45th week of 2014 patent applcation highlights part 54 |
Patent application number | Title | Published |
20140331040 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys. | 2014-11-06 |
20140331041 | METHOD AND SYSTEM FOR SIGNING AND AUTHENTICATING ELECTRONIC DOCUMENTS VIA A SIGNATURE AUTHORITY WHICH MAY ACT IN CONCERT WITH SOFTWARE CONTROLLED BY THE SIGNER - A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act in cooperation with trusted components controlled and operated by the signer. The system employs a presentation authority for presenting an unsigned copy of an electronic document to a signing party and a signature authority for controlling a process for affixing an electronic signature to the unsigned document to create a signed electronic document. The system provides an applet for a signing party's computer that communicates with the signature authority. | 2014-11-06 |
20140331042 | APPARATUS AND METHOD FOR PROVIDING SEMANTICALLY AWARE NETWORK SERVICES - A method and apparatus where network-layer devices use host-provided, detailed, per-packet, semantic information (DPPS information), which describes the content, meaning, importance, and/or other attributes of particular application data and is associated with each packet, to provide enhanced network services. In some embodiments of the above method, network-layer devices use DPPS information that includes QoS-related information to provide fine-grained, content-aware, and/or complex QoS assurances or similar services. In some embodiments, network-layer devices use DPPS information to provide network-based, application-protocol-independent, rate-adaptation services. In some embodiments, network-layer devices use DPPS information to provide highly efficient, application-protocol-independent, publish/subscribe dissemination services. | 2014-11-06 |
20140331043 | ELECTRO DEVICE FOR PROTECTING USER'S PRIVACY AND METHOD FOR CONTROLLING THEREOF - A method of controlling a first electronic device to acquire content in cooperation with a second electronic device is provided. The method includes performing a mutual authorization, acquiring content, generating an encryption key based on a first personal key and a second public key of the first electronic device, encrypting the content based on the encryption key, and storing the encrypted content. | 2014-11-06 |
20140331044 | SECURE SEARCH METHOD AND SECURE SEARCH DEVICE - In search that uses searchable code, the search query and the secure index is collated in round-robins fashion, registering the required secure index and a characteristic quantity of deposited data in a database server to realize the searchable code. The server uses the characteristic quantity to perform clustering on the secure index. For search, collation is first performed only for representative data of a cluster. For a hit, the collation priority is raised for all the data included in the cluster. When there is no hit, the priority is lowered. After calculating the priority, collation is performed sequentially for all the data on the basis of the priority. | 2014-11-06 |
20140331045 | APPARATUS, SYSTEM AND METHOD OF COMMUNICATING LOCATION-ENABLING INFORMATION FOR LOCATION ESTIMATION - Some demonstrative embodiments include apparatuses, systems and/or methods of communicating location-enabling information for location estimation. For example, an apparatus may include a location-enabling information (LEI) processor to process a location-enabling message, which is transmitted between first and second location-enabling sources and receivable by a mobile device, the location-enabling message including encrypted LEI configured for enabling estimation of a location of the mobile device at a predefined accuracy based on a cryptographic key corresponding to the first location-enabling source. | 2014-11-06 |
20140331046 | VIRTUAL DESKTOP ACCELERATOR WITH SUPPORT FOR MULTIPLE CRYPTOGRAPHIC CONTEXTS - In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol. | 2014-11-06 |
20140331047 | SYSTEM AND METHOD FOR ENCRYPTING TRAFFIC ON A NETWORK - According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a first network element and a second network element by: acquiring an encryption seed at the first network element, the encryption seed being substantially similar to a decryption seed at the second network element; generating at least one encryption key from the encryption seed; receiving data; encrypting the data using the encryption key to generate encrypted data; transmitting the encrypted data from the first network element to the second network element via a network; and updating the encryption seed at the first network element in response to an event trigger | 2014-11-06 |
20140331048 | METHOD AND APPARATUS FOR MONITORING TRANSMISSION CHARACTERISTICS IN A NETWORK - A method for monitoring transmission characteristics in a network including a media client, a media server, and a data processor, the method including establishing a connection with the data processor; establishing an end-to-end encrypted channel between the media client and the data processor for exchanging streaming media content over the connection; sending a probing message to the data processor over the channel, the probing message carrying a first timestamp indicating the sending time of the probing message; receiving a response to all of the probing message from the data processor, the response carrying a second timestamp indicating the arrival time of the probing message at the data processor; and deriving latency information, including an upstream latency between the media client and the data processor, from a difference between the second timestamp and the first timestamp. | 2014-11-06 |
20140331049 | Secure Shell Authentication - A first information handling system receives a security challenge and forwards it to a second information handling system. The second information handling system retrieves a private key from a public/private encryption key pair and satisfies the challenge with the private key. The second information handling system forwards the satisfied challenge without divulging the private key. The second information handling system is in a more secure environment than the first information handling system. The challenge may be satisfied by signing the challenge with the private key. Satisfying the challenge may be a step in creating a secure shell connection between the first information handling system and an organization maintaining the first information handling system and the second information handling system. | 2014-11-06 |
20140331050 | QKD KEY MANAGEMENT SYSTEM - A system for securely moving data from one location to another exchanges key material between the locations. The system enables cryptosystems to use key material distributed over a quantum channel. | 2014-11-06 |
20140331051 | LOCALIZED NETWORK AUTHENTICATION AND SECURITY USING TAMPER-RESISTANT KEYS - The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two. | 2014-11-06 |
20140331052 | COMMUNICATING AN IDENTITY OF A GROUP SHARED SECRET TO A SERVER - An identity is communicated by a client device to a server without requiring the identity to be disclosed to eavesdroppers and without requiring the use of symmetric or asymmetric cryptography. In one example, the identity is an identity of the client device, where the identity has been assigned to the client device by the server through the provisioning of a unique subset of client-identifying keys. In another example, the identity is an identity of a group shared secret that has been provisioned by the server to the client device. | 2014-11-06 |
20140331053 | TRANSMISSION METHOD AND SYSTEM FOR TERMINAL UNIQUE INFORMATION - A terminal unique information transmission method including: receiving, by a server, from a terminal, a terminal unique information acquisition request including a terminal unique public key certificate of the terminal; generating an encrypted terminal unique public key certificate by encrypting the terminal unique public key certificate of the terminal; checking, by the server, whether the generated encrypted terminal unique public key certificate is described in a discarded terminal information table; and transmitting, by the server, when the generated encrypted terminal unique public key certificate is not described in the discarded terminal information table, a terminal unique information of the terminal to the terminal. | 2014-11-06 |
20140331054 | VIRTUAL DESKTOP ACCELERATOR WITH ENHANCED BANDWIDTH USAGE - In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network. | 2014-11-06 |
20140331055 | SYSTEM AND METHOD FOR INTERAPPLICATION COMMUNICATIONS - A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program requests to exchange information with the second executable program, using the second executable program to challenge the first executable program for a digital certificate, and using the second executable program to exchange information with the first executable program when the digital certificate is verified. | 2014-11-06 |
