34th week of 2013 patent applcation highlights part 65 |
Patent application number | Title | Published |
20130219173 | DESIGNATION OF CLASSES FOR CERTIFICATES AND KEYS - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By using a “class” designation within the existing certificate store structure and key store structure, certificates and keys can be assigned to one space among plural spaces. Accordingly, a personal certificate store and a personal key store may exist in a personal space. Similarly, a corporate certificate store and a corporate key store may exist in a corporate space. APIs designed to work within such a system may be arranged to employ a “class” attribute when managing certificates and cryptographic keys. | 2013-08-22 |
20130219174 | AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS WITH ASSURED SYSTEM AVAILABILITY - A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are rejected. In addition to “hopping” of IP addresses and discriminator fields, hardware addresses such as Media Access Control addresses can be hopped. The hopped addresses are generated by random number generators having non-repeating sequence lengths that are easily determined a-priori, which can quickly jump ahead in sequence by an arbitrary number of random steps and which have the property that future random numbers are difficult to guess without knowing the random number generator's parameters. Synchronization techniques can be used to re-establish synchronization between sending and receiving nodes. | 2013-08-22 |
20130219175 | NETWORK NODE WITH NETWORK-ATTACHED STATELESS SECURITY OFFLOAD DEVICE EMPLOYING OUT-OF-BAND PROCESSING - A network node for communicating data packets secured with a security protocol over a communications network includes a host information handling system (IHS) and one or more external security offload devices coupled by a secure data link. The host IHS communicates state information about data packets, and the external offload security device provides stateless secure data encapsulation and decapsulation of packets using a security protocol. An external network interface controller or internal network interface controller communicates encapsulated data packets over the communications network to a final destination. Encapsulation and decapsulation of packets by the external security offload device reduces network latency and reduces the computational load on the processor in the host IHS. Maintaining state information in the host IHS allows hot-swapping of external security offload devices without information loss. The external security offload device may be included in a firewall, or intrusion detection device, and may implement IPsec protocol. | 2013-08-22 |
20130219176 | Secure Virtual File Management System - A virtual file management system provides user access to managed content on mobile devices. The system comprises storage domains storing the managed content distributively using file systems, and a data infrastructure that organizes the managed content into a virtual file system that maintains information of storage domain specific file system primitives for accessing corresponding portions of the managed content. The data infrastructure, which maintains metadata of the storage domains and the mobile devices, comprises a policy definition and decision component that maintains policies defining controls for permissible operations on the managed content, the permissible operations including the file system primitives. A client application hosted on the mobile devices is coupled to the data infrastructure and the storage domains and includes an enforcement component that communicates with the policy definition and decision component to retrieve and enforce the policies by applying the controls on the mobile devices. | 2013-08-22 |
20130219177 | SECURE DATA PROCESSING DEVICE AND METHOD - A secure data processing device is provided. The device includes a main Operating System (OS), a plurality of main processes which are executed under control of the main OS and which are associated with each other, a secure OS which is simultaneously operated with the main OS, and at least one secure process which is executed under control of the secure OS and which corresponds to at least one of the plurality of main processes. If at least one of the plurality of main processes is in an abnormal operation state, an operation of the least one secure process is interrupted and initialized according to a request of the main OS. | 2013-08-22 |
20130219178 | Media Player Security for Full Length Episodes - A streaming video player and authentication server work in conjunction to provide secure streaming media. Player authentication is used to ensure that only users using an authorized media player authorized users can access and stream the media content. An encryption process protects unauthorized users from playing media streams that are intercepted between the content server and an authorized user. Additionally, timed tokens are used to ensure that a user authorized to access a stream during a specified time period cannot access the same stream at a later time when the user is no longer authorized. | 2013-08-22 |
