Patent application number | Description | Published |
20090019437 | Application management and execution system and method thereof - The invention discloses an application management and execution system and a method thereof. The application management and execution system comprises a virtual machine monitor for managing at least one virtual machine; the at least one virtual machine for processing at least one application, and storing, separately and respectively, application data used by each application and platform data required by the virtual machine for processing the application in one or more storage disk (persistent storage), and reading the application data and the platform data from the one or more storage devices respectively. The at least one application executing on the virtual machine may share the platform data in the one or more storage devices. When the virtual machine executes the at least one application, it may modify the application data in the storage devices. | 01-15-2009 |
20090144582 | ANTI-VIRUS METHOD BASED ON SECURITY CHIP - An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip. If all the computer key files are integral, the operating system is started; on the contrary, if any of the computer key file is not integral, it will be restored using the backup file of the computer key file stored in the backup storage area. | 06-04-2009 |
20090177883 | METHOD AND DEVICE FOR ONLINE SECURE LOGGING-ON - The invention discloses a method for an online secure logging-on, comprises steps of: determining a correlation between at least one of processes and a logging-on operation; sorting the at least one of processes to two classes, that is, processes related to the logging-on operation and processes unrelated to the logging-on operation; running at least one of the processes related to the logging-on operation, when the logging-on operation is performed and a number of the processes related to the logging-on operation is one or more; and suspending at least one of the 1o processes unrelated to the logging-on operation, when the logging-on operation is performed and a number of the processes unrelated to the logging-on operation is one or more. The scheme of the present invention utilizes a real-time protection, needs less monitoring on the operating system and is easy to guarantee the stability. Since most processes of the operating system are suspended, the protection is more reliable. Corresponding to the method, the present invention also provides a device for an online secure logging-on. | 07-09-2009 |
20100174943 | METHOD FOR RESTORING CLIENT OPERATING SYSTEM-BASED SYSTEM, VIRTUAL MACHINE MANAGER AND SYSTEM USING THE SAME - The present invention provides a method for restoring a client operating system-based system, a virtual machine manager and a virtual machine manager system using the same. The method comprises steps of: receiving a restoration instruction for the client operating system and suspending running the client operating system after receiving the restoration instruction, the restoration instruction including a preset restoration point; determining a first memory snapshot and a first incremental file corresponding to the restoration point, the first memory snapshot being a memory snapshot for the client operating system, which is created when setting the restoration point, and the first incremental file being an incremental file, which is mapped as the first hard disk when setting the restoration point; re-mapping the first incremental file as the first hard disk; and performing a snapshot recovery based on the first memory snapshot. With the present invention, system restoration may be performed rapidly. | 07-08-2010 |
20100215094 | VIDEO DECODING - A method of decoding a digital video file comprising a plurality of encoded frames each having a first number of pixels, each encoded frame composed of an integer multiple of n-order square matrices, the method comprising: i) for each n-order square matrix, performing an inverse discrete cosine transformation on the n-order square matrix to produce an m-order square matrix, where m08-26-2010 | |
20120310746 | LEARNED CONTEXT CORRELATION THROUGH NETWORK COMMUNICATION OBSERVATIONS - Establishing a correlation between a user's context and wireless signal observations from that context enables wireless computing devices to provide users with targeted information. Rather than performing an expensive calibration, mobile sensor data indicative of a user's context is bundled with wireless signal observations and transmitted to server computing devices that can obtain a context from the mobile sensor data, correlate that to the wireless signal observations, and store the same in a context/wireless correlations database. When other wireless computing devices request a context based on wireless signal observations made by those wireless computing devices, reference can be made to the database and a context correlated to those wireless signal observations is obtained and provided to them, enabling targeted information to be delivered to their users. To accommodate heterogeneity among wireless computing devices the database maintains correlations according to the wireless computing devices from which the data originated. | 12-06-2012 |
20130082774 | LINEARITY POWER AMPLIFICATION DEVICE - A linearity power amplification device is provided. The device comprises a divider, a combiner, n−1 first signal paths, and a second signal path coupled between the divider and the combiner. The first signal path comprises a main invariable attenuator connected to the divider, a first power amplifier connected to the combiner, and a first attenuator and a first shifter coupled between the first power amplifier and the main invariable attenuator. The second signal path comprises a main amplification circuit, and an error calibration circuit. | 04-04-2013 |
20130129326 | VIDEO PLAYER - A method for down sampling data comprising the steps of down-sampling the data; and carrying out a motion compensation step on the down-sampled data which motion compensation step is carried out in the frequency domain, further comprising the step of transforming the data back to the spatial domain after the step of motion compensation has been performed. | 05-23-2013 |
20130166879 | MULTIPROCESSOR SYSTEM AND SYNCHRONOUS ENGINE DEVICE THEREOF - The invention discloses a multiprocessor System and synchronous engine device thereof. the synchronous engine includes: a plurality of storage queues, wherein one of the queues stores all synchronization primitives from one of the processors; a plurality of scheduling modules, selecting the synchronization primitives for execution from the plurality of storage queues and then according to the type of the synchronization primitive transmitting the selected synchronization primitives to corresponding processing modules for processing, scheduling modules corresponding in a one-to-one relationship with the storage queues; a plurality of processing modules, receiving the transmitted synchronization primitives to execute different functions; a virtual synchronous memory structure module, using small memory space and mapping main memory spaces of all processors into a synchronization memory structure to realize the function of all synchronization primitives through a control logic; a main memory port, communicating with virtual synchronous memory structure module to read and write the main memory of all processors, and initiate an interrupt request to processors; a configuration register, storing various configuration information required by processing modules. | 06-27-2013 |
