Joffray
Flynn Joffray, Vashon, WA US
Patent application number | Description | Published |
---|---|---|
20130159839 | SEMANTIC COMPRESSION OF CASCADING STYLE SHEETS - Embodiments relate to semantic compression of cascading style sheets. Starting with a markup page having markup elements and a reference to a cascading style sheet, based on the reference to the cascading style sheet, the cascading style sheet is retrieved. The cascading style sheet has a plurality of style rules. The cascading style sheet is applied to the markup page to identify one or more of the style rules to be modified or omitted (e.g., rules that are redundant with respect to the markup page or inapplicable to the markup page). A compressed cascading style sheet is generated by excluding the identified rules from the compressed cascading style sheet or modifying the identified rules. The compressed cascading style sheet can then be applied to the markup sheet with similar effect as the uncompressed cascading style sheet. | 06-20-2013 |
20130159858 | COLLABORATIVE MEDIA SHARING - A media party network service manages a set of media parties and a set of users of the media party service. Managing the media parties can involve instantiating new media parties according to input from the users, allowing the users to join the media parties, and tracking which users are participating in which media parties. Managing a given one of the media parties may include maintaining a queue of media items, allowing users in the media party to provide input to add media items to the queue and to provide input to skip media items in the queue. The media party service streams the given one of the media parties to client devices of the users currently in the given media party such that all of the client devices are currently displaying substantially a same part of a media item in the corresponding queue. | 06-20-2013 |
Flynn Joffray, Santa Cruz, CA US
Patent application number | Description | Published |
---|---|---|
20140365341 | STORE OF THE FUTURE - Techniques for facilitating commerce and retail transactions are described. According to various embodiments, a user selection of a product item offered for sale by a retail store is received, via a shoppable window user interface associated with the retail store. Thereafter, a user request to perform a checkout process for purchase of the product item is received, via the shoppable window user interface. The checkout process for the purchase of the product item is then performed, via a user interface displayed on a smartphone associated with the user. | 12-11-2014 |
Flynn Thayer Joffray, Vashon, WA US
Patent application number | Description | Published |
---|---|---|
20130103447 | USING SOCIAL AND CONTEXTUAL MECHANICS TO AID TASK COMPLETION - A user declares an intention to perform a task in a social network. The system allows others, connected to the user within the social network, to provide social input that expresses interest in the task declared by the user and uses social mechanics to express support to the user and to assist in keeping the user motivated to perform the task. When the task is complete, the system notifies the other users (the stakeholders) and awards incentive. | 04-25-2013 |
Olivier Joffray, Feucherolles FR
Patent application number | Description | Published |
---|---|---|
20100262835 | METHOD AND SYSTEM FOR OBTAINING A PIN VALIDATION SIGNAL IN A DATA PROCESSING UNIT - The present invention relates to a method for obtaining a PIN validation signal in a data processing unit, the method including the steps of receiving a PIN in the data processing unit, submitting it to a first portable object for verifying it and obtaining a validation signal. The method further includes the steps of catching or receiving an entered PIN directly in said first portable object for verifying it; transmitting a fake PIN to the data processing unit, the fake PIN being seen by the data processing unit as a PIN to submit to the first portable object for verifying it, and returning a validation signal in case the entered PIN is verified successfully in the first portable object. The invention relates also to corresponding system and secure portable object. | 10-14-2010 |
20100287610 | METHOD FOR PROTECTING THE ACCESS TO AN ELECTRONIC OBJECT CONNECTED TO A COMPUTER - An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object. | 11-11-2010 |
20120102278 | METHOD FOR PERSONALISING AN ELECTRONIC DEVICE, ASSOCIATED DATA PROCESSING METHOD AND DEVICE - The invention relates to any electronic device such as a chip card, a passport, a dongle or any other object requiring personalization of the content of a memory. More precisely, the invention provides for a method for processing a data item of a container stored in a memory, said method being implemented by the electronic device by utilizing in particular a table of identifiers. The invention furthermore provides for a prior step for associating a data identifier with a data item of a container and creating said table of identifiers. | 04-26-2012 |
Olivier Joffray, Meudon FR
Patent application number | Description | Published |
---|---|---|
20110239307 | METHOD FOR SECURING JAVA BYTECODE - The invention relates to a virtual machine. The virtual machine is set to recognize, in addition to a set of conventional bytecodes, at least one secure bytecode functionally equivalent to one of the conventional bytecodes. It is set to process secure bytecodes with increased security, while it is set to process conventional bytecodes with increased speed. The invention also relates to a computing device comprising such a virtual machine, to a procedure for generating bytecode executable by such a virtual machine, and to an applet development tool comprising such procedure. | 09-29-2011 |
20120102237 | DEVICE WITH TIME LIMITED USE AUTO START APPLICATION - (EN) The invention relates to a portable electronic device (SC, TK) comprising electric input means (VCC, GND, ANT) for receiving electric power from an external power supply. The portable electronic device (SC, TK) comprises an application, the application being set to be triggered when power is supplied to said electric input means (VCC, GND, ANT), and to not communicate with entities external to the portable electronic device (SC, TK), or to only notify such entities of an event. The application is further set to configure the portable electronic device (SC, TK), and to be successfully executable at most once. The invention also relate to a manufacturing equipment (M) for configuring a portable electronic device (SC, TK) and to a method for configuring a portable electronic device (SC, TK). | 04-26-2012 |