniques for handling communication between processor cores. Some example multi-core processors include a first set of processor cores in a first region of the multi-core processor configured to dynamically receive a first supply voltage and a first clock signal, a second set of processor cores in a second region of the multi-core processor configured to dynamically receive a second supply voltage and a second clock signal, and an interface block coupled to the first set of processor cores and the second set of processor cores, wherein the interface block is configured to facilitate communications between the first set of processor cores and the second set of processor cores.2011-09-01
20110213992METHOD OF WAKING PROCESSOR FROM SLEEP MODE - A method and apparatus for storing and classifying packets transmitted over a network to a processor in a low power mode. The processor receives and classifies the packets as interesting or not interesting. Uninteresting packets are discarded while interesting packets are stored in memory. For the first interesting packet received, a receive timer is activated and for every interesting packet received a counter is incremented. A transmit timer is activated when the processor enters the low power mode. When either the receive timer expires, the transmit timer expires or the counter reaches a threshold value then a wake-up interrupt is asserted.2011-09-01
20110213993Data processing apparatus and method for transferring workload between source and destination processing circuitry - In response to a transfer stimulus, performance of a processing workload is transferred from a source processing circuitry to a destination processing circuitry, in preparation for the source processing circuitry to be placed in a power saving condition following the transfer. To reduce the number of memory fetches required by the destination processing circuitry following the transfer, a cache of the source processing circuitry is maintained in a powered state for a snooping period. During the snooping period, cache snooping circuitry snoops data values in the source cache and retrieves the snoop data values for the destination processing circuitry.2011-09-01
20110213994Reducing Power Consumption of Distributed Storage Systems - Methods for reducing the power consumption of distributed storage systems are described. An embodiment describes a storage system which is adapted to reduce its power consumption at times of low load by reducing the number of active versions of the stored data. The data to be stored in the storage system is divided into chunks and in an example, each chunk is replicated on a number of different servers. At times of low load, the system enters a mode of operation in which the number of active replicas is reduced and servers that do not store any active replicas are put into a low power state. When in this mode, writes are written to a versioned store and the data is subsequently copied to servers storing replicas once all the servers have returned to normal power state.2011-09-01
20110213995Method, Apparatus And Computer Program Product Providing Instruction Monitoring For Reduction Of Energy Usage - A method is disclosed to operate a power advisor. The method includes, reading a first instruction set; reading a data bus; and reading register value(s) stored in at least one data register. This information is analyzed for energy usage purposes. If a set of instruction can provide the same result with a lower energy usage, the first instruction set is replaced with the lower power usage instruction set. An apparatus and computer program product are also disclosed.2011-09-01
20110213996POWER CONTROL SYSTEM AND CONTROL METHOD FOR THE SAME - Provided is technology for enabling power saving control that allows a change of control content according to a user selection in a power control system that saves power consumed by an information processing apparatus. The power control system of the present invention include an image processing apparatus 2011-09-01
20110213997VIRTUAL MACHINE POWER CONSUMPTION MEASUREMENT AND MANAGEMENT - Embodiments of the virtual machine power metering system and method measure the power consumption of individual virtual machines. Power meter measurements for a physical host server are converted into individual virtual machine power meters that measure the power consumption of each individual virtual machine residing on the host server. The virtual machine power consumption is computed by generating a power model using the total power consumption of the host server and resource utilization for a virtual machine. Optimal power model coefficients are computed using the power model. The energy used by the virtual machine is computed using one of two embodiments. Embodiments of the system and method also can be used to obtain the power consumption for a specific activity (such as a service, request, or search query). In addition, the virtual machine power metering can be used for virtual machine power capping to allow power oversubscription in virtualized environments.2011-09-01
20110213998System and Method for Power Optimization - A technique for reducing the power consumption required to execute processing operations. A processing complex, such as a CPU or a GPU, includes a first set of cores comprising one or more fast cores and second set of cores comprising one or more slow cores. A processing mode of the processing complex can switch between a first mode of operation and a second mode of operation based on one or more of the workload characteristics, performance characteristics of the first and second sets of cores, power characteristics of the first and second sets of cores, and operating conditions of the processing complex. A controller causes the processing operations to be executed by either the first set of cores or the second set of cores to achieve the lowest total power consumption.2011-09-01
20110213999SYSTEM AND METHOD OF SUPPLYING AN ELECTRICAL SYSTEM WITH DIRECT CURRENT - A system for supplying an electrical system with direct current, the system including at least two direct current power supply devices each having means of electrical connection to an alternating current power supply source and an AC/DC converter of alternating current into direct current, a module for managing the power supply of the electrical system which, after reception of an information of failure of a first active power supply device, transmits a command to start up a second inactive power supply device and a back up electrical energy storage device electrically by-pass connected between the power supply devices and the electrical system. The management module also receives the information of failure from the back up device and/or from the electrical system and transmits the command to start up the second power supply device during a discharge phase of the back up device.2011-09-01
20110214000METHOD FOR REDUCING THE ENERGY CONSUMPTION OF AN ELECTRONIC TERMINAL, CORRESPONDING TERMINAL AND COMPUTER PROGRAM - A method and apparatus are provided for reducing the energy consumption of an electronic terminal. The method implements a step of modifying the timeout-before-standby duration for said terminal after an action performed by and/or on said terminal at a current instant, depending on the membership of the current instant in a given temporal category, from among at least two predefined temporal categories.2011-09-01
20110214001INRUSH CURRENT SUPPRESSING CIRCUIT AND ELECTRONIC DEVICE USING THE SAME - An inrush current suppressing circuit connected between a power supply and a working circuit of an electronic device includes a first power supply circuit and a second power supply circuit both connected between the power supply and the working circuit. The first power supply circuit suppresses inrush current and forwards power from the power supply to the working circuit when the electronic device is powered on. The second power supply circuit forwards power from the power supply to the working circuit when the power supply reaches a predetermined voltage.2011-09-01