20140331056 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing system comprising interface circuitry configured to receive message-independent information, the message-independent information having been generated by another apparatus and transferred to the interface in advance of a digital signature being generated, send message-dependent information to an external device, and receive a digital signature from the external device; and processing circuitry configured to generate the message-dependent information from a message and at least a part of the message-independent information, and associate the digital signature with the message. | 2014-11-06 |
20140331057 | METHOD AND SYSTEM FOR PROCESSOR OR WEB LOGON - A system is for a proof of knowledge enrollment or authentication. The system includes a processor having an input, an output and a routine; and a display having an image from the output of the processor. The routine is structured to input from the input of the processor a plurality of different position selections and/or a plurality of different path selections on the image. The routine is further structured to authenticate the proof of knowledge as a function of the plurality of different position selections and/or the plurality of different path selections on the image. | 2014-11-06 |
20140331058 | ENCAPSULATED SECURITY TOKENS FOR ELECTRONIC TRANSACTIONS - Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties. The encapsulation and subsequent de-encapsulation can utilize cryptographic systems of the parties that involve a private key for signing and decryption and a public key for encryption and signature verification. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified. | 2014-11-06 |
20140331059 | Method and System for Authenticating Biometric Data - A method for authenticating biometric data determines a first set of descriptors of a fingerprint. Each descriptor in the first set represents a region of the fingerprint that includes multiple minutiae. The method compares each descriptor in the first set of descriptors with each descriptor in a second set of descriptors to determine a number of matching descriptors and compares the number of matching descriptors with a threshold for authenticating the biometric data. | 2014-11-06 |
20140331060 | User and Device Authentication in Enterprise Systems - Methods and systems for authenticating users of client devices to allow access of resources and services in enterprise systems are described herein. An authentication device may validate a user based on authentication credentials received from a client device. Validation data stored by the authentication device, and a corresponding access token transmitted to the client device, may be used to authenticate the user for future resource access requests. A user secret also may be stored by the authentication device and used to validate the user for future resource access requests. Additionally, after validating a user with a first set of authentication credentials, additional sets of credentials for the user may be retrieved and stored at an access gateway for future requests to access other services or resources in an enterprise system. | 2014-11-06 |
20140331061 | DRIVE LEVEL ENCRYPTION KEY MANAGEMENT IN A DISTRIBUTED STORAGE SYSTEM - Disclosed are systems, computer-readable mediums, and methods for receiving an input/output operation regarding data associated with a distributed storage system that includes a plurality of storage devices. A key identifier associated with the I/O operation is determined. The key identifier identifies a key that has been divided into a number of key pieces. Two or more storage devices of the plurality of storage devices that contain one or more of the key pieces are determined and at least a threshold number of key pieces are requested from the two or more storage devices. The minimum number of key pieces needed to reconstruct the key is the threshold number. The key is reconstructed from the requested key pieces. A cryptographic function is performed on data associated with the I/O operation using the reconstructed key and the I/O operation is completed based upon the performed cryptographic function. | 2014-11-06 |
20140331062 | SYSTEM AND APPARATUS FOR SECURELY STORING DATA - Certain aspects of the invention pertain to the field of networked computing, and in particular to the field of data file security. Methods, systems and apparatuses are disclosed for encrypting and decrypting data stored and shared on networked data file storage devices such that the data may be accessed and manipulated by multiple users. | 2014-11-06 |
20140331063 | Disrupting Password Attack Using Compression - Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using a Huffman compression algorithm, and may be subsequently encrypted using a short secret as a key. The user password may be stored as the compressed and encrypted key. The compressed and encrypted password may be stored such that a brute force password attack, for example, using every possible short secret, would reveal too may possible matches to allow an attacker to select the real password. | 2014-11-06 |
20140331064 | KEY REVOCATION IN SYSTEM ON CHIP DEVICES - Methods and apparatus relating to key revocation in system on chip (also referred to as SOC or SoC) devices are described. In an embodiment, a storage device stores an identifier of an Original Equipment Manufacturer (OEM) and key versioning information corresponding to the OEM. At least a portion of the storage device is updated by a security engine in response to a determination that a first OEM key has been replaced with a second OEM key. Other embodiments are also claimed and described. | 2014-11-06 |
20140331065 | SECURING A DATA SEGMENT FOR STORAGE - A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and performing a deterministic function on the encrypted data to produce a transformed representation of the encrypted data. The method continues with the DS processing module masking the encryption key utilizing the transformed representation of the encrypted data to produce a masked key, partitioning the masked key into a plurality masked key partitions, partitioning the encrypted data segment into a plurality of encrypted data segment partitions, and combining the plurality of masked key partitions with the plurality of encrypted data segment partitions to produce a plurality of combined partitions. For a combined partition of the plurality of combined partitions, the method continues with the DS processing module encoding the combined partition using a dispersed storage error coding function to produce a set of encoded data slices. | 2014-11-06 |
20140331066 | RECTIFIER CIRCUIT AND POWERED DEVICE - A powered device is electronically connected to a power sourcing equipment, and includes a powered circuit, a receiving unit and at least one rectifier circuit. Each rectifier circuit includes a rectifier unit, an auxiliary power unit, a polarity determining unit, a control unit and a selecting unit. The rectifier unit provides a current flow between the receiving unit and the powered circuit. The auxiliary power unit provides an auxiliary power signal. The polarity determining unit detects the polarity of voltage signal, to generate a determining signal. The control unit outputs a control signal according to the auxiliary power signal and the determining signal. The selecting unit connects the positive input of the powered circuit to a receiving end whose output voltage is positive according to the control signal, to lower power of rectification. A rectifier circuit is also provided. | 2014-11-06 |
20140331067 | PORTABLE ELECTRONIC DEVICE - A portable electronic device is provided. The portable electronic device includes a host, a power adapter and a signal transmission interface. The host generates state information according to present operating state, and the power adapter is used to provide a voltage to the host. The power adapter receives the state information of the host via the signal transmission interface, and adjusts the output voltage according to the state information. By transmitting information between the host and the power adapter, the power adapter can be adjusted according to the operating state of the host. Moreover, the host can adjust the operating state according to the specification information of the power adapter. Consequently, the power consuming of the portable electronic device has best efficiency thus to reduce carbon emission. | 2014-11-06 |
20140331068 | SYSTEM AND METHOD FOR MANAGING POWER SUPPLY UNITS - A system for controlling a plurality of power supply units to provide power to a server, includes a priority level definition module and a control module. The priority level definition module defines priority level for each one of the plurality of power supply units. The control module prior power on part of plurality of power supply units, which have high level priority, to provide power to the server. | 2014-11-06 |
