47th week of 2009 patent applcation highlights part 54 |
Patent application number | Title | Published |
20090287907 | System for providing trace data in a data processor having a pipelined architecture - The invention is a method and system for providing trace data in a pipelined data processor. Aspects of the invention include providing a trace pipeline in parallel to the execution pipeline, providing trace information on whether conditional instructions complete or not, providing trace information on the interrupt status of the processor, replacing instructions in the processor with functionally equivalent instructions that also produce trace information and modifying the scheduling of instructions in the processor based on the occupancy of a trace output buffer. | 2009-11-19 |
20090287908 | PREDICATION SUPPORT IN AN OUT-OF-ORDER PROCESSOR BY SELECTIVELY EXECUTING AMBIGUOUSLY RENAMED WRITE OPERATIONS - A predication technique for out-of-order instruction processing provides efficient out-of-order execution with low hardware overhead. A special op-code demarks unified regions of program code that contain predicated instructions that depend on the resolution of a condition. Field(s) or operand(s) associated with the special op-code indicate the number of instructions that follow the op-code and also contain an indication of the association of each instruction with its corresponding conditional path. Each conditional register write in a region has a corresponding register write for each conditional path, with additional register writes inserted by the compiler if symmetry is not already present, forming a coupled set of register writes. Therefore, a unified instruction stream can be decoded and dispatched with the register writes all associated with the same re-name resource, and the conditional register write is resolved by executing the particular instruction specified by the resolved condition. | 2009-11-19 |
20090287909 | Dynamically Estimating Lifetime of a Semiconductor Device - In one embodiment, the present invention includes a method for obtaining dynamic operating parameter information of a semiconductor device such as a processor, determining dynamic usage of the device, either as a whole or for one or more portions thereof, based on the dynamic operating parameter information, and dynamically estimating a remaining lifetime of the device based on the dynamic usage. Depending on the estimated remaining lifetime, the device may be controlled in a desired manner. Other embodiments are described and claimed. | 2009-11-19 |
20090287910 | SYSTEM AND METHOD FOR PROVIDING PREPROGRAMMED IMAGING IN A DATA COLLECTION ENVIRONMENT - According to a particular embodiment, an imaging system is provided that includes an imaging device operable to image a hard-drive of a target device. The imaging device includes a first connection to the target device and a second connection to an output capture device, whereby both connections facilitate an information flow of data. The imaging device includes a preprogramming element that includes a stored version of preprogramming instructions, which direct the imaging device on how to image the hard-drive autonomously. | 2009-11-19 |
20090287911 | PROGRAMMABLE SIGNAL AND PROCESSING CIRCUIT AND METHOD OF DEPUNCTURING - A programmable signal processing circuit has an instruction processing circuit ( | 2009-11-19 |
20090287912 | SYSTEM AND METHOD FOR BRANCH MISPREDICTION USING COMPLEMENTARY BRANCH PREDICTIONS - A system is disclosed for providing branch misprediction prediction in a microprocessor. The system includes a mispredicted branch table that includes address, distance, and true/not true fields, and an index to the mispredicted branch table that is formed responsive to 1) a current mispredicted branch, 2) a global history, 3) a global misprediction history, and 4) a branch misprediction distance. | 2009-11-19 |
20090287913 | APPARATUS AND METHOD FOR CONFIGURING SWITCHES, ROUTERS, AND OTHER CONFIGURABLE DEVICES - A method includes receiving user input associated with configuration of a configurable device. The method also includes retrieving a template associated with the configurable device. The method further includes generating one or more configuration commands for the configurable device using the template and the user input. In addition, the method includes storing the commands and/or outputting the commands. The method could also include retrieving one or more rules associated with the configuration of the configurable device. The one or more rules could define at least one allowable configuration of the configurable device. Also, the user input could include one or more selections associated with one or more configuration options by a user, and the one or more rules could define the one or more configuration options available for selection by the user. The configurable device could represent a switch, a router, or other command-line configurable device. | 2009-11-19 |
20090287914 | AUTOMATICALLY GENERATING A CONFIGURATION DIAGRAM BASED ON TASK REQUIREMENTS - System and method for generating a configuration diagram based on user specification of a task. A server computer communicates with a client system, e.g., a measurement system, including a client computer system, over a network. The server receives requirements, e.g., a task specification, for a task, e.g., a measurement task, where the requirements are provided in response to user input. A plurality of products operable to perform the task are determined in response to the requirements, e.g., by programmatically analyzing the requirements. A diagram is displayed on the client computer system iconically representing the plurality of products, including icons representing at least a subset of the products to the user as proposed hardware and/or software products for the client system. Pricing information for the proposed products may be displayed. User input indicating purchase of at least one of the products is received and the purchased products provided to the user. | 2009-11-19 |
20090287915 | Procedure for Booting a First Computer Using the Operating System of a Second Computer - A method for operating at least one first computer entity with an operating system of a second computer entity, | 2009-11-19 |
20090287916 | GRID COMPUTING RESOURCES AND A METHOD OF USE THEREOF - A method of using an information handling system can include communicating accessibility of a resource to a grid system, powering down the information handling system, receiving a wake request from the grid system, booting the information handling system into a grid mode where the resource is accessible to the grid system. Machine-executable code for an information handling system can include a method for indicating that a resource in the information handling system is accessible to a grid system, communicating that the resource is accessible to the grid system, and placing the information handling system into a low power state. An information handling system can include a processor that can indicate that a resource is accessible to a grid system, communicate to the grid system that the resource is accessible, and place the information handling system into a low power state. | 2009-11-19 |
20090287917 | SECURE SOFTWARE DISTRIBUTION - To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation. | 2009-11-19 |
20090287918 | MANAGING EXTENSIBLE FIRMWARE INTERFACE (EFI) BOOT DATA - A computer system has extensible firmware interface firmware. The EFI firmware loads incomplete virtual boot data from a resource manager and then completes the boot data. The completed boot data is used to find an operating-system image to boot. The complete virtual boot data is transferred to the resource manager. | 2009-11-19 |
20090287919 | Electronic Device - An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for causing the power supply unit to start supplying power. The first boot circuit interconnects the power supply unit and the control unit for transmitting the boot signal. The data encryption unit is for interconnecting the power supply unit and the control unit so as to form a second boot circuit through which the boot signal is transmitted and for cutting off the first boot circuit. | 2009-11-19 |
20090287920 | METHOD FOR ESTABLISHING BI-DIRECTIONAL MESSAGING COMMUNICATIONS WITH WIRELESS DEVICES AND WITH REMOTE LOCATIONS OVER A NETWORK - A method, server, device and computer readable medium for establishing a bi-directional communication session between a first device and a server is provided. During the method, a first transport layer connection between the first device and the server is established. The first device is then authenticated with the server over the first transport layer connection. In the event that authenticating the first device is successful, the server and the first device establish a persistent, bi-directional communication session over the first transport layer connection. | 2009-11-19 |