20110214002MULTI-FUNCTION PERIPHERAL, POWER SUPPLY APPARATUS, AND POWER SUPPLY CONTROL METHOD - A digital multi-function peripheral includes a multi-function peripheral unit that has plural functions, a switching power supply unit connected to a commercial power supply as a main power supply for the multi-function peripheral unit, and an electrical storage device charged in advance as an auxiliary power supply for the multi-function peripheral unit. The digital multi-function peripheral further includes a control circuit that monitors a load current flowing to the multi-function peripheral unit, supplies electric power from the electrical storage device to the multi-function peripheral unit instead of electric power from the switching power supply unit when the load current is smaller than a threshold set as an allowable lower limit of power efficiency of the switching power supply unit, and supplies the electric power from the switching power supply unit to the multi-function peripheral unit when the load current increases to be equal to or larger than the threshold.2011-09-01
20110214003CLOCK CONTROL SIGNAL GENERATION CIRCUIT, CLOCK SELECTOR, AND DATA PROCESSING DEVICE - Provided are a technique for high-speed switching between clock signals different in frequency, and a clock-control-signal-generation circuit which serves to generate a control signal for clock switching in a clock selector operable to switch between clock signals including a first clock signal based on first and second clock-stop-permission signals and a clock-resume-permission signal. The clock-control-signal-generation circuit includes: a before-switching clock processing unit; and an after-switching clock processing unit. In each of the before- and after-switching clock processing units, the high-frequency clock processing subunit and the low-frequency clock processing subunit take partial charges of processing of clock signals involved in the switching respectively, whereby the processing is speeded up.2011-09-01
20110214004PACKAGED CIRCUIT - A packaged circuit includes an internal circuit, an embedded clock generator, a plurality of multi-function pins and a control pad. The embedded clock generator is for generating an internal clock. The pins include a clock output pin and a clock input pin. The clock output pin outputs the internal clock generated by the embedded clock generator. The clock input pin is for receiving an external clock. The control pad receives a control signal to determine whether the internal circuit utilizes a system clock according to the internal clock generated by the embedded clock generator or the external clock received by the clock input pin.2011-09-01
20110214005OPTIMIZED PLACEMENT OF VIRTUAL MACHINES IN A NETWORK ENVIRONMENT - Systems and methods for reducing risk of service interruptions for one or more virtual machines (VMs) in a computing environment are provided. The method comprises computing a placement scheme for placing at least one VM on one or more hosts according to a set of placement constraints defined for the VM, wherein the set of placement constraints comprises at least one availability constraint defined for the VM, wherein the availability constraint designates a N resiliency level, wherein N corresponds to number of host failures that may occur before the services provided by the VM are interrupted.2011-09-01
20110214006AUTOMATED LEARNING OF FAILURE RECOVERY POLICIES - Described is automated learning of failure recovery policies based upon existing information regarding previous policies and actions. A learning mechanism automatically constructs a new policy for controlling a recovery process, based upon collected observable interactions of an existing policy with the process. In one aspect, the learning mechanism builds a partially observable Markov decision process (POMDP) model, and computes the new policy base upon the learned model. The new policy may perform automatic fault recovery, e.g., on a machine in a datacenter corresponding to the controlled process.2011-09-01
20110214007FLEXIBLE FAILOVER POLICIES IN HIGH AVAILABILITY COMPUTING SYSTEMS - A system for implementing a failover policy includes a cluster infrastructure for managing a plurality of nodes, a high availability infrastructure for providing group and cluster membership services, and a high availability script execution component operative to receive a failover script and at least one failover attribute and operative to produce a failover domain. In addition, a method for determining a target node for a failover comprises executing a failover script that produces a failover domain, the failover domain having an ordered list of nodes, receiving a failover attribute and based on the failover attribute and failover domain, selecting a node upon which to locate a resource.2011-09-01
20110214008NETWORK SYSTEM - A network system having duplicate lines of a primary system and a backup system between a transmitter apparatus and a receiver apparatus is provided. Each of the transmitter apparatus and the receiver apparatus includes an arithmetic operator for conducting a BIP-8 arithmetic operation and a CRC arithmetic operation on an input signal and thereby detecting a bit error. The transmitter apparatus transmits data to both lines. The receiver apparatus includes a switcher. When a bit error is detected in received data of the primary system. the switcher switches control of the primary system and the backup system. Hitless protection switching of a VC path is executed,2011-09-01
20110214009Creation of Highly Available Pseudo-Clone Standby Servers for Rapid Failover Provisioning - Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.2011-09-01
20110214010Creation of Highly Available Pseudo-Clone Standby Servers for Rapid Failover Provisioning - Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.2011-09-01
20110214011STORING RAID DATA AS ENCODED DATA SLICES IN A DISPERSED STORAGE NETWORK - A method begins by a processing module receiving data for storage and interpreting the data to identify the data as redundant array of independent disks (RAID) data. The method continues with the processing module interpreting the RAID data to identify at least one of RAID block data and RAID parity data. When the RAID data includes RAID block data and RAID parity data the method continues with the processing module encoding the RAID block data in accordance with error coding dispersal storage function parameters to produce at least one set of encoded data slices and outputting the at least one set of encoded data slices to a dispersed storage network memory.2011-09-01
20110214012SECURED COPROCESSOR COMPRISING AN EVENT DETECTION CIRCUIT - A coprocessor includes a calculation unit for executing at least one command, and a securization device. The securization device includes an error detection circuit for monitoring the execution of the command so as to detect any execution error, putting the coprocessor into an error mode by default as soon as the execution of the command begins, and lifting the error mode at the end of the execution of the command if no error has been detected, an event detection circuit for monitoring the appearance of at least one event to be detected, and a masking circuit for masking the error mode while the event to be detected does not happen, and declaring the error mode to the outside of the coprocessor if the event to be detected happens while the coprocessor is in the error mode. Application in particular but not exclusively to coprocessors embedded in integrated circuits for smart cards.2011-09-01