20140331069 | POWER MANAGEMENT FOR MULTIPLE COMPUTE UNITS - An interface couples a plurality of compute units to a power management controller. The interface conveys a power report for the plurality of compute units to the power management controller. The power management controller receives the power report, determines a power action for the plurality of compute units based at least in part on the power report, and transmits a message specifying the power action through the interface. The power action is performed. | 2014-11-06 |
20140331070 | DYNAMICALLY ADJUSTING POWER DISTURBANCE HOLD UP TIMES - Power line disturbance hold up times are dynamically adjusted prior to the commencement of the power disturbance failover based on battery capacity of batteries in racks of the storage system as the batteries either fail, are repaired, or are added to the storage system having at least one uninterruptible power supply (UPS). | 2014-11-06 |
20140331071 | SYSTEMS, METHODS AND DEVICES FOR CONTROL OF THE OPERATION OF DATA STORAGE DEVICES USING SOLID-STATE MEMORY - A variety of data storage devices, methods and systems are implemented for control of memory associated with backup functionality. One such data storage device includes a power circuit that provides main power. The data storage device has a first solid-state memory circuit that maintains data in the absence of electrical power. A second memory circuit is subject to data loss in the absence of electrical power. A storage circuit stores energy and provides the stored energy to the second memory circuit in response to a loss of main power. A test circuit discharges a portion of the stored energy to provide output data indicative of power-providing capabilities of the storage circuit. A memory controller controls data transfers to the data storage device by temporarily storing data destined for the first solid-state memory circuit and setting the amount of memory available for temporary storage in response to the output data. | 2014-11-06 |
20140331072 | MULTIPLE-SPEED INTERFACE - The present invention provides a security module having a communication interface being capable of operating according to any from a selection from a plurality of predetermined operation modes or communication protocols. The security module further comprises a voltage detector to detect the voltage on the module's power supply connection. Depending on the value of the detected voltage or to which of a plurality of predetermined voltage ranges the detected voltage may be categorized, the security module is made to function according to one from the plurality of predetermined communication protocols. According to an embodiment of the present invention the plurality of communication protocols require that the security module operate at a plurality of different frequencies | 2014-11-06 |
20140331073 | SYSTEM AND METHOD FOR EFFICIENT SERVICE-INSTANCE ORIENTED ENERGY MANAGEMENT IN THE INTERNET OF THINGS - A system and a method for efficient service-instance oriented energy management in the IoT are provided. The method comprises: a predicting step for predicting target service instances to be serviced in a subsequent time period based on a service instance stance transition model; a selecting step for selecting an ON-sensor set to be turned on to provide services on which said target service instances are based, according to a critical covering set corresponding to the target service instances, the use history data of sensors in the critical covering set and energy parameters of said sensors; a controlling step for performing, when said time period begins, an ON/OFF control on the sensors in the IoT so that the sensors in the ON-sensor set are turned on and the sensors other than those in the ON-sensor set are turned off; and an updating step for updating the use history data of sensors according to the usage of sensors in said time period. | 2014-11-06 |
20140331074 | TIME DIVISION MULTIPLEXED MULTIPORT MEMORY IMPLEMENTED USING SINGLE-PORT MEMORY ELEMENTS - Integrated circuits having single-port memory elements may be provided. The single-port memory elements may be controlled using a control circuit to emulate multiport functionality. In one suitable embodiment, the control circuit may be an arbitration circuit configured to execute a memory request as soon as it is received by the arbitration circuit. Requests received while a current memory access is being performed may be put on hold until the current memory access has been completed. In another suitable embodiment, the control circuit may be a sequencing circuit configured to service memory access requests from a synchronous port and an asynchronous port. Memory access requests received at the synchronous port may be serviced immediately, whereas memory access requests received at the asynchronous port may be synchronized to an internal memory clock signal and may be serviced after a preceding memory access request associated with the synchronous port has been serviced. | 2014-11-06 |
20140331075 | TIME REFERENCE SYSTEMS FOR CPU-BASED AND OPTIONALLY FPGA-BASED SUBSYSTEMS - A time reference system includes a master clock, generating a clock reference, interface logic and a CPU-based subsystem. The interface logic receives the clock reference and generates the clock, pulses, and timestamp signals. The CPU-based subsystem includes an internal counter, a CPU and a clock synthesizer, the CPU and receiving the pulses and timestamp signals. The clock synthesizer receives the clock signal and generates a CPU clock signal. Some examples include an FPGA-based subsystem having an FPGA-based card coupled to the interface logic for receipt of the clock, pulses and timestamp signals. In a method the timestamp value TO is generated by the CPU upon receipt of the timestamp signal. Upon receipt by the CPU of the next pulse signal, a timestamp counter baseline value TSCO is generated so the CPU internal counter is calibrated to the clock signal. | 2014-11-06 |
20140331076 | ENCODER WITH ACCURACY CORRECTION FUNCTION - An encoder ( | 2014-11-06 |
20140331077 | NODE FAILURE MANAGEMENT - A method and computer-readable storage media are provided for managing resources of a first node. The method may include detecting a failure in a first node. The first node may include one or more cores and supporting resources. The method may further include determining that one or more cores in the first node survived the failure. The method may further include determining that any supporting resources survived the failure. The method may also include reconfiguring a second node to add the surviving supporting resources of the first node using communication interface between the first and second node if the determinations found a surviving core and surviving supporting resource in the first node. | 2014-11-06 |
20140331078 | Elastic Space-Based Architecture application system for a cloud computing environment - A software architecture and infrastructure to seamlessly scale mission-critical, high performance, stateful enterprise applications on any cloud environment (public as well as private). The described invention will allow converting an application to a scalable application and will provide a method and a system to efficiently scale up the performance of such an application based on space-based architecture. | 2014-11-06 |
20140331079 | Disable Restart Setting for AMF Configuration Components - A method and a system are provided for determining an AMF configuration of a highly available system with respect to whether to failover or restart a component when the component fails. The AMF configuration specifies at least two service-units containing components that represent resources, and a set of service-instances representing workload incurred by provision of services using the resources. The method identifies a failover duration and a restart duration for each component in a service-unit; and determines a failover outage and a restart outage for each service-instance impacted by a failure of a given component, based on the failover duration and the restart duration of each component in the service-unit. The method further determines whether to failover or to restart the given component if the given component fails, based on the failover outage and the restart outage of each service-instance impacted by the failure of the given component. | 2014-11-06 |