20090287921 | MOBILE DEVICE ASSISTED SECURE COMPUTER NETWORK COMMUNICATION - Mobile device assisted secure computer network communications embodiments are presented that employ a mobile device (e.g., a mobile phone, personal digital assistant (PDA), and the like) to assist in user authentication. In general, this is accomplished by having a user enter a password into a client computer which is in contact with a server associated with a secure Web site. This password is integrated with a secret value, which is generated in real time by the mobile device. The secret value is bound to both the mobile device's hardware and the secure Web site being accessed, such that it is unique to both. In this way, a different secret value is generated for each secure Web site accessed, and another user cannot impersonate the user and log into a secure Web site unless he or she knows the password and possesses the user's mobile device simultaneously. | 2009-11-19 |
20090287922 | PROVISION OF SECURE COMMUNICATIONS CONNECTION USING THIRD PARTY AUTHENTICATION - The present invention relates to communications, and in particular though not exclusively to forming a secure connection between two untrusted devices. The present invention provides a method of securely connecting a first device (A) to a second device (B) using a third party authentication server (AS) coupled to the second device, the first device and the authentication server both having first device shared secret data (SSDa) and the second device and the authentication server both having second device shared secret data (SSDb). The method comprises receiving a request from the first device at the authentication server; the authentication server and the first device both generating a first device key (K_A) using the first device shared secret data in response to a first device random number (RANDa) sent from the authentication server to the first device; the authentication server and the second device both generating a second device key (K_B) using the second device shared secret data in response to a second device random number (RANDb) sent from the authentication server to the second device; and the authentication server securely forwarding to the second device (B) and the first device (A) a common key (K_AB) using the second and first device keys (K_B, K_A). | 2009-11-19 |
20090287923 | Reverse Mapping Method and Apparatus for Form Filling - In the presently preferred embodiment of the invention, every time a user submits a form the client software tries to match the submitted information with the stored profile of that user. If a match is discovered, the program tags the field of the recognized data with a corresponding type. The resulting profile can be used after that to help all subsequent users to fill the same form. | 2009-11-19 |
20090287924 | REVOCATION OF CRYPTOGRAPHIC DIGITAL CERTIFICATES - Different targets (c | 2009-11-19 |
20090287925 | Method and apparatus for performing an authentication after cipher operation in a network processor - A method and apparatus is described for processing of network data packets by a network processor having cipher processing cores and authentication processing cores which operate on data within the network data packets, in order to provide a one-pass ciphering and authentication processing of the network data packets. | 2009-11-19 |
20090287926 | PROVING APPARATUS AND VERIFICATION APPARATUS APPLIED TO DENIABLE ZERO-KNOWLEDGE INTERACTIVE PROOF - The present invention enables deniable zero-knowledge interactive proof to be performed with low amounts of communications and calculations by utilizing a method of a special honest verifier zero-knowledge interactive proof when such method is given. The verification apparatus generates a commitment of a challenge value with respect to a predetermined relationship and transmits the commitment of the challenge value to the proving apparatus, which determines whether or not a required relationship using the commitment of the challenge value holds, and stops its operation if such relationship does not hold. The proving apparatus causes the proof commitment generation apparatus to generate a proof commitment and transmits the proof commitment to the verification apparatus, which transmits a challenge value and a random number to the proving apparatus. The ladder transmits a response to the verification apparatus which determines acceptance or non-acceptance of the proof through communications with the interactive proof verification apparatus. | 2009-11-19 |
20090287927 | SECURE AUTHENTICATED DISTANCE MEASUREMENT - The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and a second communication device, wherein the first and the second communication device share a common secret and said common secret is used for performing the distance measurement between said first and said second communication device. The invention also relates to a method of determining whether data stored on a first communication device are to be accessed by a second communication device. Moreover, the invention relates to a communication device for performing authenticated distance measurement to a second communication device. The invention also relates to an apparatus for playing back multimedia content comprising a communication device. | 2009-11-19 |
20090287928 | Methods, Portable Electronic Devices, Systems and Computer Program Products for Securing Electronic Conference Room Whiteboards - Methods, portable electronic devices, systems and computer program products for securing an electronic whiteboard. A near field communication (NFC) session is established between a portable electronic device and the electronic whiteboard to secure information provided on the electronic whiteboard. Dispersion of the information provided on the electronic whiteboard is enabled and/or disabled using security credentials associated with the established NFC session. | 2009-11-19 |
20090287929 | METHOD AND APPARATUS FOR TWO-FACTOR KEY EXCHANGE PROTOCOL RESILIENT TO PASSWORD MISTYPING - A system and method for two factor key exchange protocol resilient to password mistyping is disclosed. This authentication process is based on two factors including both electronically stored (long keys) and human supplied credentials (password or biometrics). The disclosed system and method ensures security in the presence of mistyping. The system includes receiving a message from a client signifying a request to establish a secure connection and sending a first random number to the client. The method continues with receiving a string and authorization code with parameters comprising the first random number and the string where the string includes an identifier, a short key and a second random number encrypted with a public key. The method continues with decrypting the string with a private key verifying the authentication code, verifying the short key and session key derivation by both server and client. | 2009-11-19 |
20090287930 | IDENTITY BASED SYMMETRIC CRYPTOSYSTEM USING SECURE BIOMETRIC MODEL - Methods, apparatus, and computer program products are herein described that provide for an identity-based cryptosystem using a highly secure biometric model through which both access and data transmission are effectively made very secure. Through implementation of generating and securely storing biometric data as syndrome vectors tolerance is provided for the inherent variability of biometric data. In addition, to insure that the biometric data is not duplicated by adversaries who might gain access to the syndrome generation algorithm and the biometric data, present aspects, provide for keeping the private key more secure and making the cryptosystem user-identity dependent. As such the systems, apparatus and computer program products herein disclosed provide end-to-end authentication of end users using secure biometry, which constitute the symmetric and/or asymmetric identity-based cryptosystem. | 2009-11-19 |
20090287931 | Establishing Proof of Existence and Possession of Digital Content - A method for establishing proof of existence and possession of source digital content, the method comprising the steps of generating a content certificate by calculating a content hash derived from the source digital content; creating code incorporating the content hash and content details, and a certifying body time-stamping and digitally signing the content hash and the content details to create a content certificate; transmitting the content certificate via a secure channel so that the recipient can verify that the certificate came from the certifying body; transmitting a digitally signed file representing the content certificate content details. A tamper-proof audit trail of certification is generated by: calculating a proving hash of a concatenated file of data relating to a plurality of content certificates; publishing the proving hash, and publishing the concatenated file. Existence of content is proved by: verifying certified digital content against the content certificate using hash verification and checking history of public keys from digital identities; and proving prior existence of the content certificate by reference to published proving hashes and historic content hashes without reference to the certifying body. | 2009-11-19 |