20110214013Data Transfer and Recovery Process - A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and a remote storage server. In the event of a failure of the primary server, the failure can be diagnosed to develop a recovery strategy. Based on the diagnosis, at least one delta image may be applied to a copy of the primary image to generate an updated primary image at either the network attached storage or the remote storage server. The updated primary image may be converted to a virtual server in a physical to virtual conversion at either the network attached storage device or remote storage server and users may be redirected to the virtual server. The updated primary image may also be restored to the primary server in a virtual to physical conversion. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure.2011-09-01
20110214014MICROPROCESSOR AND METHOD FOR DETECTING FAULTS THEREIN - A method for detecting microprocessor hardware faults includes sending at least one input signal to a logic block within the microprocessor, collecting an output response to the input signal from the logic block, and determining whether the output response matches an expected output response of the logic block.2011-09-01
20110214015NETWORK HANG RECOVERY - A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.2011-09-01
20110214016Performing Aggressive Code Optimization with an Ability to Rollback Changes Made by the Aggressive Optimizations - Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.2011-09-01
20110214017FAILED PROCESS REPORTING - An application programming interface (API) that leverages operating system instrumentation to provide a chain of threads and processes may alleviate some debugging complications. Specifically, the chain may start with the first thread in the process that experienced the original failure and end with the last thread upon which the first thread directly or indirectly depends. The API may aid debugging efforts by classifying all threads related or dependent upon an original failed thread into specific categories of failures, requesting further information from the originating OS concerning specific failed threads, and using that information to debug the failed application or process more thoroughly.2011-09-01
20110214018SYSTEMS AND METHODS FOR DIAGNOSTIC NOTIFICATION VIA PACKAGE UPDATE MANAGER - Embodiments relate to systems and methods for diagnostic notification via a package update manager. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager tracks the set of installed packages and updates available for the installed set. A notification tool, in conjunction with the package manager, can monitor the user's selection of package update options, and compare those updates to a diagnostic database and/or current state of the client machine. Based on those determinations, the notification tool can generate notifications to the user advising them of potential conflicts, faults, or other conditions that may arise due to, or may surround, the prospective package update. The notification can permit the user to continue or terminate selected updates, and the notification tool can re-analyze any potential faults after an update is completed.2011-09-01
20110214019HIGH RESILIENCY NETWORK INFRASTRUCTURE - The invention provides a highly resilient network infrastructure that provides connectivity between a main network such as the Internet and a subnetwork such as a server-based (e.g., web server) local area network. In accordance with the invention, a network interface incorporated into a server hosting center provides a resilient architecture that achieves redundancy in each of three different layers of the Open System Interconnect (OSI) stack protocol (i.e., physical interface, data link, and network layers). For every network device that is active as a primary communication tool for a group of subnetworks, the same device is a backup for another group of subnetworks. Based on the same connection-oriented switching technology (e.g., asynchronous transfer mode (ATM)) found in high-speed, broadband Internet backbones such as that provided by InternetMCI, the network interface architecture provides a high degree of resiliency, reliability and scalability. In accordance with the invention, interface network routers which provide routing functionality and connectivity between the Internet backbone and the customer subnetworks are fully meshed with those deployed in the Internet backbone. Permanent virtual circuits (PVCs) providing a multitude of logical transmission paths between each hosting center router and every router in the Internet backbone, greatly reduces processing delays of data traffic through the infrastructure as only a single “hop” routing step is required between any external access point on the Internet backbone and a hosting center router.2011-09-01
20110214020ROOT CAUSE PROBLEM IDENTIFICATION THROUGH EVENT CORRELATION - Correlating activity events to identify a root cause of a process failure. Activity event data is received from a process executing on a computing device. The activity event data corresponds to a plurality of activity events. Each of the activity events has a correlation identifier, a resolution status, and an occurrence time value associated therewith. Each of the activity events are assigned to one of a plurality of event groups based on the correlation identifier of the activity event. Thereafter, at least one of the event groups is determined to have an activity event with a resolution status indicating failure of the process. One of the activity events within the determined event group is selected as a root cause activity event based on the occurrence time values. In some embodiments, the root cause activity event is identified to a user of the computing device.2011-09-01
20110214021SYSTEMS AND METHODS FOR INITIATING SOFTWARE REPAIRS IN CONJUNCTION WITH SOFTWARE PACKAGE UPDATES - Embodiments relate to systems and methods for systems and methods for initiating software repairs in conjunction with software package updates. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager tracks the set of installed packages and updates available for the installed set. A notification tool, in conjunction with the package manager, can monitor the user's selection of package update options, and compare those updates to a diagnostic database, current state of the client machine, or other resources. Based on those determinations, the notification tool can generate one or more potential software repair actions to correct or avoid potential conflicts, faults, or other conditions that may arise due to, or may surround, the prospective package update.2011-09-01
20110214022PROFILE BASED OPTIMIZATION OF PROCESSOR OPERATING POINTS - A program is executed with a first programmable device (2011-09-01
20110214023Method of Debugging Multiple Processes - A method of debugging a multiple concurrent processes comprising: obtaining, from each process, a plurality of events that have been processed and, if no time information is associated with each event, associating time information therewith; causing a display to display the events such that an event that has occurred in a first portion of the display associated with a first process at a first time is aligned with an event in a second portion of the display associated with a second process that has occurred at a similar time to the first time. To be accompanied, when published, by FIG. 2011-09-01