20140331080 | WARM STANDBY APPLIANCE - A warm standby appliance is described herein. The warm standby appliance is coupled to a storage server which is coupled to one or more servers. When a server fails, the storage server transfers a backed up image to the warm standby appliance, so that the warm standby appliance is able to replicate the failed server. While the failed server is inaccessible, the warm standby appliance is able to mimic the functionality of the failed server. When a new server or repaired server is available, the warm standby appliance is no longer needed. To incorporate the new server into the system quickly and easily, the server image of the warm standby appliance is sent to the new server. After transferring the image, the warm standby appliance is cleaned and returns back to a dormant state, waiting to be utilized again. | 2014-11-06 |
20140331081 | SCALABLE TRANSCODING FOR STREAMING AUDIO - Systems and techniques for capturing audio and delivering the audio in digital streaming media formats are disclosed. Several aspects of the systems and techniques operate in a cloud computing environment where computational power is allocated, utilized, and paid for entirely on demand. The systems and techniques enable a call to be made directly from a virtual machine out to a Public Switch Telephone Network (PSTN) via a common Session Interface Protocol (SIP) to PSTN Breakout service, and the audio to be delivered onward to one or more Content Delivery Network (CDN). An audio call capture interface is also provided to initiate and manage the digital streaming media formats. | 2014-11-06 |
20140331082 | RESTORING A FAILED STORAGE VOLUME AFTER REMOVAL OF A STORAGE DEVICE FROM AN ARRAY - A storage device is detected as being decoupled from an apparatus. At least one partition of the storage device is part of a storage volume that includes an array of separate storage devices in an initial configuration prior to being decoupled. In response to the storage device being recoupled to the apparatus, a universally unique identifier (UUID) of the storage device is detected. In response to determining the UUID of the storage device was previously associated with the storage volume, the storage volume is reconfigured/restored to include the at least one partition of the storage device in the initial configuration. | 2014-11-06 |
20140331083 | POLAR CODES FOR EFFICIENT ENCODING AND DECODING IN REDUNDANT DISK ARRAYS - An improved technique applies polar codes to storage data to improve the reliability of a storage system that uses high-performance, solid-state disks as part of a RAID group for storing frequently-accessed data. Along these lines, a high-performance storage system having n solid-state disks assigns k of those disks as payload disks. The storage system partitions the payload data into a data vector that has k data symbols. The storage system then applies, to the k payload symbols, a (n, k) polar code generator matrix derived from k rows of the ┌ log | 2014-11-06 |
20140331084 | INFORMATION PROCESSING SYSTEM AND CONTROL METHOD THEREOF - Information processing system for rapidly performing analysis of semistructured data while preserving fault-tolerance of data for a store request acquiring the number which has been stored of the same and data structures set beforehand, refer to data structure management information to determine a data store unit, instructs replica creation of the data with regard to the data stored in the data store unit in which any of the replicas have been stored, transmits an instruction, for performing a data operation, to a data structure operation unit, whereupon a processing unit, in accordance with the content of an analysis request, performs analysis processing by way of either data stored in any of the data storage units after a data structure operation or data which have not been subject to a data structure operation. | 2014-11-06 |
20140331085 | METHOD AND APPARATUS FOR DISTRIBUTED STORAGE INTEGRITY PROCESSING - A distributed storage integrity system in a dispersed storage network includes a scanning agent and a control unit. The scanning agent identifies an encoded data slice that requires rebuilding, wherein the encoded data slice is one of a plurality of encoded data slices generated from a data segment using an error encoding dispersal function. The control unit retrieves at least a number T of encoded data slices needed to reconstruct the data segment based on the error encoding dispersal function. The control unit is operable to reconstruct the data segment from at least the number T of the encoded data slices and generate a rebuilt encoded data slice from the reconstructed data segment. The scanning agent is located in a storage unit and the control unit is located in the storage unit or in a storage integrity processing unit, a dispersed storage processing unit or a dispersed storage managing unit. | 2014-11-06 |
20140331086 | PRIORITIZING REBUILDING OF STORED DATA IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module of a dispersed storage network (DSN), when in a rebuilding mode, determining a level of rebuilding urgency, where the level of rebuilding urgency is based on an inversely proportional function of a level of error encoded redundancy for error encoded data giving rise to the rebuilding mode. When the level of rebuilding urgency is at or above a critical level, the method continues with the DS processing module placing a set of storage units of the DSN in a critical rebuilding mode, where, when in the critical rebuilding mode, the set of storage units prioritize rebuilding of the error encoded data giving rise to the rebuilding mode over other error encoded data operations. | 2014-11-06 |
20140331087 | IDENTIFYING AND CORRECTING AN UNDESIRED CONDITION OF A DISPERSED STORAGE NETWORK ACCESS REQUEST - A method begins by a processing module sending a transaction verification request to the set of dispersed storage (DS) units, wherein the transaction verification request includes a transaction number that corresponds to a particular dispersed storage network (DSN) access request. The method continues with the processing module receiving transaction verification responses from at least some of the set of DS units to produce received transaction verification responses. The method continues with the processing module identifying an undesired condition with processing the DSN access request and initiating a corrective remedy for the undesired condition when a DS unit of the set of DS units does not provide a desired transaction verification response. | 2014-11-06 |
20140331088 | COMPUTER AND METHOD FOR TESTING ELECTRONIC DEVICE - A computer-implemented method for testing an electronic device connected to a computer includes obtaining testing parameters for items to be tested from a table stored in the computer. The table records a number of to-be-tested items of the electronic device, as well as testing parameters for testing each to-be-tested item. Each to-be-tested item is tested according to the obtained testing parameters. | 2014-11-06 |
20140331089 | ENABLING REMOTE DEBUGGING OF VIRTUAL MACHINES RUNNING IN A CLOUD ENVIRONMENT - Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine. | 2014-11-06 |
20140331090 | ENABLING REMOTE DEBUGGING OF VIRTUAL MACHINES RUNNING IN A CLOUD ENVIRONMENT - Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine. | 2014-11-06 |
20140331091 | Detecting Loss of Data During Data Transfer Between Information Devices - A mechanism is provided for detecting data loss in transfer data between a first information device and a second information device. The second information device receives transfer data sent by an application of the first information device, the transfer data being segmented into pieces and, for each segmented data piece, there is a write hash value, k hash value is generated for the segmented data piece that has been received, and the generated hash value is stored in the dedicated buffer in the second information device as a read hash value. The write hash value and the read hash value are compared and, when the write hash value associated with the segmented data piece and the read hash value of the segmented data piece do not match, it is determined that data has been lost from the transfer data at a time of transfer of the segmented data piece. | 2014-11-06 |
20140331092 | ACTIVITY BASED SAMPLING OF DIAGNOSTICS DATA - Activity-based sampling provides useful and relevantly focused diagnostic data, connected to improve a developer's understanding. An application invokes log-event procedures, causing a logger to check logging conditions and make a log entry when a logging condition is satisfied. The logger has a set of log-enabled activities, and one or more start-events with respective sampling frequency conditions. One logging condition is that a current activity-id be log-enabled. Another states that if the current activity-id is not log-enabled but the log-event procedure identifies a start-event consistent with the sampling frequency condition, the activity is log-enabled and a log entry is made. Creation of a child activity by a parent activity which is in the set of log-enabled activities is noted in the log, and the child is automatically log-enabled. A log consumer may reside inside or outside the application. Event Tracing for Windows services can be enhanced to support activity-based sampling. | 2014-11-06 |