20130193965 | BODY/HEAD COIL SWITCHING METHOD, A POWER AMPLIFIER COMPONENT AND A MRI SYSTEM - A method for implementing a switching between a body coil and a head coil in a nuclear magnetic resonance imaging system comprising the body coil, the head coil and a power amplifier component, wherein the power amplifier component comprises sets of power amplifiers, each set of power amplifiers comprising channels of power amplifiers combined by a Wilkinson circuit, a combiner configured to combine signals from the sets of power amplifiers and to connect the sets of power amplifiers to the body coil, a first switching device comprising a first terminal configured to be grounded, a second switching device connected in series in a resistor branch of the Wilkinson circuit, and a ¼ wavelength transformation transmission line located between the second switching device and the head coil, the method comprising connecting the power amplifier component to the body coil or the head coil by setting states of both switching devices. | 08-01-2013 |
20130260693 | PROXIMATE BEACON IDENTIFICATION - Among other things, one or more techniques and/or systems are disclosed for identifying a proximate beacon to a mobile device. One or more first received signal strengths (RSSs), relative to the mobile device, may be received and used to determine a first average signal strength (RSS) and a first average RSS deviation for a first beacon during an observation period. An average RSS deviation for the observation period can be determined using the first average RSS deviation (e.g., and other average RSS deviations). If the average RSS deviation meets a desired deviation threshold, the first beacon may be identified as the proximate beacon. In this manner, if the user of the mobile device consents to the same, the user may be provided with relevant information (e.g., advertisements) on the mobile device while in a locale (e.g., store) corresponding to the (known) location of the beacon, for example. | 10-03-2013 |
20130260781 | LOCATING A MOBILE DEVICE - One or more techniques and/or systems are disclosed for identifying a location of a mobile device (e.g., with user consent). A set of one or more indications of received signal strength (RSS) may be received, comprising a first RSS from a first access point (AP). The set of RSS indications may be used to identify a grid area, comprising a first grid space. An expected distance between the first grid space and the first AP may be identified using the first RSS. The expected distance can be combined with a first known distance between the first grid space and the first AP to determine a first grid score for the first grid space. A second grid score may be determined for a second grid space (e.g., and a third, fourth, etc.), and the grid space comprising a desired grid score (e.g., highest) may be selected as the mobile device location. | 10-03-2013 |
20130260782 | LOCATING A MOBILE DEVICE - Identifying a location of a mobile device is disclosed (e.g., presuming user consent to the same). One or more received signal strengths (RSSs), comprising a first RSS, may be received by a first access point (AP) from the mobile device. The RSSs may be used to identify a grid area, comprising a first grid space. A signal distance between the first grid space and the first AP may be identified using the first RSS, and combined with a first grid space distance, comprising a known distance between the first grid space and the first AP, to determine a first grid space likelihood score for the first grid space. A second grid space likelihood score may be determined for a second grid space (e.g., and a third, etc.), and the grid space comprising a desired grid space likelihood score (e.g., highest) may be selected as the mobile device location. | 10-03-2013 |
20140120461 | MASK PLATE AND MANUFACTURING METHOD THEREOF - Embodiments of the present invention disclose a mask plate and a manufacturing method thereof. The mask plate includes a mask plate body and a transmissive member, wherein the mask plate body has a transmissive part and a non-transmissive part adjacent to the transmissive part, the transmissive member is disposed corresponding to the transmissive part of the mask plate body, the absorbance of the transmissive member progressively increases in a direction away from a center region of the transmissive member to a edges region of the transmissive member close to the non-transmissive part. | 05-01-2014 |
20140163864 | LOCATING POSITION WITHIN ENCLOSURE - Among other things, one or more techniques and/or systems are provided for locating a position within an enclosure. In one example, known global coordinates (e.g., GPS coordinates of latitude/longitude) associated with the position within the enclosure may be transformed into local coordinates (e.g., x/y coordinates) for the position. The local coordinates may be used for tracking a location of the position within the enclosure. In another example, known local coordinates of the position within the enclosure may be transformed into global coordinates for the position, which may be used for tracking a location of the position within the enclosure. In another example, a blueprint image of the enclosure may be used to track a location of the position within the enclosure. In this way, location tracking may be provided for objects within indoor spaces (e.g., a mapping application may track a current position of a mobile device within a building). | 06-12-2014 |
20150031392 | PROXIMATE BEACON IDENTIFICATION - Among other things, one or more techniques and/or systems are disclosed for identifying a proximate beacon to a mobile device. One or more first received signal strengths (RSSs), relative to the mobile device, may be received and used to determine a first average signal strength (RSS) and a first average RSS deviation for a first beacon during an observation period. An average RSS deviation for the observation period can be determined using the first average RSS deviation (e.g., and other average RSS deviations). If the average RSS deviation meets a desired deviation threshold, the first beacon may be identified as the proximate beacon. In this manner, if the user of the mobile device consents to the same, the user may be provided with relevant information (e.g., advertisements) on the mobile device while in a locale (e.g., store) corresponding to the (known) location of the beacon, for example. | 01-29-2015 |