20110214024Method of Collecting and Correlating Locking Data to Determine Ultimate Holders in Real Time - A technique for collecting and correlating locking data collects and correlates information on a plurality of programs waiting on or holding a plurality of resources in a multi-computer database system. The technique identifies a program executing on one computer of the multi-computer database system that is waiting on a resource. The technique also identifies a second program, executing on another computer, as the ultimate holder of the resource. An operator display screen displays information corresponding to the first program and the second program. The operator display screen may be switched between a multiline display format and a single line display format. The collection, identification, and display of the locking data is performed periodically, to allow the operator to discover locking problems and take a desired corrective action.2011-09-01
20110214025Control method of non-volatile semiconductor device - Disclosed is a control method of a non-volatile semiconductor device including cells, wherein a stress for rewriting information is applied to each of the cells, and each cell has a first time period as a period of time until a characteristic of the cell is stabilized to expectation value information after the stress for rewriting information is applied, a plurality of first sequences, in each of which writing is performed to a plurality of the cells continuously in time series, and a plurality of second sequences, in each of which verification of a plurality of the cells is performed continuously in time series, after the writing performed continuous in time series. When repeating, continuously in time series, a plurality of sets, each of the sets comprising a plurality of the first sequences and a plurality of the second sequences, a period of time from completion of application of the stress to each of the cells in the first sequence until start of the verification in the second sequence for the each of the cells subjected to the stress application, is arranged for each of all of the sets, wherein the period of time is the first time period or more.2011-09-01
20110214026CONTINUOUS APPLICATION AND DECOMPRESSION OF TEST PATTERNS AND SELECTIVE COMPACTION OF TEST RESPONSES - A method for applying test patterns to scan chains in a circuit-under-test. The method includes providing a compressed test pattern of bits; decompressing the compressed test pattern into a decompressed test pattern of bits as the compressed test pattern is being provided; and applying the decompressed test pattern to scan chains of the circuit-under-test. The actions of providing the compressed test pattern, decompressing the compressed test pattern, and applying the decompressed pattern are performed synchronously at the same or different clock rates, depending on the way in which the decompressed bits are to be generated. A circuit that performs the decompression includes a decompressor such as a linear finite state machine adapted to receive a compressed test pattern of bits. The decompressor decompresses the test pattern into a decompressed test pattern of bits as the compressed test pattern is being received.2011-09-01
201102140271149.1 TAP LINKING MODULES - IEEE 1149.1 Test Access Ports (TAPs) may be utilized at both IC and intellectual property core design levels. TAPs serve as serial communication ports for accessing a variety of embedded circuitry within ICs and cores including; IEEE 1149.1 boundary scan circuitry, built in test circuitry, internal scan circuitry, IEEE 1149.4 mixed signal test circuitry, IEEE P5001 in-circuit emulation circuitry, and IEEE P1532 in-system programming circuitry. Selectable access to TAPs within ICs is desirable since in many instances being able to access only the desired TAP(s) leads to improvements in the way testing, emulation, and programming may be performed within an IC. A TAP linking module is described that allows TAPs embedded within an IC to be selectively accessed using 1149.1 instruction scan operations.2011-09-01
20110214028HIERARCHICAL ACCESS OF TEST ACCESS PORTS IN EMBEDDED CORE INTEGRATED CIRCUITS - An integrated circuit can have plural core circuits, each having a test access port that is defined in IEEE standard 1149.1. Access to and control of these ports is though a test linking module. The test access ports on an integrated circuit can be arranged in a hierarchy with one test linking module controlling access to plural secondary test linking modules and test access ports. Each secondary test linking module in turn can also control access to tertiary test linking modules and test access ports. The test linking modules can also be used for emulation.2011-09-01
20110214029SYSTEM AND METHOD FOR MULTI-DIMENSIONAL DECODING - A system and method for soft decoding data. A plurality of candidate error corrections may be generated to correct one or more data bits having soft bit information. Each candidate error correction may define suggested changes to the data bits and is associated with a soft bit value. The soft bit values associated the plurality of candidate error corrections may be mapped to a uniform scale, for example, a uniform finite or integer grid. The plurality of candidate error corrections may be ordered to have combined associated mapped values in a monotonically non-decreasing order. One or more of the plurality of candidate error corrections may be soft decoded in the order of the associated mapped values by a decoding operation for each candidate error correction therein with the associated non-mapped soft bit values.2011-09-01
20110214030Wireless Synchronized Movement Monitoring Apparatus and System - Disclosed embodiments include a movement monitoring apparatus comprising a wireless synchronization scheme. Depending on the particular embodiment such wireless synchronization scheme is a master synchronization scheme or a mesh synchronization scheme. Additionally, in a particular embodiment, the movement monitor further comprises a robust wireless data transfer data controller. The disclosure includes a description of the complete system, namely, the wireless synchronized movement monitors with robust data transfer capabilities, the docking station, the access point, and the computer-implemented analysis system.2011-09-01
20110214031ERROR CORRECTION DECODER, ERROR CORRECTION VALUE GENERATOR, AND ERROR CORRECTION SYSTEM - An error correction decoder includes a syndrome generator and an error correction value generator. The syndrome generator is operable to generate a plurality of syndromes based upon a received signal generated according to a generator polynomial. The error correction value generator is operable to generate a plurality of product values. Each of the product values is generated for one of the syndromes based upon a respective power of the roots of the generator polynomial. The respective power is determined based upon a respective index corresponding to one of the syndromes to be considered and unit positions of the received signal. The error correction value generator is further operable to generate an error correction value according to the product values, and to provide an error correcting device coupled thereto with the error correction value for correcting an error of the received signal.2011-09-01
20110214032DATA TRANSMISSION METHOD, DATA RECEPTION METHOD, MOBILE TERMINAL AND RADIO COMMUNICATION SYSTEM - A data transmission method according to the present invention includes the steps of: (A) adding a first CRC code to transmission data; (B) dividing the transmission data to which the first CRC code has been added into a plurality of encoded bit sequences; (C) adding a second CRC code to at least one of the divided encoded bit sequences; (D) performing error correction encoding processing on the encoded bit sequences; and (E) transmitting the encoded bit sequences on which the error correction encoding processing has been performed. 2011-09-01