20140331093 | AUTOMATIC PROMPT DETECTION FOR UNIVERSAL DEVICE SUPPORT - Embodiments provide systems, methods, and computer program products for network management application to automatically determine a session prompt for a network device and perform error handling. After logging in to a network device, the network management application records the first session prompt response. The network management application sends a series of empty carriage returns and random characters and records the session prompt responses. The network management application compares the responses and determines whether the prompt is a static or a dynamic prompt based on the results. The network management application elicits error responses from the network device by sending additional random characters and records the results in an error handling dictionary. The error handling dictionary is used later when running user-provided commands, enabling a determination of whether a command executed successfully. | 2014-11-06 |
20140331094 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information processing system includes a terminal apparatus an information processing apparatus. The terminal apparatus includes a first language information memory; a first display displaying a processing parameter option used in information processing in a first language; a first acceptance unit accepting a first instruction; a first generation unit generating first instruction data; an instruction data transmission unit; a notification data reception unit receiving notification data; and a first notification unit. The information processing apparatus includes a second language information memory; a second display displaying the processing parameter option in a second language; a second acceptance unit accepting a second instruction; a second generation unit generating second instruction data; an instruction data reception unit; an identification unit identifying the information processing; an execution unit executing the information processing; a notification data acquisition unit; a notification data transmission unit; and a second notification unit. | 2014-11-06 |
20140331095 | SYSTEM AND METHODS FOR MEMORY EXPANSION - This document discusses, among other things, an example system and methods for memory expansion. An example embodiment includes receiving a memory request from a memory controller over a channel. Based on the memory request, the example embodiment includes selecting a location in memory to couple to a sub-channel of the channel and configuring the set of field effect transistors to couple the channel with the sub-channel. In the example embodiment, data may be allowed to flow between the memory controller and the location in the memory over the channel and the sub-channel. | 2014-11-06 |
20140331096 | Cross-Decoding for Non-Volatile Storage - Cross-decoding assists decoding of an otherwise uncorrectable error when decoding a desired page of a multi-level-cell technology flash memory. A solid-state disk (SSD) controller adjusts space allocated to redundancy respectively within various pages (e.g. upper, middle, and lower pages) such that the respective pages have respective effective Bit Error Rates (BER)s, optionally including cross-decoding, that approach one another. Alternatively the controller adjusts the allocation to equalize decoding time (or alternatively access time), optionally including decoding time (accessing time) accrued as a result of cross-decoding when there is an otherwise uncorrectable error. The adjusting is via (a) respective ratios between allocation for ECC redundancy and user data space, and/or (b) respective coding rates and/or coding techniques for each of the various pages. Alternatively the controller adjusts the allocation to maximize total usable capacity by allocating to redundancy and data for the various pages, assuming that cross-decoding is to be used. | 2014-11-06 |
20140331097 | MANAGING REDUNDANCY REPAIR USING BOUNDARY SCANS - An IO structure, method, and apparatus are disclosed for using an IEEE™ 1149.1 boundary scan latch to reroute a functional path. The method for a chip using IEEE™ 1149.1 boundary scan latches may include using the IEEE™ 1149.1 boundary scan latches for testing IO on the chip in a test mode. The method may also include using information stored in the IEEE™ 1149.1 boundary scan latches to route signals around a failing path in a functional mode. | 2014-11-06 |
20140331098 | SENSOR ENHANCEMENT THROUGH ALGORITHMIC ACQUISITION USING SYNCHRONIZATION WITH A SCAN GENERATOR - A system and method for image enhancement associated with scan generators is provided. For example, a source stimulates a device under test (DUT) at electrical interconnects. An internal clock of the DUT is synchronized with the scan rate of the source to reduce the noise of the output signal and enhance a resultant image. A phase adjustment is effected to further reduce the noise in the signal. The synchronization and the phase adjustment seek to ensure that the data is collected at uniform times relative to the reference signal and thereby reduce the noise introduced into the system, by such offsets. Post-scan processing increases the signal-to-noise ratio through averaging techniques. Using a pixel overlay algorithm the averaged data is transformed into a 2-D array and the image of the DUT reconstructed. | 2014-11-06 |
20140331099 | INTEGRATED CIRCUIT WITH TOGGLE SUPPRESSION LOGIC - An integrated circuit with toggle suppression logic for built-in self-test is provided. The integrated includes a loading circuit configured to operate in a shift mode based on a first enable signal and a capture mode based on a second enable signal. The integrated circuit includes a switching element configured to receive the first enable signal and the second enable signal to generate a third enable signal. The integrated circuit includes combinational logic coupled to the loading circuit and the switching element, in which the combinational logic is configured to receive the third enable signal. The third enable signal is configured to disable toggling in the combinational logic while the loading circuit operates in the shift mode. | 2014-11-06 |
20140331100 | SELECTING STORAGE UNITS TO REBUILD AN ENCODED DATA SLICE - A method begins with a processing module of a dispersed storage network (DSN) identifying an encoded data slice of a set of encoded data slices that requires rebuilding and identifying storage units of the DSN that store the set of encoded data slices. The method continues with the processing module determining a rebuilding metric regarding the identified encoded data slice and selecting a sub-set of the storage units for retrieving a decode threshold number of encoded data slices of the set of encoded data slices based on the rebuilding metric. When the decode threshold number of encoded data slices have been retrieved, the method continues with the processing module decoding the decode threshold number of encoded data slices to produce a reconstructed data segment and generating a rebuilt encoded data slice from the reconstructed data segment. | 2014-11-06 |
20140331101 | SEMICONDUCTOR MEMORY DEVICES, MEMORY SYSTEMS INCLUDING THE SAME AND METHOD OF WRITING DATA IN THE SAME - In one embodiment, the semiconductor device includes a memory array and a control architecture configured to control reading data from and writing data to the memory array. The control architecture is configured to receive data and a codeword location in the memory array, select one or more data units in the received data based on a data mask, read a codeword currently stored at the codeword location in the memory array, error correct the read codeword to generate a corrected read codeword, form a new codeword from the selected data units of the received data and data units in the corrected read codeword that do not correspond to the selected data units, and write the new codeword to the memory array. | 2014-11-06 |
20140331102 | LOW DENSITY PARITY CHECK (LDPC) ENCODING AND DECODING FOR SMALL TERMINAL APPLICATIONS - Approaches are provided for closing communications channel links (e.g., for small terminal applications in satellite communications systems), at lower effective data rates, in a most power efficient manner, while still meeting regulatory requirements. Such approaches employ modulation and coding schemes that facilitate such lower effective data rates in a most power efficient manner. The new modulation and coding schemes include new low density parity check (LDPC) codes. | 2014-11-06 |
