Patent application number | Description | Published |
20140139530 | SYSTEMS AND METHODS FOR USER VIEWABLE TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal. For example, the client can display a selected character string in its entirety or an excerpt of the truncated representation. The signal can be detected from a touchscreen or input device. This allows a user to view those portions of the selected character string that may be obscured by the truncation symbol. | 05-22-2014 |
20140143662 | Systems and Methods for User Modifiable Truncation - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol. | 05-22-2014 |
20140143663 | SYSTEMS AND METHODS FOR PROVIDING CONTEXTUAL BASED TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. A client can perform contextual based truncations of character strings using at least one truncation symbol when the characters strings extend beyond the width of an output display. The client can analyze the character strings for differences and similarities. The client can then generate the truncated representations of the character strings based on predetermined parameters for truncation. The truncated representations can include similar and different portions of the character strings that maintain descriptive information that differentiates them. | 05-22-2014 |
20140149499 | REMOTE REQUEST FULFILLMENT AND DELIVERY - Systems and methods are described for described for providing remote request fulfillment and delivery. A computerized method of sharing and distributing data among computing devices includes receiving at a server a request from a first computing device, wherein the request targets a second computing device and contains information about a data object, retrieving, using the server, at least a portion of the data object from a source of the data object, determining, using the server, attributes of the second computing device, adapting at least a portion of the data object according to the attributes of the second computing device, and notifying the second computing device of an availability of the data object. | 05-29-2014 |
20140188802 | PULL AND PASTE - Systems and methods are described for providing pull and paste functionalities. A computerized method of pulling and pasting data among computing devices includes determining attributes of a first computing device, transmitting the attributes of the first computing device to a second computing device, receiving a pulling request for copying information from the first computing device to the second computing device, wherein the information resides on the first computing device, automatically processing the pulling request at the first computing device and automatically generating a response to the pulling request, and automatically sending the response to the pulling request back to the second computing device, wherein the response contains the information. | 07-03-2014 |
20140281583 | STORING ENCRYPTED CONTENTS IN DIGITAL ARCHIVES - A digital archive for storing encrypted content includes a header section and a body. The header section includes real headers, wherein at least a portion of each real headers is encrypted, and fake headers, wherein each of the fake headers is filled with cryptographically random bytes, wherein the fake headers are substantially more than the real headers. The body includes real contents, wherein at least a portion of each real content is encrypted, and fake contents in the rest of the body, wherein the fake content contains additional cryptographically random bytes, wherein the amount of the fake content is substantially greater than the amount of the real contents, wherein each of the real headers refers to a corresponding real content in the body and contains decryption information for the corresponding real content. | 09-18-2014 |
20140337495 | WEB EVENT FRAMEWORK - Systems and methods are described for a web event framework. A computerized method includes receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin. | 11-13-2014 |
20140380231 | SYSTEMS AND METHODS FOR PROTECTING A USER INTERFACE COMPONENT FROM ACCIDENTAL OPERATION - Systems and methods are provided for protecting a user interface component from accidental operation. A user interface component is displayed that cannot be operated that includes an area and is associated with an action that can be invoked when the user interface component can be operated. Data indicative of an interaction with the user interface component is received. A portion of the area of the user interface component is modified based on the user interaction. If the modified portion is greater than a predetermined threshold, the user interface component is activated such that the user interface component can be operated to invoke the associated action. | 12-25-2014 |