20110214033SEMICONDUCTOR MEMORY DEVICE - According to one embodiment, a semiconductor memory device includes semiconductor memory chips having writable storage regions in which data is written. The data has one or more pieces of first data, and one or more pieces of the first data includes second data. The device includes a determining unit that determines a prescribed number or fewer of semiconductor memory chips to which the first data is written; a write controller that writes the the first data and redundant information calculated from the second data and used for correcting an error in the second data into the writable storage regions in the determined semiconductor memory chips; and a storage unit that stores identification information and region specifying information associated with each other. The identification information associates the second data and the redundant information, and the region specifying information specifies the storage regions in the semiconductor memory chips to which the first data included in the second data and the redundant information are written.2011-09-01
20110214034SEMICONDUCTOR RECORDING DEVICE AND SEMICONDUCTOR RECORDING DEVICE CONTROL METHOD - A semiconductor recording device includes: flash memories including a plurality of physical blocks each including a plurality of pages; an external interface unit which receives data to be recorded on the flash memories; a first ECC generation unit which generates a first ECC code by adding parity data to the data; a data writing unit which records the data based on the first ECC code into the pages in the flash memories; and a page shuffling unit which controls assignment of a symbol of the first ECC code to the pages, and the page shuffling unit controls the assignment of the symbol of the first ECC code such that the symbol of the first ECC code is assigned to pages having at least two page numbers in the physical blocks included in a group.2011-09-01
20110214035Data Decoding Method and Apparatus and Receiver and Communication System Applying the Same - A receiver including a switch for switching output of a memory to one of paths according to content of the output. The memory stores information bits, first check bits and second check bits. The first check bits and second check bits are switched to one of the paths via a rate dematch apparatus to a decoder. The information bits are switched directly to the decoder.2011-09-01
20110214036DIGITAL TELEVISION TRANSMITTER/RECEIVER AND METHOD OF PROCESSING DATA IN DIGITAL TELEVISION TRANSMITTER/RECEIVER - A digital television (DTV) transmitter/receiver and a method of processing data in the DTV transmitter/receiver are disclosed. In the DTV transmitter, a pre-processor pre-processes the enhanced data by coding the enhanced data for forward error correction (FEC) and expanding the FEC-coded enhanced data. A data formatter generates enhanced data packets including the pre-processed enhanced data and inserts known data to at least one of the enhanced data packets. A first multiplexer multiplexes the enhanced data packets with main data packets including the main data. And, an RS encoder RS-codes the multiplexed main and enhanced data packets, the RS encoder adding systematic parity data to each main data packet and adding RS parity place holders to each enhanced data packet. Herein, the RS encoder may insert non-systematic RS parity data or null data into the RS parity place holders included in each enhanced data packet.2011-09-01
20110214037CODING DEVICE, DECODING DEVICE, CODING METHOD, DECODING METHOD, AND COMMUNICATION SYSTEM - Positions holding different bit values between a first code word, which is obtained by coding an information bit sequence based on a coding method utilizing quasi-cyclic codes, and a second code word, which has the close Hamming distance from the first code word and satisfies a parity check of the coding method, are identified. Thereafter, a code word is generated by inserting bit values known to the transmitter and receiver into the identified positions of the information bit sequence and coding the information bit sequence. Upon reception of a signal based on the generated code word, the receiver judges whether known bit values held by corresponding positions in a code word obtained by decoding the received signal are the same as preset bit values. If the judgment result is negative, the code word based on the received signal is judges as erroneous even when it satisfies the parity check.2011-09-01
20110214038Methods and Systems for Rapid Error Correction of Reed-Solomon Codes - An encoder creates an (p,k,n) n-state codeword with p n-state symbols of which k n-state symbols are data symbols, an n-state symbol being represented by a signal with n>2, p>2 and k>(p−k). Intermediate states of an encoder in forward and in reverse direction are provided in a comparative n-state expression and implemented on a processor. A plurality of signals representing a codeword with at least one n-state symbol in error is processed by the processor by evaluating the comparative n-state expression. A partial result of an expression is determined after a symbol has been received. An error location and an error magnitude are determined. The error is corrected by the processor.2011-09-01
20110214039SYSTEM AND METHOD FOR MULTI-DIMENSIONAL DECODING - A system and method for decoding data. Multi-dimensional encoded data may be received that potentially has errors. The multi-dimensional encoded data may encode each input bit in a set of input bits multiple times in multiple different dimensions to generate encoded bits. The encoded bits may be decoded in at least one of the multiple dimensions. If one or more errors are detected in a plurality of encoded bits in the at least one of the multiple dimensions, an intersection sub-set of the encoded data may be decoded that includes data encoding the same input bits encoded by the plurality of encoded bits in at least a second dimension of the multiple dimensions. The values of the input bits by decoding the intersection sub-set may be changed.2011-09-01
20110214040Method and System For Cyclic Redundancy Check - The present disclosure describes a method, performed by a data processor comprising a cyclic redundancy check (CRC) module configured for calculating CRC remainders for encoded data and a comparator comprising a shift register, for making a cyclic redundancy check of an encoded data record of bit length L, in which at least A bits of the record represent content data and at least B bits represent check data. A system for performing a cyclic redundancy check is also described.2011-09-01
20110214041Method For Transferring A Number Of Medical Image Data Records And System For Managing Image Data Records - A method is disclosed for transferring a number of medical image data records from a first computation facility to a second computation facility, with the second computation facility sending a transmission confirmation to the first computation facility after transmission is completed. In at least one embodiment, before the image data records are transmitted, a first checksum is determined for all the image data records and sent with the image data records; the first checksum is extracted at the second computation facility and is compared with a second checksum determined from the transmitted image data records in the same manner as the first checksum; and the transmission confirmation indicates a failure if the checksums do not correspond.2011-09-01
20110214042DETECTION OF POTENTIAL NEED TO USE A LARGER DATA FORMAT IN PERFORMING FLOATING POINT OPERATIONS - Detection of whether a result of a floating point operation is safe. Characteristics of the result are examined to determine whether the result is safe or potentially unsafe, as defined by the user. An instruction is provided to facilitate detection of safe or potentially unsafe results.2011-09-01