20130219179 | SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER - A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives instructions from a first user identifying transfer data and a recipient identifier, creates a key, encodes the transfer data using the key, and communicates the key and the recipient identifier to a server. The server creates a secure package identifier and communicates such to the sender client. The recipient client receives and identifies the secure package identifier and the encoded transfer data, receives from a second user a user identifier, and communicates the user identifier and the secure package identifier to the server. The server communicates the key to the recipient client only if the secure package identifier received from the recipient client matches the secure package identifier created by the server and if the user identifier matches the recipient identifier. | 2013-08-22 |
20130219180 | DATA PROCESSING FOR SECURING LOCAL RESOURCES IN A MOBILE DEVICE - A method of data processing for securing local resources in a mobile device. The method includes: a) when network connectivity is available: coupling the mobile device with a first identity module associated to a first International Mobile Subscriber Identity (IMSI), receiving in the first identity module a network challenge from a communication network, ciphering the network challenge using a secret key, and sending a corresponding response to the network for subsequent successful authentication, b) after a successful authentication to the communication network: associating at least a part of the local resources to the first IMSI, and storing, in a database of the mobile device, authentication data related to the challenge/response duplet, granting access to local resources associated to the first IMSI. | 2013-08-22 |
20130219181 | METHOD FOR READING AN ATTRIBUTE FROM AN ID TOKEN - The invention relates to a method for reading at least one attribute stored in an ID token ( | 2013-08-22 |
20130219182 | SCALABLE WATERMARK INSERTION FOR FRAGMENTED MEDIA STREAM DELIVERY - A media stream is delineated into multiple fragments. Different watermark variants of individual fragments are generated. Particular sequences of watermark variants are selected for particular clients and maintained in a user access database. Analyzing media streams allows determination of the sequences of watermark variants and identification of particular clients intended to receive the media streams. Fragments can continue to be cached efficiently and unique watermarks need not be generated for each individual client. | 2013-08-22 |
20130219183 | VALlDATING A SYSTEM WITH MULTIPLE SUBSYSTEMS USING TRUSTED PLATFORM MODULES AND VIRTUAL PLATFORM MODULES - Software validation is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The software validation utilizes one or more trusted platform modules (TPM) to secure multiple subsystems including virtual machines in the breakout system. Hash values for the software in the various subsystems are placed in Platform Configuration Registers (PCRs) of the TPM. The TPM cryptographically signs quotes, which are a collection of hash values from the PCRs. The breakout system produces an extensible markup language (XML) file with the signed quotes related to the subsystems and sends them to a network management system for verification. The network management system validates the software configured on the breakout system using a public key to access the quotes and compares the values to known good values stored in an inventory record associated with the specific breakout system being validated. | 2013-08-22 |
20130219184 | METHOD AND SYSTEM FOR SECURE ELECTRONIC SIGNING - Disclosed is a method for secure electronically signing a document, which comprises: reading the document to be signed by an application; presenting a graphical representation of said document to a user; and accepting the document to be signed by the user. The method also comprises: at a server, computing a hash function, an extended validation function for the hash and a readable summary function of the to-be-signed document; from the server, sending the hash function and the extended validation function for the hash to the application and to a signing device; from said the server, sending said hash function and the readable summary function of the to-be-signed document to a secondary device. | 2013-08-22 |
20130219185 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, PROGRAM, AND SIGNATURE GENERATION DEVICE - Provided is an authentication device including a key setting unit for setting a multi-order polynomial u | 2013-08-22 |
20130219186 | Personal Digital Key Initialization and Registration for Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes. | 2013-08-22 |
20130219187 | CIRCUIT ARRANGEMENT, A METHOD FOR FORMING A CIRCUIT ARRANGEMENT, AND METHOD FOR INTEGRITY CHECKING - A circuit arrangement is provided, the circuit arrangement including a processor; a memory circuit connected to the processor, wherein the processor is configured to access the memory circuit; a blocking circuit configured to generate one or more random wait state signals which prevent the processor from accessing the memory circuit; and an integrity checking circuit configured to check the memory circuit during a wait state period of the one or more random wait state signals. | 2013-08-22 |