20140331103 | ENCODING MULTI-MEDIA CONTENT FOR A CENTRALIZED DIGITAL VIDEO STORAGE SYSTEM - A method begins with a processing module of a centralized digital video storage (DVS) system regarding recording of multi-media content that is to be broadcast at a particular broadcast time, determining a number of subscriber devices that have selected to record the multi-media content. At the particular broadcast time, the method continues with the processing module receiving the multi-media content as it is being broadcast. When the number of subscriber devices is less than a first value, the method continues with the processing module encoding the multi-media content using first level encoding parameters to produce sets of first level encoded data slices for storage. When the number of subscriber devices is equal to or greater than the first value, the method continues with the processing module encoding the multi-media content using second level encoding parameters to produce sets of second level encoded data slices for storage. | 2014-11-06 |
20140331104 | EFFICIENT STORAGE OF ENCRYPTED DATA IN A DISPERSED STORAGE NETWORK - A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. | 2014-11-06 |
20140331105 | SYSTEM AND METHOD FOR DATA READ OF A SYNCHRONOUS SERIAL INTERFACE NAND - A method and system is disclosed for operating a NAND memory device. The NAND memory device is operated by transmitting serial peripheral interface signals from a host to a NAND memory device, whereby the signals are communicated to a NAND memory in the NAND memory device without modifying the signals into a standard NAND memory format. Similarly, a method and system is disclosed for receiving signals from the NAND memory device without modifying the signals from a standard NAND format into a serial format. The system also incorporates error detection and correction techniques to detect and correct errors in data stored in the NAND memory device. | 2014-11-06 |
20140331106 | CALCULATION OF ANALOG MEMORY CELL READOUT PARAMETERS USING CODE WORDS STORED OVER MULTIPLE MEMORY DIES - A method includes, in a memory that includes two or more memory units, storing a code word of an Error Correction Code (ECC) that is representable by a plurality of check equations, such that a first part of the code word is stored in a first memory unit and a second part of the code word is stored in a second memory unit. A subset of the check equations, which operate only on code word bits belonging to the first part stored in the first memory unit, is identified. The first part of the code word is retrieved from the first memory unit, and a count of the check equations in the identified subset that are not satisfied by the retrieved first part of the code word is evaluated. One or more readout parameters, for readout from the first memory unit, are set depending on the evaluated count. | 2014-11-06 |
20140331107 | METHOD OF STORING SYSTEM DATA, AND MEMORY CONTROLLER AND MEMORY STORAGE APPARATUS USING THE SAME - A method of storing system data, and a memory controller and a memory storage apparatus using the same are provided. The method includes determining whether the unused storage space of a system physical erase unit is enough for storing updated system data. The method further includes, if the unused storage space of the system physical erase unit is not enough for storing the updated system data, selecting an empty physical erase unit, writing the updated system data into at least one first physical program unit of the selected physical erase unit and writing dummy data into a second physical program unit of the selected physical erase unit. | 2014-11-06 |
20140331108 | Systems and Methods for Detecting Media Flaws - An apparatus for detecting media flaws includes a branch metric selection circuit operable to select a first branch metric and a second branch metric, a subtraction circuit operable to subtract the second branch metric from the first branch metric to yield a difference, and a comparator operable to compare the difference with a threshold value and to indicate a presence of a potential flaw in a storage medium when the difference is less than the threshold value. | 2014-11-06 |
20140331109 | APPARATUS AND METHOD FOR DETECTING ERRORS ON A TRANSMISSION PATH - An apparatus detects an error from data transmitted on a transmission path, and measures a first value indicating the number of times the number of errors detected within a first time interval becomes equal to or greater than a first threshold. The apparatus reports that a failure has been detected on the transmission path of the data, when the first value measured within a second time interval longer than the first time interval becomes equal to or greater than a second threshold. | 2014-11-06 |
20140331110 | CIRCUITS, INTEGRATED CIRCUITS, AND METHODS FOR INTERLEAVED PARITY COMPUTATION - Circuits, integrated circuits, and methods are disclosed for interleaved parity computation. In one such example circuit, an interleaved parity computation circuit includes a first parity circuit that receives a first set of bits and a second parity circuit that receives a second set of bits. The first set of bits includes a first parity bit, and is received in the first parity circuit during a first clock cycle. The first parity circuit generates a first signal indicative of the parity of the first set of bits. The second set of bits includes a second parity bit, and is received in the second parity circuit during a second clock cycle. The second parity circuit generates a second signal indicative of the parity of the second set of bits. A combining circuit combines the first signal and the second signal into an alert signal. | 2014-11-06 |
20140331111 | ITERATIVE FORWARD ERROR CORRECTION DECODING FOR FM IN-BAND ON-CHANNEL RADIO BROADCASTING SYSTEMS - A method for processing a digital signal includes: receiving a plurality of protocol data units, each having a header including a plurality of control word bits; and a plurality of audio frames, each including a cyclic redundancy check code; decoding the protocol data units using an iterative decoding technique, wherein the iterative decoding technique uses a soft output decoding algorithm for iterations after the first iteration; and using decoded cyclic redundancy check codes to flag the audio frames containing errors. A receiver that implements the method is also provided. | 2014-11-06 |
20140331112 | Margin Test Methods and Circuits - Described are methods and circuits for margin testing digital receivers. These methods and circuits prevent margins from collapsing in response to erroneously received data, and can thus be used in receivers that employ historical data to reduce intersymbol interference (ISI). Some embodiments detect receive errors for input data streams of unknown patterns, and can thus be used for in-system margin testing. Such systems can be adapted to dynamically alter system parameters during device operation to maintain adequate margins despite fluctuations in the system noise environment due to e.g. temperature and supply-voltage changes. Also described are methods of plotting and interpreting filtered and unfiltered error data generated by the disclosed methods and circuits. Some embodiments filter error data to facilitate pattern-specific margin testing. | 2014-11-06 |
20140331113 | SYSTEM AND METHOD FOR PRODUCING COMPLEX MULTIMEDIA CONTENTS BY AN AUTHOR AND FOR USING SUCH COMPLEX MULTIMEDIA CONTENTS BY A USER | 2014-11-06 |
20140331114 | METHODS AND APPARATUSES FOR OBTAINING AND SHARING PARTIAL CONTENT OF A WEBPAGE - A method and apparatus for obtaining partial content of a webpage and a method and apparatus for sharing partial content of a webpage. An image of an area on the webpage selected by a user is captured. Linkable elements existing in the area and positions of respective linkable elements in the area are acquired. A HTML fragment is generated based on the image, the linkable elements and their positions in the area as the obtained partial content of the webpage. By virtue of the method and apparatus, Only interested partial content of the webpage can be shared by sharers, and receivers can not only view the partial content of the webpage exactly same with what the sharers view, but also access hyperlinks on this partial content of the webpage directly in a web browser. | 2014-11-06 |
20140331115 | METHODS AND APPARATUS FOR PROVIDING MAP LOCATIONS IN USER APPLICATIONS USING URL STRINGS - Techniques for use in a wireless communication device for displaying a map are described. The device receives via a user interface a selection of a hypertext link object in an electronic file or message. The object is associated with a URL string which includes a server address and location data corresponding to a location. When a mapping application is installed in the device, the device executes the mapping application for rendering a map of the location in response to receiving the selection of the object. When the mapping application is not installed in the device, the device executes a web browser of the device for receiving and displaying a map image of the location in response to receiving the selection of the object. | 2014-11-06 |