20110214043HIGH INTEGRITY DATA BUS FAULT DETECTION USING MULTIPLE SIGNAL COMPONENTS - Methods and apparatus are provided for verifying the integrity of a signal transmitted across a multiple rail data bus. The method and apparatus provide for independently processing a signal by a first processor and a second processor, the first and second processors being connected in parallel thereby generating a first processed signal and a second processed signal. Each of the processed signals is split into a first component sequence and a second component sequence, the first component sequences being different from the second component sequences. It is then determined that the first component sequences are not identical and that the second component sequences are not identical. If either of the first component sequences is not identical, or if either of the second component sequences is not identical, then an error signal is transmitted to a receiving device via a first or second rail of the bus.2011-09-01
20110214044Methods and Arrangements Relating to Signal Rich Art - Art is infused with network identifiers at the time of its creation, rather than as a post-process. The identifiers may be encoded as overt elements of the art, and enable the artist to reprogram—over time—an augmentation of the artwork experience via network-delivered components. These network components can include stimuli present when the artist created the work (e.g., music), commentary by the artist, video and augmented reality features, audience-crowdsourced content (e.g., imagery of, or feedback provided by, other viewers encountering the artwork), etc. The artwork augmentation can vary with the user's context (e.g., location, demographics, interests, history). Physical brushes can be equipped to insert such identifiers in graphic arts; other authoring tools are disclosed as well. The network experience can be delivered via smartphones, projectors, and other devices. A great number of other features and arrangements are also detailed.2011-09-01
20110214045SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM FOR CREATING A VIDEO CLIP - The present invention provides a system, method, and computer readable medium for creating a video clip. In one embodiment, a method, comprising creating a copy of a still image by a first module, the copy of the still image comprising reduced dimensions of the still image, creating a new still image from a selected area of the still image, automatically ordering the new still image and the copy of the still image, creating an audio file by at least one of a second module and a third module, creating a timeline, by the first module, related to the ordered images and the created audio file, and rendering the timeline into a video clip by a fourth module, wherein the timeline includes a length of the audio file, a length of the video clip, the ordered images, a display time of each of the ordered images, transition identifiers, transition lengths. The present invention further discloses a system for assembling and distributing multi-media output, comprising: a rendering server; a web server; and storage, wherein the servers and the storage are operably coupled; the storage adapted to receive digital media and properties of the media, store the media and the properties, and transmit the media and the properties; the web server adapted to perform at least one of a following action: retrieve the media and properties of the media; manipulate the media and the properties; assemble the properties; and transmit at least one of a following element from a group consisting of: the properties; and the assembled properties; and the rendering server adapted to receive commands from the web server.2011-09-01
20110214046Template Creation and Editing for a Message Campaign - A system and method for dynamically creating individualized, multi-media messages and to deliver the messages to specific target groups or individual viewers. A message, story, or advertisement is assembled on demand, based upon rules applied to each viewer's profile and a library of media segments. The framework for the final personalized message is a story or message template designed for a campaign. A set of viewer profiles is assembled from designated databases for each of the targeted entities. A collection of media segments is also created or selected and then made available to produce the final personalized message at assembly time. Specific media segments are selected and merged according to the message template and information about the viewer derived from each viewer's profile. The information from the viewer profile is interpreted by a rule system to determine which of several potential media segments to select for use in the personalized message. The merged composite is then encoded to match the distribution media and forwarded to the viewer.2011-09-01
20110214047STRATEGIES FOR ANNOTATING DIGITAL MAPS - A strategy is described for annotating a digital map. According to one exemplary aspect, the user can link a single uploaded object to multiple locations within a map (or maps) without requiring separate uploading and storing operations. According to another exemplary aspect, the user can specify a range of zoom levels in which an object is made visible on the map. According to another exemplary aspect, the user can instruct map processing functionality (MPF) to automatically extract objects from a data source (such as an RSS data source) and annotate the map with the objects. Still further aspects are described.2011-09-01
20110214048METHOD AND SYSTEM FOR AUTOMATIC DATA AGGREGATION - A system for automatic data aggregation comprises a communications module to receive an electronic form comprising field data and a detector to detect a workflow identifier indicating that the electronic form is to be included as a new record in an aggregate package. The system further comprises an aggregator to associate electronic form data with an aggregate package in response to the detected workflow identifier.2011-09-01
20110214049METHOD FOR AUTOMATED PERMUTATION OF COMPUTERIZED LISTS OF TEXT DATA OBJECTS WITH SELECTED COLUMNS OF IMAGED PARAMETRIC DATA EXCLUDED FROM SORTING - A method for a computer generated data table of parametric text data objects to be permuted based on automated sorting of a lesser number of parameters than are imaged on the data table.2011-09-01
20110214050VIRTUAL SYSTEMS FOR SPATIAL ORGANIZATION, NAVIGATION, AND PRESENTATION OF INFORMATION - Organizing information around a specific spatial domain facilitates managing objects presented in visualization layers of the spatial domain. A first portion of a first program for organizing and mapping information around a specific spatial domain is executed by a first virtual system that is created in a program execution environment operable on a network server. In response to the first virtual system invoking a continuation, a second virtual system is created to execute a second portion of the first program. Invoking the continuation in the program execution environment facilitates each of the first and second virtual systems providing only the capabilities necessary to execute their respective portion of the first program. Optionally, executing the first program includes interpreting the first program with a second program.2011-09-01