20130219188 | APPARATUS AND METHOD FOR REPRODUCING CONTENTS IN ELECTRONIC DEVICE - An apparatus and a method for outputting contents where an Output Protection Level (OPL) has been set to an extension device in an electronic device are provided. The apparatus includes a secure processor for decrypting and decoding contents where a right to use the contents has been set using a secure Operating System (OS). When receiving an external output request for contents whose external output is not allowed, the secure processor stops generating of decoded data transmitted to an extension device. | 2013-08-22 |
20130219189 | Cryptographic Transmission System - A microcontroller includes on-chip key storage slots stored in a non-volatile memory, wherein selecting which key is to be used is restricted to software, wherein a predetermined key storage slot stores a Key Encrypt Key (KEK), and a register flag is provided for determining whether the predetermined key storage slot stores a key for encrypting/decrypting data or the KEK for encrypting/decrypting a key | 2013-08-22 |
20130219190 | Determine Authorization of a Software Product Based on a First and Second Authorization Item - Embodiments disclosed herein relate to determining authorization of a software product based on a first authorization item and a second authorization item. Each authorization item may be a file or a registry key. A processor | 2013-08-22 |
20130219191 | PLATFORM FIRMWARE ARMORING TECHNOLOGY - A method, apparatus, machine-readable medium, and system are disclosed. In one embodiment the method includes a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure. | 2013-08-22 |
20130219192 | CONTENTS SECURITY APPARATUS AND METHOD THEREOF - A contents security apparatus for preventing Standard Definition (SD) contents which are protected targets of a level which is relatively lower than that of High Definition (HD) contents from being processed through a trust zone of a processor thereof and a method thereof are provided. The contents security apparatus includes a processor for operating a first Operating System (OS) and for storing authentication information of at least one or more contents and a second OS for limiting access to the first OS, wherein the first OS decrypts and processes contents with a high security level and wherein the second OS decrypts and processes contents with a low security level. | 2013-08-22 |
20130219193 | ENCRYPTED BIOMETRIC DATA MANAGEMENT AND RETRIEVAL - Aspects of the present invention provide a solution for managing and retrieving encrypted biometric data. A plurality of biometric entries is obtained and each one is encrypted with a unique non-invertible encryption function to get a plurality of encrypted biometric entries. A biometric measurement to be compared against the biometric entries is obtained, a predetermined noise is applied to the biometric measurement, and then the biometric measurement if encrypted using the non-invertible encryption function, resulting in a scrambled encrypted biometric. For each comparison, one of the encrypted biometric entries is subtracted from the scrambled encrypted biometric to get a calculated noise. This calculated noise is then compared with the predetermined noise to determine whether a match exists. Based on a determination that a match exists any information associated with the encrypted biometric entry is forwarded to the requestor. | 2013-08-22 |
20130219194 | TEST APPARATUS AND METHOD FOR TESTING PCIE SLOT - A test apparatus and a method are provided for testing a peripheral component interconnect (PCIE) slot by simulating the disconnection and reconnection of a device in the slot. The test apparatus detects whether a PCIE slot is in fact connected to an external device, and if so simulates an action of removing the external device from the PCIE slot and an action of re-inserting the apparently removed external device back into the PCIE slot to test the slot, thereby replacing any manual disconnection and reconnection. | 2013-08-22 |
20130219195 | DEVICES AND METHODS FOR TRANSMITTING POWER OVER AN ETHERNET LINE - Circuits and methods for providing power from power sourcing equipment to a powered device using an ethernet cable are disclosed herein. An embodiment of the method includes detecting a resistance value in the powered device, wherein the resistance value determines whether the powered device can receive power. A first class event is performed to determine the class of the powered device. A second class event is then performed to determine the class of the powered device. Power is transmitted on all four pairs of the ethernet cable simultaneously when the first and second class events indicate that the class of the powered device conforms to a class that can receive power from the power sourcing equipment on all four pairs. | 2013-08-22 |
20130219196 | POWER MANAGEMENT FOR MULTIPLE PROCESSOR CORES - Methods and apparatus relating to power management for multiple processor cores are described. In one embodiment, one or more techniques may be utilized locally (e.g., on a per core basis) to manage power consumption in a processor. In another embodiment, power may be distributed among different power planes of a processor based on energy-based considerations. Other embodiments are also disclosed and claimed. | 2013-08-22 |