20090287932 | Consumer-Driven Secure Sockets Layer Modulator - A software system and method for executing secure commercial transactions online is disclosed. A user's password is received to initiate secure socket layer (SSL) communications with a transaction site on a server. A web session associated with the SSL communications is encrypted by associating a domain name of the transaction site with its SSL public key. Then, the user's password is added to a hypertext markup language (HTML) header of a message within the web session. When added, the password is invisible to a hypothetical man-in-the-middle (MITM) attacker, who cannot read the encrypted message nor mimic the user. The MITM is thus unable to compromise the user's account as the MITM is unable to provide the correct password into any fraudulent message. | 2009-11-19 |
20090287933 | SYSTEM AND METHOD THAT USES CRYPTOGRAPHIC CERTIFICATES TO DEFINE GROUPS OF ENTITIES - A system and method for issuing a cryptographic certificate comprises describing one or more prerequisite condition on the cryptographic certificate. The one or more prerequisite conditions comprise membership in one or more prerequisite group of entities. An entity may be a participant, a resource or a privilege, etc. The present invention also requires naming one or more target groups of entities on the cryptographic certificate. One or more prerequisite group stakeholder that authorizes an entity in the one or more prerequisite group of entities to be added as members in another group of entities sign the cryptographic certificate. The cryptographic certificate is also signed by one or more target group stakeholders that authorizes an entity to be added as a member of the one or more target groups. Exemplary prerequisite conditions relate to one or more of a membership in another group of entities, a physical characteristic, a temporal characteristic, a location characteristic or a position characteristic, among others. | 2009-11-19 |
20090287934 | INFORMATION PROCESSING APPARATUS, INFORMATION RECORDING MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - An information processing apparatus includes: a reproducing unit that reads, from a disc, a content and a content code file storing a content code that includes at least any one of a program or conversion data applied to a content reproducing process, to execute the content reproducing process; and a signature verification unit that verifies a digital signature set for the content code file. The signature verification unit verifies the signature using different pieces of set signature target data between a signature verification process executed in reproducing the content recorded in a ROM disc and a signature verification process executed in reproducing the content recorded in a non-ROM disc other than the ROM disc. The reproducing unit, when signature verification is successfully executed by the signature verification unit, applies the content code stored in the content code file, for which signature verification is successful, to reproduce the content. | 2009-11-19 |
20090287935 | COMMON ACCESS CARD HETEROGENEOUS (CACHET) SYSTEM AND METHOD - What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide identity certificates. The secondary certificate authority applies business rules to those identity certificates to establish a community of privilege, and then issues and maintains new privilege certificates without issuing new private keys or smart cards. The new privilege certificates bind the original identity, the sponsor, i.e., the primary certificate authority, and the privilege. The new privilege certificates can be used on a Public Key Infrastructures (PKI) transaction basis, for example, to grant access to unclassified and Multi-Level Secure (MLS) resources without further reference to the existing primary certificate authorities. | 2009-11-19 |
20090287936 | MANAGING PASSWORDS USED WHEN DETECTING INFORMATION ON CONFIGURATION ITEMS DISPOSED ON A NETWORK - Disclosed embodiments include a computer system for receiving an encrypted password from an ID management system. The computer system sends the encrypted password to a decryption system, where the decryption system decrypts the encrypted password. The decrypted password is then transmitted to the computer system, and the computer system transfers the decrypted password to a configuration item disposed on a network. Based on the password, the configuration item sends data concerning the configuration item to the computer system. | 2009-11-19 |
20090287937 | IDENTITY VERIFICATION - The invention provides a method for verifying the identity of an entity to a computerised system. The entity is in possession of a personal identification device (PID) having a PID ID and storing a Codec that can be used to encode and decode data. The computerised system holds data associated with the entity including the PID ID of the entity's PID, the Codec and a password associated with and known to the entity. The method involves transmitting an encoded Challenge from the computerised system to the PID, calculating a Reply using the Challenge and the password entered by the user, and transmitting the Reply from the PID to the computerised system. The transmitted Reply is compared with a reply calculated by the computerised system and the identity of the entity is verified if the comparison determines that Replies are the same. | 2009-11-19 |
20090287938 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 2009-11-19 |
20090287939 | SECURE DEVICE, INFORMATION PROCESSING TERMINAL, SERVER, AND AUTHENTICATION METHOD - A secure device can make contents of terminal application authentication information calculation a different complicated calculation process at each time while suppressing the processing load in the secure device and a card application code size to low values. When issuing of a terminal application ( | 2009-11-19 |
20090287940 | SYSTEM AND METHOD FOR PROCESSING AND PROTECTING CONTENT - Systems and methods that process and protect content are provided. In one example, a system may include, for example, a first device coupled to a second device. The first device may include, for example, an integrated circuit that may include a content processing system and a security system. The security system may include, for example, a digital rights manager. The first device and the second device may be part of a network. The network receives content and control information via the first device. The content processing system processes incoming content based upon at least the control information. The integrated circuit protects the content before placing the content on the network. | 2009-11-19 |
20090287941 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus which makes it possible to store encrypted data of packets in a decrypted state, and improve the efficiency of data analysis. A network interface receives encrypted data which has been encrypted, and data which has not been encrypted, from a network. A HDD stores received data. A IPSec module is operable when an item of the received is an item of the encrypted data, to decrypt the item of the encrypted data. A packet acquisition sub application searches the data stored in HDD for an item of the encrypted data corresponding to an decrypted item of data. The packet acquisition sub application updates the item of the received encrypted data based on the decrypted item of the data. | 2009-11-19 |
20090287942 | CLOCK ROLL FORWARD DETECTION - Method and apparatus to detect clock roll-forward attacks in a computing device or similar system. This protects against hackers who tamper with the system clock of, for instance, a digital media playback device in order to access a content item which has been rented for a limited time. By detecting clock roll-forward tampering, the present method and system prevent such hackers from accessing the content item outside its authorized rental time period. | 2009-11-19 |
20090287943 | Mapping power domains in a data center - Mapping power domains in a data center, the data center including one or more power consuming computing devices, the computing devices managed by a management module, each power domain in the data center including one or more power service modules located in an electrical path connecting one or more of the computing devices to a power source, each power service module associated with a power line communications controller, where the mapping includes establishing a unique domain identification for each electrical path connecting one or more of the computing devices to a power source; receiving, by the management module from the computing devices, the unique domain identifications; and maintaining, by the management module, a map associating the unique domain identifications with identifications of the computing devices. | 2009-11-19 |
20090287944 | System and method of controlling an operating frequency in an electronic system - A method and apparatus for adaptively adjusting the operating voltage of an integrated circuit in response to tester-to-system variations, worst-case testing techniques, process variations, temperature variations, or reliability wearout mechanisms. The minimum operating voltage of an integrated circuit is determined either during external testing of the integrated circuit or during built-in-self-testing. The minimum operating voltage is transmitted to a variable voltage regulator where it is used to set the output of the regulator. The output of the regulator supplies the integrated circuit with its operating voltage. This technique enables tailoring of the operating voltage of integrated circuits on a part-by-part basis which results in power consumption optimization by adapting operating voltage in response to tester-to-system variations, worst-case testing techniques, process variations, temperature variations or reliability wearout mechanisms. Alternatively, the invention enables adaptive adjustment of the operating frequency of an integrated circuit. The invention enables system designers to adaptively optimize either system performance or power consumption on a part-by-part basis in response to tester-to-system variations, worst-case testing techniques, process variations, temperature variations or reliability wearout mechanisms. | 2009-11-19 |