20140331116 | Link Expansion Service - Various embodiments enable an application to obtain information associated with a link to content without navigating to the link. The application can be configured to identify a link, receive input to attain information associated with the link, and send a request to a service for the information. In one or more embodiments, a service can be configured to receive a request for information associated with a link, ascertain one or more sources from which to gather the information, determine appropriate mechanisms by which to obtain the information, and acquire the information. Alternately or additionally, the service can further assemble the information into a consumable format, and return the consumable format to a requesting application or device. | 2014-11-06 |
20140331117 | APPLICATION-BASED DEPENDENCY GRAPH - A computing device comprising a dependency graph creation portion adapted to create a dependency graph for identified content. At least a portion of the identified content comprises at least one of remotely-based content and one or more JavaScripts. A first resource tracker is adapted to provide the dependency graph creation portion with information related to a first portion of the remotely-based content upon a document object module builder initiating a request to receive the first portion of the remotely-based content. A first JavaScript tracker is adapted to provide the dependency graph creation portion with information related the one or more JavaScripts upon sending the one or more JavaScripts to a JavaScript Engine. A second JavaScript tracker adapted to provide the dependence graph creation portion with information received from the JavaScript Engine. A second resource tracker is adapted to provide the dependency graph portion with information related to a second portion of the remotely-based content upon a document object module style layout initiating a request to receive the second portion of the remotely-based content. | 2014-11-06 |
20140331118 | Persisting Objects in a Single Data Table - Disclosed is a system and method for persisting software objects. An object may be scanned to identify the members of the object. The members are transformed into an intermediate data structure. The intermediate data structure may be persisted in a single data table. Subsequent objects may be similarly scanned into respective intermediate data structure, and then persisted in the same single data table. | 2014-11-06 |
20140331119 | Indicating website reputations during user interactions - An aspect of the present invention relates to methods and systems involving receiving an indicator of an attempted interaction of a user with an item of website content and presenting one or more indicia of a website's reputation to the user attempting to interact with the website content. The act of presenting the indicia may be in response to the user's attempted interaction with the website. | 2014-11-06 |
20140331120 | DOCUMENT ORDER MANAGEMENT VIA BINARY TREE PROJECTION - An illustrative embodiment includes processing parse tree data. A parse tree data structure that is representative of a document object model (DOM) tree data structure is received. The parse tree data structure is projected onto a data structure that includes a binary tree. The projecting includes storing a projection that includes an association between each DOM node and a respective associated binary tree node, thereby creating a map between the parse tree data structure and the binary tree data structure. Requests to manipulate the parse tree and binary tree data structures that include node inserts and document order comparisons are also performed. | 2014-11-06 |
20140331121 | WEB PAGE DISPLAY METHOD AND SYSTEM - Disclosed is a web page display method and system. The method includes: saving for a web page display parameters corresponding to time periods, each display parameter corresponding to one time parameter; receiving a request for accessing the web page, searching for, from the display parameters saved, a display parameter of the web page corresponding to a time period to which the current time belongs; displaying the web page according to the display parameter searched. The system includes: a setting module, configured to save for a web page a display parameter corresponding to a time period; a searching module, configured to search for a display parameter of the web page corresponding to a time period to which the current time belongs when a request for accessing the web page is received; a display module, configured to display the web page according to the display parameter searched by the searching module. | 2014-11-06 |
20140331122 | METHODS AND SYSTEMS FOR PROVIDING WEB PAGES TO WEB BROWSERS - Methods and systems described herein can allow for a service provider, such as an Internet Service Provider (ISP) to provide Web pages to users' Web browsers at periodic intervals. The content can include graphics, text, audio and video clips. In contrast to the traditional banner or pop-up advertisements available today, the methods and systems can allow content Web pages to be displayed on users' Web browsers without the user requesting specific Web sites. The ISPs can become distributors of advertising content, potentially gaining new revenue streams. | 2014-11-06 |
20140331123 | Method and apparatus for extending page tag, and computer storage medium - A method and apparatus for extending a page tag and a computer storage medium are provided to implement interaction between a page tag and an operating system function, and improve user experiences. The method includes: parsing a page; determining whether the page comprises an identifiable comment tag; parsing the identifiable comment tag and obtaining an application function of a page tag defined by the identifiable comment tag, when the page comprises the identifiable comment tag; executing the application function of the page tag; and displaying a result of executing the application function of the page tag on the page. The examples are mainly used in a procedure of extending the page tag. | 2014-11-06 |
20140331124 | METHOD FOR MAINTAINING COMMON DATA ACROSS MULTIPLE PLATFORMS - Systems and methods are described for maintaining a user's common data across multiple platforms. The common data is information about the user and graphical and design elements of publications that should be consistently presented across online, other electronic, and non-electronic platforms, such as websites, social networking profiles, electronic and printed business listings, email and print newsletters, business cards, letterhead, and the like. The common data may be stored and updated by a centralized or distributed system including one or more servers communicating with the platforms and with a content database that retains the common data in a stored data structure. The system may provide an interface to the user, receive common data elements input by the user, add the common data elements to the stored data structure, and distribute the common data elements to the platforms. The system may identify which platforms require which elements of the common data. | 2014-11-06 |
20140331125 | METHODS, SYSTEMS, AND MEDIA FOR GUIDING USER READING ON A SCREEN - In some embodiments, a method for guiding user reading on a screen is provided, the method comprising: determining a reading speed of a user; receiving a selection of a document having an original layout to be read; setting a reading speed for the document; formatting the selected document for presentation to the user on a screen; presenting the formatted document using the original document layout; dividing text in the formatted document into blocks that include a plurality of words; reformatting the blocks based on the layout of the formatted document and punctuation of the document to include at least one word, such that each reformatted block includes less than a predetermined number of characters and the at least one word of the reformatted block is on a single line in the text of the document; and presenting guidance to the user within the formatted document at the set reading speed. | 2014-11-06 |
20140331126 | Animating Edits to Documents - A notes system is presented with a content management system. The notes system manages creation and distribution of edits to notes to users sharing the notes. The notes are stored as a series of edits at the notes system. When an edit to a note is received, the edit is propagated to users subscribed to a note by a backend server responsible for managing the note. The shared users are notified through application servers associated with each shared user. The notes server includes various indices for searching the notes and allows notes to be searched quickly to organize viewing by a user of notes and identification of relevant material in the notes. The stored edits are used to display edits to a note to a user by replaying the accessed note to the user. | 2014-11-06 |
