Patent application number | Description | Published |
20080222622 | Isolating, managing and communicating with user interface elements - Various technologies and techniques are disclosed that allow a user interface in a managed runtime environment to display content from two or more different partitioned process spaces. A software application having a user interface operates a managed runtime environment. A window handle allows a user interface of the application to display content from different partitioned process spaces at a same time. Information from the partitioned process spaces can be integrated within the user interface while preserving a level of isolation between the partioned process spaces. This is accomplished by providing a first portion of a content container for the user interface with a host control that contains the window handle and resides in a first partitioned process space of a main window. A second portion of the content container is provided with a source control that provides the window handle and resides in a second partitioned process space. | 09-11-2008 |
20090132578 | LAYOUT MANAGER - Various technologies and techniques are disclosed for managing layout updates to user interface elements. A dirty state of user interface elements is tracked in a tree with multiple nodes of user interface elements. The dirty state allows dirty subtrees of the nodes to be identified. A root node is identified for each of the dirty subtrees. Affected portions of the tree are updated, starting with the root node that was identified for each of the dirty subtrees. As part of the update process, changes to ancestor nodes are detected and used to make a layout process more efficient. For example, any layout processes that are currently being performed on any descendant nodes of a changed ancestor are abandoned, and the layout process is resumed at the changed ancestor. After updating affected portions of the tree, the updated user interface elements are then rendered on an output device. | 05-21-2009 |
20100199198 | LAYOUT OF USER INTERFACE ELEMENTS - User interface frameworks may provide an environment for developers to design and arrange user interface elements within a design layout to create a user interface. Many times UI elements comprise non-integer size values (e.g., height, width, position, etc.) due to text, user specified data, and/or centering, for example. Rendering UI elements at non-integer size values may create display artifacts because of sub-pixel rendering. Accordingly, as provided herein, a set of rules may be applied during design layout to non-integer size values to create integer size values (e.g., non-integer size values may be rounded to the nearest integer). Using integer size values in arranging UI elements within a design layout, allows undesirable display artifacts to be mitigated during rendering. | 08-05-2010 |
20110307809 | RENDERING WEB CONTENT WITH A BRUSH - A content display system is described herein that combines the positive attributes of brushes and web content by allowing web content to be applied as a brush. The content display system renders web content and creates a bitmap of the rendered web content. The bitmap of the web content as rendered by a web host is captured and used as the pixels for a web brush. The brush can be used wherever other types of brushes can be used. In some embodiments, the brush content is refreshed under control of the application. Web content provided through a brush is much more versatile than simply compositing rendered HTML with other visuals. Thus, the content display system allows applications to display web content inside an application sandbox or other platform using the familiar form to application developers of a brush. | 12-15-2011 |
Patent application number | Description | Published |
20100083125 | CONNECTED ADDRESS BOOK SYSTEMS AND METHODS - In an exemplary method, contacts data for a network address book is maintained, data representative of at least a portion of a local address book maintained on an access device is received over a network, and the received local address book data is used to perform at least one connected address book operation. In one example in which the contacts data includes data representative of a network address book listing associated with a user, data representative of a persona associated with the user is maintained, a request to access the network address book listing is received, and at least a subset of the data representative of the network address book listing is identified and provided in response to the request and based at least in part on the persona. | 04-01-2010 |
20100083190 | TOUCH GESTURE INTERFACE APPARATUSES, SYSTEMS, AND METHODS - In certain embodiments, an object touch is detected on a touch screen display, a touch gesture interface is displayed on the touch screen display in response to the object touch, a touch gesture is detected on the touch screen display, and an action is performed based on the touch gesture. In certain embodiments, the touch gesture includes a directional touch gesture in a direction away from a position of the object touch on a surface of the touch screen display. In certain embodiments, the touch gesture interface includes a plurality of selectable options, and the action includes one of navigating through the selectable options and selecting one of the selectable options. | 04-01-2010 |
Patent application number | Description | Published |
20110270661 | Targeted marketing to on-hold customer - Systems and methods are described for delivering targeted content to a customer through a voice response unit (VRU). When the customer calls into the VRU, the customer is prompted to enter identification information. A unique customer identification code (UCIC) associated with the customer is used to look up an anonymized customer profile stored by a third party server. An advertisement identification code (ADIC) associated with the anonymized customer profile is used to identify targeted offers for the customer. The customer is then informed of the targeted offers verbally by the VRU. Optionally, the customer is presented with details of the offer verbally via the VRU. According to another aspect, the customer can select alternate media for delivery of the offer details (e.g., email, text message, etc.). | 11-03-2011 |