20090287945 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An image processing apparatus includes: a main controller which controls a processing of an image; a power supply which supplies power to the main controller; a switching unit which selectively allows the power to be supplied from the power supply to the main controller; and a sub controller which determines whether a first power-off event occurs, and controls the switching unit to cut off the power supplied to the main controller if the sub controller determines that the first power-off event occurs, wherein the main controller determines whether a second power-off event different from the first power-off event occurs, and the switching unit cuts off the power supplied to the main controller if the second power-off event occurs. | 2009-11-19 |
20090287946 | Power supply control circuit - A power supply control circuit includes a standby control circuit, a microprocessor, and a power supply main circuit. The standby control circuit generates a pulse signal, outputs a first control signal, and sets the first control signal to an active state upon actuation of the switch member. The microprocessor outputs and sets a second control signal to first and second states upon first and second generations of the pulse signal, respectively. The standby control circuit maintains the first control signal at the active state when the second control signal is set to the first state, and sets the first control signal to an inactive state when the second control signal is set to the second state. The power supply main circuit outputs a power when the first control signal is set to the active state, and cuts off the power when the first control signal is set to the inactive state. | 2009-11-19 |
20090287947 | CIRCUIT AND METHOD FOR ULTRA-LOW IDLE POWER - A method and circuit for reducing power consumption during idle mode to ultra-low levels, such as 1/10 | 2009-11-19 |
20090287948 | CONTEXT BASED POWER MANAGEMENT - According to some embodiments, context information associated with a processing system may be determined. It may then be automatically arranged for a power state associated with the processing system to transition from a first power state to a second power state based on the context information. | 2009-11-19 |
20090287949 | Managing Power Domains In A Data Center - Managing power domains in a data center including establishing a unique domain identification for each electrical path connecting one or more computing devices to a power source; receiving, by a management module from the computing devices, the unique domain identifications; maintaining, by the management module, a map associating the unique domain identifications with identifications of the computing devices; reporting, by a monitoring module to the management module, status information of a monitored power service module located in a particular power domain; and identifying by the management module an action to take in dependence upon the status information and the map of the unique domain identifications for the computing device. | 2009-11-19 |
20090287950 | ERROR MANAGEMENT FRAMEWORK - A system and method for computer error management initially detects an error and creates an error report. The error report is then sent to a server where it is hosted on the World Wide Web. The server additionally notifies designated users of the error and can allow the users to correct the error. | 2009-11-19 |
20090287951 | Network device and method of operating the same - A network device includes multiple ports for accepting network connections, at least one memory for storing a fail-safe device configuration, a normal operational device configuration and one or more triggering events, and one or more processors connected to the memory for controlling the operation of the network device. The processor causes the network device to operate according to the fail-safe configuration in response to the occurrence of a triggering event. | 2009-11-19 |
20090287952 | Backplane Interface Adapter with Error Control and Redundant Fabric - A backplane interface adapter with error control and redundant fabric for a high-performance network switch. The error control may be provided by an administrative module that includes a level monitor, a stripe synchronization error detector, a flow controller, and a control character presence tracker. The redundant fabric transceiver of the backplane interface adapter improves the adapter's ability to properly and consistently receive narrow input cells carrying packets of data and output wide striped cells to a switching fabric. | 2009-11-19 |
20090287953 | STORAGE SYSTEM - A storage system encrypts plain text from an external device and stores the cryptogram into a disk unit, decrypts stored data in the disk unit and transmits decrypted text to the external device. The plain and decrypted text must be in agreement when seen from the external device. If a failure occurs in the encrypting or decrypting process, the plain and decrypted text disagree. The storage system includes an encryption unit for encrypting first data, a decryption unit for decrypting the encrypted data into second data, and a comparison unit for comparing the first and second data. When the first and second data do not agree, the first data is encrypted by a different encryption unit and the encrypted data is decrypted into third data, whereupon the first and third data are compared. When the first and third data do not agree, a failure report is sent. | 2009-11-19 |
20090287954 | SLOT INTERFACE ACCESS UNIT, METHOD THEREOF, AND PROGRAM THEREOF, AS WELL AS REDUNDANCY CONFIGURATION OF MAIN UNIT, AND REPLACING METHOD OF THE SAME - A single main unit manages information on hardware resources and the like of all main units connected to a network in an integrated fashion. A slot management module, a slot control module, and a physical slot/managed slot comparison table are provided between an input/output control module and a slot interface subordinate thereto. The input/output control module accesses the slot interface by using virtual slot identification information. The slot management module refers to the physical slot/managed slot comparison table, converts the virtual slot identification information into physical slot identification information, and accesses a slot control module corresponding to the physical slot identification information obtained by the conversion, thereby realizing a physical access of the input/output control module to the slot interface. | 2009-11-19 |
20090287955 | REDUNDANT FAILOVER SYSTEM, REDUNDANCY MANAGING APPARATUS AND APPLICATION PROCESSING APPARATUS - In a communication system using an IP tunnel for communication between application processing apparatuses (hereinafter, processing apparatuses), an application can be moved to an arbitrary processing apparatus, update of tunnel tables included in the respective processing apparatuses is quickly performed, and a buffer for waiting for packets during the table update is made small. A redundancy managing apparatus manages a correspondence between a virtual IP address (VIP) of an application in a communication system and an IP address (RIP) of an processing apparatus to execute the application. The processing apparatus notifies the VIP of the communication partner application of the application to the redundancy managing apparatus. The redundancy managing apparatus notifies the VIP of the communication partner application of the moved application and the RIP of the processing apparatus to execute the communication partner application to the processing apparatus of the movement destination (failover destination) of the application. | 2009-11-19 |
20090287956 | APPARATUS, SYSTEM, AND METHOD FOR DETECTING AND REPLACING FAILED DATA STORAGE - An apparatus, system, and method are disclosed for detecting and replacing failed data storage. A read module reads data from an array of memory devices. The array includes two or more memory devices and one or more extra memory devices storing parity information from the memory devices. An ECC module determines, using an error correcting code (“ECC”), if one or more errors exist in tested data and if the errors are correctable using the ECC. The tested data includes data read by the read module. An isolation module selects a memory device in response to the ECC module determining that errors exists in the data read by the read module and that the errors are uncorrectable using the ECC. The isolation module also replaces data read from the selected memory device with replacement data and available data wherein the tested data includes the available data combined with the replacement data. | 2009-11-19 |