20140331127 | TEMPLATE BASED COPY AND PASTE FUNCTION - The computer transforms text by receiving a command to insert text into a user interface of an application. The computer extracts one or more words from the text, wherein each of the one or more words is associated with a category relevant to the application. The computer transforms the text to fit a template based on the respective associated categories of the one or more words. The computer inserts the transformed text into the user interface. | 2014-11-06 |
20140331128 | SYSTEMS AND METHODS FOR PROVIDING ELECTRONIC DOCUMENT SERVICES - A system facilitates the procurement of one or more document services for a document directly from a document preparation software application used to create the document. The system activates a graphical user interface within the document preparation software application, contacts a server to identify available document services, and configures the graphical user interface based on the available document services. The system detects selection of one of the available document services and provides the document from the document preparation software application to one or more service providers for performance of the selected document service. | 2014-11-06 |
20140331129 | MOBILE TERMINAL DEVICE - A mobile terminal device includes a main body and a touch panel, formed on the main body, on which an operating button is provided, the mobile terminal device being characterized in that when a specific condition which will cause the main body to vibrate is established, at least one of a size of the operating button on the touch panel, a size of character or symbol given on the operating button, a color or luminance of the operating button, and a response voice when the operating button is manipulated is changed. | 2014-11-06 |
20140331130 | DYNAMIC MOVEABLE INTERFACE ELEMENTS ON A TOUCH SCREEN DEVICE - Systems and methods for displaying a moveable interactive element that can display information about control elements are provided. A system and method can include displaying one or more control elements of a user interface, and receiving initial touch input. In response to the initial touch input, the interactive element can displayed in the user interface. Further touch input corresponding to dragging the interactive element onto a control element can be received. The interactive element can be associated with the control element, and content related to the functionality of the control element can be determined. The content can then be displayed within the interactive element. | 2014-11-06 |
20140331131 | Accessible Self-Service Kiosk - Accessible self-service kiosks are disclosed. In one embodiment, a method for interacting with an accessible self-service kiosk may include (1) receiving, from a user, identifying information; (2) retrieving information about the user based on the identifying information; (3) receiving an instruction from the user to enter an accessibility mode; and (4) interacting with the user with an accessible interface. | 2014-11-06 |
20140331132 | DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD, AND STORAGE MEDIUM - An apparatus includes: a receiving unit configured to receive an input operation from a user performed on an accepting unit displayed on a display unit; a determination unit configured to determine whether or not detailed information set in the accepting unit is displayed on the display unit in accordance with the input operation received by the receiving unit, and at least one of a display state of the accepting unit and an input area of the input operation in the accepting unit; and a display control unit configured to control a display of the accepting unit displayed on the display unit in accordance with a determination result provided by the determination unit. | 2014-11-06 |
20140331133 | Policies for Media Playback - Embodiments are described herein that help allow for applying policies during playback of media. In one aspect, a method is provided that involves a computing device of a media playback system (a) receiving a request to playback one or more media items that are from a playlist associated with a controller application, (b) applying to the one or more media items one or more playback policies that are associated with the controller application, where a given playback policy restricts at least one aspect of playback of at least one of the one or more media items, and (c) causing playback of the one or more media items in accordance with the one or more playback policies. | 2014-11-06 |
20140331134 | SYSTEM, A PROCESSOR APPARATUS AND A METHOD FOR MODIFICATION OF CONTROL SIGNALS - A system, a processor apparatus and a method for modification of control signals. The apparatus can include a processor and a control portion. The processor can be coupled to the control portion. The processor can be configured to receive and process input signals in a manner so as to produce output signals. The processor can be associated with response characteristics. The control portion can be configured to produce control signals. The control signals can be communicated to the processor. The control portion can be configured to receive data signals. The control signals can be modified based on the data signals. Response characteristics associated with the processor can be varied based on the modifiable control signals and the processor can be further configured to process received input signals based on the variable response characteristics so as to produce the output signals. | 2014-11-06 |
20140331135 | DIGITAL CONTENT CONNECTIVITY AND CONTROL VIA A PLURALITY OF CONTROLLERS THAT ARE TREATED AS A SINGLE CONTROLLER - Managing the separation and distribution of digital content and associated controls in a network system includes receiving a request from any of a set of control devices within the same active session, to which a host server provides a response that is suitable for all control devices. The control devices handle such responses in the context of user experience-optimized application types that facilitate separating and distributing associated application type control, digital content, and/or status information during an active session from the host server to the control devices and to output devices that are connected together through the network, such as a home network. | 2014-11-06 |
20140331136 | VIDEO DATA SHARING AND GEOGRAPHIC DATA SYNCHRONZATION AND SHARING - Implementations described and claimed herein provide a system and methods for synchronizing video data and geographic data, and providing the synchronized data to other user's or device over a network. | 2014-11-06 |
20140331137 | METHOD AND APPARATUS FOR ANNOTATING VIDEO CONTENT WITH METADATA GENERATED USING SPEECH RECOGNITION TECHNOLOGY - A method and apparatus is provided for annotating video content with metadata generated using speech recognition technology. The method begins by rendering video content on a display device. A segment of speech is received from a user such that the speech segment annotates a portion of the video content currently being rendered. The speech segment is converted to a text-segment and the text-segment is associated with the rendered portion of the video content. The text segment is stored in a selectively retrievable manner so that it is associated with the rendered portion of the video content. | 2014-11-06 |
20140331138 | SENDING APPLICATION INPUT COMMANDS OVER A NETWORK - Disclosed are various embodiments that facilitate sending input commands to an application over a network that may have variable latency characteristics. An input command may be obtained from a client over a network. The obtained input command is then provided to the application that is executed in a hosted environment. When a delay is determined to be necessary based at least in part on latency characteristic, the input command is provided to the application after the delay. | 2014-11-06 |
20140331139 | MEDIA CLIP MANAGEMENT - Some embodiments provide a method for editing a composite presentation in a media-editing application. The method receives a media file to import into the media-editing application from an external device. The method creates a set of media clip data structures to represent the media file. At least one of the data structures references the media file on the external device. Before the media file is imported from the external device, the method uses the media clip data structure to edit a composite presentation with the media file. After the media file is imported from the external device, automatically modifying the data structure to refer to a copy of the media file on a local device. | 2014-11-06 |