20110214051METHODS AND APPARATUS TO SUBSCRIBE FOR CHANGE NOTIFICATIONS IN A DOCUMENT MANAGEMENT SYSTEM - Methods and apparatus to subscribe for change notifications in a document management system are disclosed. An example method performed at a subscription proxy to notify a principal of a change to an extensible markup language (XML) document disclosed herein comprises extracting information from an XML document command protocol (XDCP) request received from an XML document management client (XDMC) used by the principal, mapping at least some of the information which was extracted to one or more corresponding parameters of a session initiation protocol (SIP) SUBSCRIBE request, and sending the SIP SUBSCRIBE request to an XML document management server (XDMS) to generate a subscription to notifications regarding changes to the XML document, the XML document being managed by the XDMS.2011-09-01
20110214052Method, System and Computer Readable Medium for Addressing Handling from a Computer Program - A method, system and computer readable medium for providing for providing a function item, such as a key, button, icon, or menu, tied to a user operation in a computer, whereby a single click on the function item in a window or program on a computer screen, or one single selection in a menu in a program, initiates retrieval of name and addresses and/or other person or company related information, while the user works simultaneously in another program, e.g., a word processor. The click on the function item initiates a program connected to the button to search a database or file available on or through the computer, containing the person, company or address related data, in order to look up data corresponding to what the user types, or partly typed, e.g., name and/or address in the word processor, the correct data from the database, data related to the typed data, e.g., the name of the person, company, or the traditional or electronic address, or other person, or company, or address related data, and alternatively the persons, companies, or addresses, are displayed and possibly entered into the word processor, if such related data exists.2011-09-01
20110214053Assisting Input From a Keyboard - Assisting input from a keyboard is described. In an embodiment, a processor receives a plurality of key-presses from the keyboard comprising alphanumeric data for input to application software executed at the processor. The processor analyzes the plurality of key-presses to detect at least one predefined typing pattern, and, in response, controls a display device to display a representation of at least a portion of the keyboard in association with a user interface of the application software. In another embodiment, a computer device has a keyboard and at least one sensor arranged to monitor at least a subset of keys on the keyboard, and detect an object within a predefined distance of a selected key prior to activation of the selected key. The processor then controls the display device to display a representation of a portion of the keyboard comprising the selected key.2011-09-01
20110214054VIEWING POINT FOR A COMPOSITION WITH MULTIPLE LAYERS - A position of a viewing point within a plurality of layers of a composition is received. Of the plurality of layers, at least a layer that is immediately adjacent to the viewing point is displayed. Those layers, if any, that are on the opposite side of the viewing point as the displayed layer(s) are not displayed.2011-09-01
20110214055Systems and Methods for Using Structured Libraries of Gestures on Multi-Touch Clinical Systems - Systems, methods and computer-readable storage mediums encoded with instructions for providing touch-driven controls in a clinical setting are provided. Certain embodiments provide a system that includes a clinical system and a customizable structured library of functions. The structured library can include a function associated with a clinical context. The function can be associated with a user input requiring the use of a touch driven interface with multi-touch gestures. The user input can provide for immediate execution of the associated function. The structured library can be loaded onto the clinical system as a driver such that the function is made available based on the associated clinical context. Certain embodiments can include a user interface configured to allow a user to add or delete a function or modify the user input associated with a function. Certain embodiments can include a user interface that provides instruction as to using a function.2011-09-01
20110214056Accessory Protocol For Touch Screen Device Accessibility - Techniques for controlling a touch input device using an accessory communicatively coupled to the device are disclosed. In one aspect, an accessibility framework is launched on the device. An accessory coupled to the device is detected. Receipt of input from the accessory is enabled. An accessibility packet is received from the accessory. The accessibility packet includes an accessibility command and one or more parameters. The accessibility packet is processed to extract the first accessibility command and the one or more parameters. Input is generated for the accessibility framework based on the accessibility command and the one or more parameters. In some implementations, the device also sends accessibility commands to the accessory, either in response to accessibility commands received from the accessory or independent of any received accessibility commands.2011-09-01
20110214057INPUT APPARATUS AND STORAGE MEDIUM STORING INPUT CONTROL PROGRAM - An input apparatus including: a display device on which at least one operational image is displayed; a selected image determining section which determines, as a selected image, an operational image displayed at a position designated by an input operation; and a display updating section which updates a display from a first operational screen to a second operational screen where a display update condition has been satisfied, and which includes: a position specifying section which, where the input operation has been performed or expected to be performed within a period after the satisfaction of the display update condition and before the update, specify one of positions designated by the input operation and expected to be designated by the input operation; and an image arranging section which arranges the at least one operational image on the second operational screen after the update so as to avoid the specified position.2011-09-01
20110214058SESSION CLASSES FOR PROCESS AUTOMATION - A script including a plurality of actions to process in a session associated with a system is generated via a user interface, where the script includes both actions and metaactions. The actions correspond to commands associated with the session to be executed on the system, and the metaactions correspond to a selected plurality of the commands. The script is generated by receiving the actions and the metaactions to process on the system via the user interface associated with the session for interfacing with the system, capturing the actions and the metaactions, and saving the captured actions and metaactions to generate the script.2011-09-01
20110214059Media Distribution in a Content Delivery Network - A control board residing in a content delivery network interacts with a canvas display on a client device. The canvas displays a plurality of user-selectable client devices and a plurality of user-selectable media resources. The control board comprises a media routing module that is responsive to the client-device canvas for displaying available media resources for each of the client devices. The control board also comprises a media rendering module that is responsive to a user's selection of at least one client device and at least one media resource for providing device-specific configuring of the selected media resource. The control board may comprise a canvas display module responsive to at least one of the media routing module, the media rendering module, and the canvas for configuring the canvas display.2011-09-01