20090287957 | METHOD FOR CONTROLLING A MEMORY MODULE AND MEMORY CONTROL UNIT - A memory control unit for controlling a memory module comprising a plurality of memory cells, said memory control unit comprising means for detecting failure of at least one memory cell, means for deactivating said at least one defective memory cell, means for assigning the address of said at least one defective memory cell to at least one replacement memory cell, first tracking means for tracking the remaining replacement memory cells and masking means to hide the address of a defective memory cell to prevent further usage of this address instead of assigning said address to a replacement memory cell. | 2009-11-19 |
20090287958 | METHOD AND APPARATUS FOR TEST GENERATION FROM HYBRID DIAGRAMS WITH COMBINED DATA FLOW AND STATECHART NOTATION - A test generator and methods for generating tests from a hybrid diagram are provided. A hybrid diagram is a diagram that primarily uses one higher-level semantic notation with portions utilizing one or more secondary higher-level semantic notations. Example higher-level semantic notations are statechart notation and data-flow notation. A test generator processes the hybrid diagram without reducing the higher-level semantic constructs to lower-level semantic constructs. The test generator generates test-generation templates as needed based on the higher-level semantic model used in the diagram. The test generator uses the test-generation templates to generate tests for a system-performing device specified by the diagram. The generated tests may be executed automatically by a test driver or manually by a human tester. | 2009-11-19 |
20090287959 | SYSTEM AND METHOD FOR TESTING COMPUTER - A test system includes at least one computer and a control circuit for testing the computer. The computer includes an input interface and an output interface. The control circuit is configured for sending test signals to the input interface and receiving feedback signals from the output interface for facilitating locating and recording errors during testing of the computer. A testing method for testing the computer is also disclosed. | 2009-11-19 |
20090287960 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR CPU SIGNATURING TO AIDE IN PERFORMANCE ANALYSIS - Methods, systems and computer program products for CPU signaturing to aide in performance analysis. Exemplary embodiments include a performance analysis method including identifying a workload having one or more testcases, assigning a CPU signature to each of the one or more testcases, calling a CPU signature application programming interface that toggles the CPU to generate the CPU signature, passing four parameters to the CPU signature application programming interface, prior to running each of the one or more testcases of the workload, generating the CPU signature, dynamically determining a run order of the one or more testcases at a run time of the workload and reviewing performance data during the running of each of the one or more testcases, each of the one or more testcases being identifiable by its respective CPU signature. | 2009-11-19 |
20090287961 | SYSTEMS AND METHODS FOR PROVIDING INTERACTIVE CUSTOMER SUPPORT - A system for providing device diagnostics includes a surface interface operatively linked and in communication with a processor. The surface interface includes a multi-touch interface to detect multiple simultaneous inputs and an object recognition interface to communicate with a device upon the device being placed on the surface interface. The system further includes a memory operatively linked and in communication with the processor, wherein the memory includes a system application configured to: recognize a customer device when the customer device is placed on the surface interface, conduct a diagnostic test to determine whether the device is operating without error, and perform a corrective action if the diagnostic test detects an error. | 2009-11-19 |
20090287962 | SOLUTION FOR AUTOMATICALLY INCORPORATING DIAGNOSTIC DATA WITHIN SCREEN CAPTURE IMAGES - The present invention can include an automated solution for incorporating diagnostic data within an image of a screen capture image. When a screen capture event is detected, a screen capture image can be generated. The software applications contained within the screen capture image can be identified. Diagnostic data pertaining to the identified software applications can be automatically collected and incorporated into the screen capture image file. | 2009-11-19 |
20090287963 | Method, Apparatus, And System For Automatic Test Generation From Statecharts - An apparatus and methods for generating a plurality of output test vectors from a statechart are provided. The statechart may specify requirements of a system function to be executed by a system-performing device. The statechart comprises a plurality of states, a plurality of transitions, and a plurality of variables. A forward-propagation pass through the statechart may be performed to generate a plurality of forward-reached-transition environments. A backward-propagation pass through the statechart may be performed to generate a plurality of backward-reached-transition environments. The plurality of output test vectors is generated from the plurality of forward-reached-transition environments and/or the plurality of backward-reached-transition environments. A test driver may execute a plurality of tests on the system-performing device, wherein the plurality of tests are based on the plurality of output test vectors. | 2009-11-19 |
20090287964 | INTERNET ACCESSIBLE TEST SYSTEM - An Internet accessible test system including: providing a remote client having an Internet connection; and exercising a tester function across the Internet connection by the remote client. | 2009-11-19 |
20090287965 | VERIFICATION SUPPORTING SYSTEM - A verification target register to be verified is specified from a configuration of a verification target circuit, and patterns requiring verification are extracted as a coverage standard with regard to the specified verification target register. When the patterns are extracted, a DIRW matrix is prepared to indicate possibly occurring state transitions among four states Declare, Initialize, Read, and Write in the register included in the verification target circuit, and used to decide two coverage standards, a matrix coverage standard and an implementation coverage standard. | 2009-11-19 |
20090287966 | METHOD AND APPARATUS FOR INEXPENSIVELY MONITORING AND CONTROLLING REMOTELY DISTRIBUTED APPLIANCES - A method and associated apparatus are described that enables unattended, remotely distributed appliances, such as vending machines, utility meters, thermostats and kitchen appliances (ovens, washing machines, refrigerators, etc.) to be connected inexpensively to each other and to a centrally located server. The apparatus 1) uses relatively simple “personality” modules to adapt the apparatus to the application in combination with a sophisticated core module that provides the intelligence needed to process data locally, to format that data and to transfer it to a remote server and 2) uses existing Internet-based communication links, thereby avoiding the costly proprietary links used with current state-of-the-art solutions. | 2009-11-19 |
20090287967 | Resilient Data Storage in the Presence of Replication Faults and Rolling Disasters - A method for data protection includes, in a first operational mode, sending data items for storage in a primary storage device and in a secondary storage device, while temporarily caching the data items in a disaster-proof storage unit and subsequently deleting the data items from the disaster-proof storage unit, wherein each data item is deleted from the disaster-proof storage unit upon successful storage of the data item in the secondary storage device. | 2009-11-19 |
20090287968 | NETWORK COMMUNICATION THROUGH A SPECIFIED INTERMEDIATE DESTINATION - This disclosure provides a method of routing communications over a network through an intermediate destination, and it also provides a “universal proxy” that may be used for this purpose. A host wishing to deliver information to a client sends packets as part of a first exchange or “session” to the intermediate destination, which performs error detection and recovery for received packets. The intermediate destination then (if desired) masks the source and transmits the information to the client in a second session, with the intermediate destination controlling transmission (e.g., specifying transmission protocol) and performing loss recovery as appropriate. This methodology enables a number of applications, including masquerading of source identity through the intermediate destination, and TCP acceleration (e.g., by subscribing to a service where the intermediate destination is used to accelerate communications or offer special types of processing or services). A “universal proxy” can be implemented as a single network appliance, accessible to act as a proxy from anywhere on a wide area network (e.g. the Internet, using an IP address). If desired, the universal proxy can also be configured as a two-way proxy. | 2009-11-19 |