20140372214 | TARGETED MARKETING TO ON-HOLD CUSTOMER - Systems and methods are described for delivering targeted content to a customer through a voice response unit (VRU). When the customer calls into the VRU, the customer is prompted to enter identification information. A unique customer identification code (UCIC) associated with the customer is used to look up an anonymized customer profile stored by a third party server. An advertisement identification code (ADIC) associated with the anonymized customer profile is used to identify targeted offers for the customer. The customer is then informed of the targeted offers verbally by the VRU. Optionally, the customer is presented with details of the offer verbally via the VRU. According to another aspect, the customer can select alternate media for delivery of the offer details (e.g., email, text message, etc.). | 12-18-2014 |
Patent application number | Description | Published |
20110131303 | PROVIDING NETWORK SECURITY SERVICES FOR MULTIPLE REQUESTERS - A security initialization system receives a first initialization request from a first requester to access a first database storing security data and stores context data for the first initialization request that identifies an initialization operation associated with the first database. The security initialization system receives a second initialization request from a second requester to access a second database storing security data and updates the context data to identify an initialization operation associated with the second database. The security initialization system receives a shut down request from one of the requesters, where the shut down request includes data for identifying a corresponding initialization operation in the context data. The security initialization system updates the context data to show that the corresponding initialization operation has a shut down request and determines whether a security module is to be shut down using the context data. | 06-02-2011 |
20110131407 | USING A PKCS MODULE FOR OPENING MULTIPLE DATABASES - A security initialization system obtains load data that identifies a first database storing security data to be opened. The initialization system determines that a PKCS-based module for opening the first database is already initialized, where the PKCS-based module is already initialized from previously opening a second database. The initialization system causes the PKCS-based module to create a slot to open the first database, without shutting down the PKCS-based module, in response to determining that the PKCS-based module is already initialized. | 06-02-2011 |
20130136256 | BLOCK ENCRYPTION - Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a block of information, and hashes the first IV to create a hash. The computing system then determines a first block from the first block of information and the first hash and enciphers the first block to generate a block of ciphertext. In another embodiment, the computing system deciphers the block of ciphertext to generate the first block, and determines the first IV from the other IV and a sequence number of a block of information. The computing system hashes the first IV to create a hash and determines a block of information corresponding to the first block of ciphertext from the first block and the hash. | 05-30-2013 |
20150095639 | USING A PKCS MODULE FOR OPENING MULTIPLE DATABASES - A processing device is to determine that a module, executed from a memory by the processing device, is initialized from opening a first database. The processing device is to identify a second database to be opened from a request from an application to access data that is stored in the second database. The processing device is to create, a slot, via the initialized module, to open the second database using the initialized module. | 04-02-2015 |
Patent application number | Description | Published |
20080229189 | METHOD FOR SYNCHRONOUSLY BINDING AN EXTERNAL BEHAVIOR TO A WEB PAGE ELEMENT - A new form of DHTML behaviors, called ˜Element Behaviors,” wherein a behavior component is bound to an HTML element, and not just attached to the element as with attached behaviors. A special processing instruction is used to import the Element Behavior into a Web page. Upon parsing the Web page, the Element Behavior is initialized as soon as it has been downloaded and parsed. This immediate initialization makes the Element Behavior declaratively available to bind synchronously to the element(s) it is modifying. A viewLink is a feature of Element Behaviors that permits encapsulation of a behavior component file (e.g., an HTC file) so that the structure of the HTC file is transparent to a Web page (˜primary document”) to which the HTC file is linked, but the content of the HTC file may be displayed in the primary document. The viewLink provides a pointer to the content in the encapsulated HTC file, and renders that content in the primary document, without incorporating the elements of the encapsulated HTC file into the primary document structure. | 09-18-2008 |
20090119578 | Programming Interface for a Computer Platform - A programming interface provides functions for generating applications, documents, media presentations and other content. These functions allow developers to obtain services from an operating system, object model service, or other system or service. | 05-07-2009 |
20090327209 | Content having Native and Export Portions - Content is described having native and export portions. In an implementation, one or more computer-readable media includes instructions that are executable on a computing device to store content in a content container as a native portion and an export portion. The native portion is native to an application that originated the content and the export portion is to provide a published view of the content when the native portion is not supported. | 12-31-2009 |