20110214060MOBILE ENERGY MANAGEMENT SYSTEM - According to an aspect of the disclosure, a mobile energy management system and method includes controlling at least one network device at a site using the proximity detection of a mobile device which may be based upon the detection of a plurality of zones. Various features may be presented on a graphical user interface of the mobile device including a proximity control feature for enabling and disabling proximity detection, a set location setting for associating the current location of the mobile device with the location of the site, a set travel distance feature enabling the user to enter a travel distance within the graphical user interface, and a map which may present the location of the site, the current location of the mobile device, and the plurality of zones. The network device may be a thermostat associated with the HVAC system of the site or other energy consuming appliances.2011-09-01
20110214061User Interface for Managing Client Devices - In a content delivery network, a client-side graphical user interface displays a plurality of media widgets associated with a plurality of user-selectable media channels and a plurality of device widgets associated with a plurality of user-selectable client devices. A user control is configurable for interacting with the media widgets and the device widgets, and enables a user to move a presentation of a selected media channel from a first client device to at least a second client device. A media channel processor configures the selected media channel for presentation on the client devices.2011-09-01
20110214062SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR USER REGISTRATION WITH A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for user registration with a multi-tenant on-demand database system. These mechanisms and methods for user registration with a multi-tenant on-demand database system can provide user registration of the multi-tenant on-demand database system which takes into consideration a registration of an associated tenant of the multi-tenant on-demand database system. The ability to consider a tenant's registration with the multi-tenant on-demand database system when registering a user with the multi-tenant on--demand database system can improve the management of permissions associated with of the multi-tenant on-demand database system.2011-09-01
20110214063EFFICIENT NAVIGATION OF AND INTERACTION WITH A REMOTED DESKTOP THAT IS LARGER THAN THE LOCAL SCREEN - Techniques are disclosed for the efficient navigation of and interaction with a remoted desktop that is larger than the local viewing area. In an embodiment, a client displays both a portion of the remoted desktop in its native size, as well as a “mini-map”—a scaled-down view of the entire remoted desktop that may be used for navigation of the natively displayed portion of the remoted desktop. In an embodiment, the natively displayed portion of the remoted desktop is indicated in the mini-map. In an embodiment, use of a computer mouse and/or multi-touch gestures is used as input to navigate the natively displayed portion of the remoted desktop.2011-09-01
20110214064SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING ONE OR MORE DATA SETS TO A USER - In accordance with embodiments, there are provided mechanisms and methods for displaying one or more data sets to a user. These mechanisms and methods for displaying one or more data sets to a user can enable enhanced data security, more relevant data display, reduced processing, etc.2011-09-01
20110214065Management of Hierarchical Reference Data - There are methods and apparatus, including computer program products, for managing hierarchical reference data. There is a Web page for access by a user, where the Web page includes (i) data representing a hierarchy and (ii) rules defining modifications that are permitted to be made to data. The user is enabled to make a real-time modification to the data based on the rules.2011-09-01
20110214066Integration of active interest information with an address book - A system, method, and apparatus for integrating active interest information with an address book are provided. Active interest information is indicative of a current or ongoing interest of a first user and may be generated based on use of an application client by the first user. The active interest information is used to update an active interest field in a contact record describing the first user in an address book associated with a second user. The contact record may be updated by an address book client or a converged address book server. Provided is a converged address book server that manages the sharing and updating of active interest information and address books. The active interest information may also be updated using a personal contact card associated with the first user. Also provided is a method and apparatus for prompting communication between contacts based on active interest information.2011-09-01
20110214067METHOD AND SYSTEM FOR PROVIDING AN ADAPTIVE INPUT USER INTERFACE FOR DATA ENTRY APPLICATIONS - Embodiments are described for a system and method for adapting an online user input form that provides user input to a web-based application. A method comprises defining one or more attributes related to one or more fields of the online user input form, obtaining historical data comprising past user input to related user input forms, calculating historical most common values for each attribute of the one or more attributes; and modifying the one or more fields of the online user input form in accordance with the calculated historical average values. The attributes may include at least one of the size, location, and datatype of each field of the form. The method may be implemented through an application programming interface for implementation through server-side and client-side processes that are written in a web-browser compatible markup language.2011-09-01
20110214068POLL-BASED NETWORKING SYSTEM - Described is a poll-based networking system. The system provides an on-line network of friends that are determined through polling each of the users. This system polls a user with a variety of questions. After providing an answer to each question, the system compares, in real-time, the current user's responses with all other users' responses to identify those users that most similarly answered the questions to that of the current user. As the current user progressively answers additional questions, the system progressively updates the matching and presentation of similar users. As such, as the current user navigates the website by answering polling questions, the selected answers are compared against the selected answers of other users to generate a likelihood of match between the user and each of the other users. The user profiles of other users that have a likelihood of match within a predetermined threshold are then presented.2011-09-01
20110214069Presenting messages through a channel of a non-communication productivity application interface - A computationally implemented method includes, but is not limited to: providing at least to one or more associated end users from a group of associated end users a non-communication (NC) productivity application interface including a channel for accessing messages; and presenting to the one or more associated end users, via the channel, at least a first one or more messages and a second one or more messages, the first one or more messages being associated with the group of associated end users and the second one or more messages being independent of the group of associated end users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.2011-09-01
Website © 2022 Advameg, Inc.