20090287969 | ELECTRONIC APPARATUS AND BIT ERROR RATE TOLERANCE METHOD FOR PROGRAMMING NON-VOLATILE MEMORY DEVICES - The present invention provides an apparatus and method for using a bit error rate tolerance (BERT) technique for high-speed programming of non-volatile electronic memory devices. The device programmer is comprised of an embedded computer system and specialized electronic circuitry to interface to the device to be programmed. According to one aspect of the invention, the device programmer contains digital registers to accumulate the number of incorrect data bits encountered during the verification of the device programming operation. A field-programmable input to the device programmer specifies the BERT to be allowed at precise intervals within the device. Devices that are found to exceed the specified BERT shall be rejected. | 2009-11-19 |
20090287970 | COMMUNICATION TERMINAL DEVICE AND RECEPTION ENVIRONMENT REPORTING METHOD - A communication terminal device and a reception environment reporting method produce a more excellent throughput, by making a report of a reception environment with higher accuracy. An SIR measuring section measures an SIR from a reception signal that has been received from a base transceiver station. A CQI converter converts the SIR that has been measured by the SIR measuring section into a CQI value. A BLER calculating section calculates a block error rate of the reception signal. A CQI correcting section corrects the CQI value that has been calculated by the CQI converter, in accordance with the block error rate. A CQI transmitter transmits the CQI value that has been corrected by the CQI correcting section, to the base transceiver station. | 2009-11-19 |
20090287971 | METHOD AND APPARATUS FOR TESTING A RANDOM ACCESS MEMORY DEVICE - A method and apparatus for testing a random access memory device is provided. One embodiment involves providing an interface between Logic Built in Self Test (LBIST) and Array Built in Self Test (ABIST) paths for memory testing, including providing a cross-coupled NAND device with an LBIST test path; configuring the cross-coupled NAND device for interfacing ABIST and LBIST paths by modeling a worst case scenario for timing from a domino read static random access memory (SRAM) array; and modifying data in the cross-coupled NAND device using an LBIST controlled data path at essentially the latest point in time when a read may propagate from the array to provide full AC test coverage of down stream logic. | 2009-11-19 |
20090287972 | TEST METHOD FOR NONVOLATILE MEMORY DEVICE - A test method for nonvolatile memory devices where, in one aspect of the method, a specific operation mode is selected according to a signal input through a single I/O pin in a period in which a write enable signal is inactivated. The write enable signal or a read enable signal is activated according to the selected operation mode. A plurality of signals is input through the single I/O pin in a period in which the write enable signal is activated. The plurality of signals is output through the single I/O pin in a period in which the read enable signal is activated. | 2009-11-19 |
20090287973 | ACCELERATING SCAN TEST BY RE-USING RESPONSE DATA AS STIMULUS DATA ABSTRACT - Scan testing of plural target electrical circuits, such as circuits | 2009-11-19 |
20090287974 | Method of generating test condition for detecting delay faults in semiconductor integrated circuit and apparatus for generating the same - Various exemplary embodiments provide methods and apparatuses for generating test conditions that efficiently detect delay faults while preventing overkill. According to an exemplary embodiment, i) test timing correcting block sets test timing faster than the actual operation timing of a logical circuit to be tested, ii) logical simulation block performs simulation by using delay times of signal paths corrected by adding minimum slack margin, and iii) when the simulation indicates that an end-side flip-flop cannot acquire data after an expected transition of logical value, masking block generates mask data that masks data held in the end-side flip-flop. | 2009-11-19 |
20090287975 | Memory device and method of managing memory data error - Memory devices and/or methods of managing memory data errors are provided. A memory device detects and corrects an error bit of data read from a plurality of memory cells, and identifies a memory cell storing the detected error bit. The memory device assigns a verification voltage to each of the plurality of first memory cells, the assigned verification voltage corresponding to the corrected bit for the identified memory cell, the assigned verification voltage corresponding to the read data for the remaining memory cells. The memory device readjusts the data stored in the plurality of memory cells using the assigned verification voltage. Through this, it is possible to increase a retention period of the data of the memory device. | 2009-11-19 |
20090287976 | METHOD AND APPARATUS FOR EFFICIENTLY UTILIZING HARQ PROCESSES FOR SEMI-PERSISTENT AND DYNAMIC DATA TRANSMISSIONS - A method and apparatus are disclosed for efficient hybrid automatic repeat request (HARQ) process utilization for semi-persistent and dynamic data transmissions, wherein a reserved HARQ process identification (ID) can be reused. A subset of a plurality of HARQ process IDs is reserved to use for a semi-persistent allocation, and data is transmitted based on the semi-persistent allocation. A dynamic allocation is received via a physical downlink control channel (PDCCH). At least one of the reserved HARQ process IDs is selectively used for transmitting data based on the dynamic allocation. | 2009-11-19 |
20090287977 | EDGE incremental redundancy memory structure and memory management - A wireless device for implementing Incremental Redundancy (IR) operations includes an IR memory dedicated to storing data related to the IR operations. The IR memory includes a Type I IR memory adapted to store IR status information of a Radio Link Control (RLC) data block and a Type II IR memory adapted to store the RLC data block. | 2009-11-19 |
20090287978 | Operating Parameter Control for Integrated Circuit Signal Paths - An integrated circuit ( | 2009-11-19 |
20090287979 | SYSTEM AND METHOD FOR RELAY CODING - Systems and methods for providing relay in communications systems are disclosed. The relay may receive signals from user equipments (UEs) transmitting coded signals. The relay may receive turbo coded signals from the UEs. The relay station may encode a network channel for transmission to the base station using a recursive systematic convolutional (“RSC”) code. The use of RSC for the network code enables the base station to form as well a distributed turbo code as one can with the UE coded signals. In this manner the base station may recover the signal estimates for the UE signals with lower error probability when estimates at the relay station include errors due to imperfect reception. The use of the relay station and the RSC network code enables the base station to receive UE signals with lower error probability even when the transmission path from the UE is imperfect. | 2009-11-19 |
20090287980 | Computational Architecture for Soft Decoding - A device for soft decoding contains a set of operational elements, each being capable of performing one of several different functions. The operational elements may be dynamically configured with input and output connections to registers, memory locations, and other operational elements to perform various steps in a soft decoding scheme. In many cases, the operational elements may be configured to operate in a pipeline mode where many sequences of operations may be performed in parallel. Some embodiments may be reconfigured at each clock cycle to perform different steps during a decoding operation. The device may be used to perform several different soft decoding schemes with the flexibility of a programmable processor but the throughput of a hardware implementation. | 2009-11-19 |
20090287981 | Construction of Parity-Check Matrices for Non-Binarys LDPC Codes - A parity check matrix construction method for constructing a non-binary parity check matrix defining a non-binary LDPC code. In particular, a parity check matrix construction method for setting codewords able to stably give a superior decoding performance is provided. For this reason, the non-binary non-zero elements are selected so that the determinants of the partial matrices corresponding to the cycles in the parity check matrix do not become 0. Due to this, a non-binary parity check matrix able to give large weight codewords is constructed. | 2009-11-19 |
20090287982 | CORRECTING ERRORS IN LONGITUDINAL POSITION (LPOS) WORDS - The invention includes a method for longitudinal position (LPOS) detection in a magnetic tape storage system for storing data upon linear tape open (LTO) magnetic storage tape, which data includes odd and even 36-bit LPOS words with error correcting ability. The method includes steps of encoding positional information onto the magnetic storage tape within the odd and even 36-bit LPOS words using each LPOS word's 8-bit sync mark field, Sy, and six of each LPOS word's 4-bit symbol fields, L | 2009-11-19 |
20090287983 | Decoding method and error correction method of a cyclic code decoder - A decoding method of a cyclic code decoder includes the machine-implemented steps of: establishing a lookup table; receiving a codeword; computing a syndrome and a Hamming weight; if the Hamming weight is not equal to zero and not greater than an error correcting capability value, performing a first error correcting operation; if the Hamming weight is greater than the error correcting capability value, and if the syndrome has a matching syndrome pattern in the lookup table, performing a second error correcting operation; if a second Hamming weight corresponding to a syndrome difference is smaller than a check value, performing a third error correcting operation, otherwise performing a fourth error correcting operation; and if a counter value is greater than zero, performing a fifth error correcting operation before decoding a corrected codeword. | 2009-11-19 |
20090287984 | Blind Transport Format Detection Based on Decoder Metric - The present invention relates to a receiver device and method of detecting a block length of a data block in a data network, wherein a respective theoretical maximum value for a metric of a decoding operation is calculated for each of a plurality of candidate block lengths, and the calculated respective theoretical maximum value is compared to a respective actual value of the metric obtained for each of the plurality of candidate block lengths by the decoding operation. The candidate block length with the highest ratio between the respective actual value and the respective theoretical maximum value is then selected from the plurality of candidate block lengths to determine the block length of the data block. | 2009-11-19 |
20090287985 | Apparatus and method for frame transmission - An apparatus for frame transmission includes a dummy data inserting unit that inserts dummy data, at timing of an interval in which a received frame input intermittently is not detected, in a sequence of processing processes of scrambling processing of user data cut out from the received frame, reading-out of the data after the scrambling processing with a parity appended thereto from a memory and parity checking thereof, and descrambling processing of the data after the parity checking, and an error determining unit that determines whether an error is occurring in the sequence of the processing processes, based on the dummy data obtained by the descrambling processing of the dummy data inserted in the sequence of the processing processes by the dummy data inserting unit. | 2009-11-19 |
20090287986 | MANAGING STORAGE OF INDIVIDUALLY ACCESSIBLE DATA UNITS - A method includes determining a length of a file and storing the length of the file in a first memory location. An endpoint of a last complete record within the file is determined and the endpoint is stored in a second memory location. The length of the file stored in the first memory location is compared to a current length of the file, and a data structure associated with the file is updated beginning at the endpoint if the current length of the file exceeds the length of the file stored in the first memory location. | 2009-11-19 |
20090287987 | NON-DESTRUCTIVE MEDIA PRESENTATION DERIVATIVES - The claimed subject matter relates to various architectures that can, inter alia, facilitate creation of a synch file as well as facilitate interpretation of the synch file. Both creation and interpretation can be accomplished in conjunction with an original media asset. The synch file can include transformation commands that can operate on a presentation of the asset rather than upon the asset itself. Accordingly, what is actually perceived by a content consumer during a presentation of the asset need not be exactly what the asset creator fixed in a tangible medium. Rather, the content consumer can observe a derivative media presentation based upon interpretation of the synch file. | 2009-11-19 |
20090287988 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTOMATICALLY AND SECURELY CITING AND TRANSFERRING ELECTRONICALLY FORMATTED INFORMATION AND FOR MAINTAINING ASSOCIATION BETWEEN THE CITED OR TRANSFERRED INFORMATION AND BACK-END INFORMATION - Methods, systems, and computer readable media for automatically and securely citing and transferring electronically formatted information and for maintaining association between the cited or transferred information and back-end information are disclosed. According to one method, a selection of media content copied from an electronic source is received. The selection of media content is inserted into an electronic destination. Citation information is automatically determined for the selection of media content by parsing a data structure provided by an author or publisher of the media content. The citation information is automatically inserted into the electronic destination. The inserted selection of media content and the citation are made uneditable. | 2009-11-19 |
20090287989 | PRESENTING TAG CLOUDS BASED ON USER INFORMATION - In some embodiments, a method comprises detecting a request to display a tag cloud, where the tag cloud includes a plurality of tags and the tags hyperlink to related web content. The method can also comprise determining a user's interests and preferences based on the information provided by the user. The method can include using the information to determine the tags relevant to the user's preferences and interests. The method can also include displaying the tags in the tag cloud. | 2009-11-19 |
20090287990 | SYSTEMS AND METHODS FOR DYNAMICALLY GENERATING GRAPHICAL MEMORABILIA PROJECTS FOR PRESENTATION AND USE - Systems and methods for generating and physically rendering graphical memorabilia projects are described herein. Generally, the methods comprise providing and organizing photos, selecting a theme-based kit, selecting a dynamic page layout template, selecting a design and color palette, personalizing a memorabilia project comprising the template, and physically rendering the memorabilia project. The page layout template is pre-designed template and configured to be selectively rotated and/or swapped to provide a refreshing theme and/or look, and can be used to more effectively utilize the memorabilia available for mounting and/or storage. The ability to rotate and/or swap the templates enables a user to reuse pre-established templates to create new looks and presentations. In one aspect, the described system is a web-based service that does not require any software to be installed on the user's computer device other than a web browser. | 2009-11-19 |
20090287991 | GENERATION OF FUSIBLE SIGNATURES FOR FUSION OF HETEROGENOUS DATA - Methods, computer-executable instructions on computer-readable media, and systems for generating fusible signatures for information contained in two or more corpora of data. The fusible signatures can allow the information from the separate corpora of data to be merged, or fused, into a single information space that allows information analysts to explore, analyze, and/or further process the fused data. Prior to manipulation by the embodiments of the present invention, the information contained in at least one of the individual corpora of data is typically represented by initial signatures that are not directly fusible with information in the other corpora of data because of differences, for example, in dimensionality, source, data type, basis, and/or the space in which the initial signatures reside. | 2009-11-19 |
20090287992 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR CREATING AND MODIFYING LABELS USED BY PHARMACEUTICAL DISPENSING SYSTEMS - Apparatus, methods and computer program products for creating and modifying labels for use by pharmaceutical dispensing machines are provided. A pharmaceutical dispensing apparatus includes a touch screen, a processor, memory coupled to the processor, and a computer program residing in the memory that is executable by the processor for guiding a user through a process of designing a label via the touch screen. The computer program displays a label template adapted to receive a plurality of data fields inputted by a user therein, wherein each data field is adapted to receive and display respective data. The computer program includes a label wizard that guides a user through the process of designing a label within the label template. | 2009-11-19 |
20090287993 | MANAGEMENT DEVICE AND METHOD THEREOF - A main control unit determines whether or not a previous version with which comparison is to be made exists regarding a document stored in a session storage unit. Next, confirmation is made regarding whether or not there is difference between both compared objects, and the control unit determines whether or not there is difference. The main control unit then executes an action embedded in the attributes of the object data. The object data with difference that has been saved in the session information storage unit is saved in a document information storage unit. | 2009-11-19 |
20090287994 | DOCUMENT PROCESSING DEVICE AND DOCUMENT PROCESSING METHOD - A technology is provided which presents a summary of a document in an easy-to-understand manner. An acquisition unit of a document processing apparatus acquires a document described in a markup language. A condition setting unit sets a condition for display of an outline of a document for each tag set of the markup language. A condition memory unit stores the condition for display thus set. An outline view creating unit reads, when a request for displaying an outline of a document acquired by the acquisition unit is accepted, from the condition memory unit the condition for display corresponding to a tag set included in the document, and creates a display of an outline of the document, based upon the condition. | 2009-11-19 |
20090287995 | Method and Apparatus of Dynamic Updating Web Portals - The web portal's contents management becomes complex and sometime tedious job. There are needs for an efficient and cost effective way to manage large volumes of the web contents for web portals. The posting and withdrawing operation of the present invention has provided a means for making the tasks of updating and managing web portal's contents become much easy and efficient due to the principle of the parallelism can be deployed. | 2009-11-19 |
20090287996 | IMAGE LAYOUT DEVICE, RECORDING MEDIUM, AND IMAGE LAYOUT METHOD - The image layout device configured to enable users to lay out images includes a layout data storing unit configured to store layout data sets that specify image arrangement regions for laying out the images, a layout selecting unit configured to automatically select the layout data set from the layout data storing unit based on a number of the users, an image storing unit configured to store images, one or more position instructing unit configured to select an image to be arranged based on the selected layout data set from stored images, and provide an instruction regarding an arrangement location with respect to the layout data set for the selected image and a layout processing unit configured to determine whether or not an instruction from the instructing unit is executable and, if it is executable, arrange the selected image in accordance with the selected layout data set. | 2009-11-19 |
20090287997 | System and Method for the On Screen Synchronization of Selection in Virtual Document - Disclosed is a system and method for synchronizing virtual and physical documents. The system can be used in conjunction with screen reading software for synchronizing the screen reader's virtual representation of a component to components that are visually displayed to a sighted user. | 2009-11-19 |
20090287998 | Text Creating and Editing System and Method with Dynamic Data Loading - The present invention is directed to a system and method for creating and editing documents or messages by dynamically loading the required data on the computing device as the documents or messages are being created or edited. This invention has relevance for creating or editing documents or messages in non-English languages using a computing device that is pre-configured to create English documents or messages, but not non-English documents or messages. Further, the present invention allows a user to create and edit documents and messages on a computing device that may not have been configured a priori or have limited storage capability to support the entire data set required for creating the documents or messages in a specific language. The computing device is required to communicate with a data storage device to dynamically load the required data from therein. | 2009-11-19 |
20090287999 | INFORMATION PROCESSING DEVICE AND DISPLAY INFORMATION EDITING METHOD OF INFORMATION PROCESSING DEVICE - An information processing device of an aspect of the invention has display means having a display region; operation means, having a contact region, for outputting a position signal indicating the position of a contact operation in the contact region; range decision means for deciding a target range of the display region based on the position signals for two points from the operation means; processing menu display means for causing the display means to display a processing menu at a position corresponding to the target range of the display region; processing decision means for deciding the processing of the processing menu corresponding to the position of the contact operation in the contact region; and processing execution means for executing the processing on the target range of the display region. | 2009-11-19 |
20090288000 | INTERACTIVE APPLICATION FOR ACCESSING INFORMATION ABOUT A CONDITION - Generally described, aspects of the disclosed subject matter are directed to computer systems that allow information regarding a condition, such as a skincare condition, to be accessed over the network. In accordance with one embodiment, a method is provided that allows a user associated with the client computing device to obtain information about a condition utilizing an intuitive and readily understandable user interface. In this regard, the method includes providing a user interface having controls that allow the user associated with the client computing device to identify a relevant condition without performing a keyword search. Input identifying the relevant condition is received based on one or more selections of graphical controls available from the user interface. In response, the method causes information associated with the selected condition to be presented to the user. | 2009-11-19 |
20090288001 | TRIGGER EVENT BASED DATA FEED OF VIRTUAL UNIVERSE DATA - Business owners in a virtual universe may want to create a data source that transmits a data feed when certain parameters are met. Functionality can be implemented within a virtual universe to create a data feed when a trigger event occurs. The data feed may include data about the trigger event itself and/or about an avatar that caused the trigger. Triggered data feeds can be used to derive statistics, monitor use of objects and space and bill for such use, etc. In such cases, the user may be notified, such as via email, of the new data feed, as well as instructions on how to subscribe to it in their RSS reader or other client. Alternatively, users may be given individual feeds wherein additional feeds are distributed as separate categories of the user's feed as opposed to creating a separate feed. | 2009-11-19 |
20090288002 | VIRTUAL UNIVERSE TELEPORTATION SUGGESTION SERVICE - The present invention is directed to a system, method and program product for providing teleportation suggestions to avatars in a virtual universe. A service is provided that determines the set of teleportation suggestions for the avatar based on at least one of: an inventory analysis of the avatar, a historical teleportation analysis of the avatar, a motion analysis of the avatar, a social network analysis of the avatar, or a ratings analysis of locations within the virtual universe. | 2009-11-19 |
20090288003 | Cost effective system and method for monitoring machinery units - The present software and hardware system provides monitoring and adaptive operator communication and software for a plurality of machinery units ( | 2009-11-19 |
20090288004 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A NOTIFICATION OF WIDGET AVAILABILITY - A method of providing a notification of widget availability may include receiving an indication of a visited location associated with a user, determining whether the visited location is associated with a widget on a device associated with the user, and providing a notification to the user of an availability of the widget for installation on the device based on the determining. | 2009-11-19 |
20090288005 | Display of Supplementary Information on a Graphical User Interface - Disclosed are method and apparatus for displaying supplementary information on a graphical user interface. A request for supplementary information is received. The supplementary information is retrieved and displayed in a reserved display field in a graphical user interface. The reserved display field may be configured by a user to adapt to specific applications, but remains stationary throughout the user session. The reserved display field does not obstruct any other display fields in the graphical user interface. A request for supplementary information may be generated by using a mouse to first position a cursor over an active display element. A request for supplementary information associated with the active display element may be generated by clicking the mouse, or by holding the cursor stationary for a time interval greater than a threshold dwell time. | 2009-11-19 |
20090288006 | MULTI-DIMENSIONAL DOCUMENTS LOCATING SYSTEM AND METHOD - A method of visualizing and manipulating data on a display of a computer is provided, the method comprising retrieving a plurality of documents from a file system operably connected to the computer, each said document having at least one attribute associated therewith; graphically organizing the plurality of documents retrieved from the file system along a first substantially linear axis on the display; selecting a selected attribute associated with a selected document, the selected document being selected from among the plurality of documents organized along the first substantially linear axis; and graphically organizing a subset of the plurality of documents retrieved from the file system along a second substantially linear axis on the display, the first and second axes being organized such that the first and second substantially linear axes are non-parallel to one another, wherein the subset of the plurality of documents only includes documents having attributes associated therewith that match the selected attribute. A program, an interface and a system thereof are also provided. | 2009-11-19 |