20130219197 | REMOTE POWER MANAGEMENT SYSTEM AND METHOD - The present invention relates to a power management system and method, and more specifically, to a power management system and method, wherein: access information of a termination device, which is coupled with a target terminal together with a sharer, and access information of the target terminal are stored and managed in a relay server; and said relay server provides the access information of the target terminal to said termination device if a client performs an on/off control for the power of said target terminal power from a remote place, so that said termination device is capable of performing the power on/off control for the target terminal. | 2013-08-22 |
20130219198 | POWER SUPPLY CONTROL DEVICE, IMAGE PROCESSING APPARATUS, NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING POWER SUPPLY CONTROL PROGRAM, AND IMAGE PROCESSING CONTROL DRIVER - Provided is a power supply control device including a first power supply which is a power supply source of an operating unit and a main control unit, a second power supply which supplies minimum necessary power to create a power-saving state, a switching unit that switches to a power supply source selected from the first and second power supplies, a receiving unit that receives an external request signal, a determining unit that determines whether the external request signal is a switching request signal or a recovery request signal, a switching controller that switches the power supply source to the first power supply when a power-saving state is created, and the external request signal is the switching request signal, and a recovery unit that recovers at least the main control unit when the recovery request signal is received within a predetermined period after the power supply source is switched. | 2013-08-22 |
20130219199 | CLOCKING A PROCESSOR - A technique includes clocking a processor; and in response to the processor providing a signal indicating that the processor is transitioning between a first power state that is associated with a first power consumption and a second power state that is associated with a second power consumption different than the first power consumption, changing a frequency of the clocking. | 2013-08-22 |
20130219200 | STATIC READ ONLY MEMORY DEVICE WHICH CONSUMES LOW STAND-BY LEAKAGE CURRENT - An electronic device comprises a semiconductor memory cell having a bistable bit storage circuit having first and second power contact points. A first switch is coupled to the first power contact point to receive a first voltage. A second switch coupled to the second power contact point to receive a second voltage. Circuitry is provided for turning off the first and second switches to decouple the respective first and second voltages from the respective first and second power contact points, during stand-by operation of the electronic device. | 2013-08-22 |
20130219201 | ELECTRONIC DEVICE SYSTEMS AND METHODS FOR MAINTAINING LOW POWER CONSUMPTION WHILE PROVIDING POSITIONING FUNCTION IN ELECTRONIC DEVICE SYSTEM - An electronic device system includes a first device and a second device. The first device controls system operations and operates in at least a normal mode and a sleep mode having lower power consumption. After issuing a condition setting signal carrying at least a wake up condition, the first device switches from the normal mode to the sleep mode. After receiving an interrupt indication signal, the first device switches from the sleep mode to the normal mode. The second device is coupled to the first device and continuously receives and processes multiple satellite signals to obtain position information. The second device receives the condition setting signal from the first device and determines whether the wake up condition has been met according to the position information. When the wake up condition has been met, the second device issues the interrupt indication signal. | 2013-08-22 |
20130219202 | INFORMATION PROCESSING APPARATUS WITH POWER SHUTOFF SWITCH AND CONTROL METHOD THEREFOR - An information processing apparatus includes a switching unit configured to be an ON-state in which power is supplied to the information processing apparatus and an OFF-state in which power is not supplied to the information processing apparatus, a driving unit configured to set the switching unit to the off-state, a voltage supply unit configured to apply a voltage to the driving unit, and a control unit configured to, in a case where a condition for shutting off the supply of power to the information processing apparatus is satisfied, perform control to apply the voltage from the voltage supply unit to the driving unit, and, after the voltage is applied to the driving unit, control the driving unit to set the switching unit to the off-state. | 2013-08-22 |
20130219203 | CONTROL DEVICE, CONTROL METHOD, COMPUTER PROGRAM PRODUCT, AND ELECTRONIC DEVICE - According to an embodiment, a power control device includes a storage unit, a monitor, a determining unit, and a controller. The storage device stores a look-up table, which includes relationship between needed power consumptions and start-up conditions of an electronic device including a plurality of modules. The start-up condition of the electronic device is determined from the needed power consumption in the look-up table and specifies a power on/off status of the modules in the electronic device. The monitor monitors a voltage or available power supplied by a power source when the electronic device is activated. The determining unit determines a start-up condition corresponding to needed power consumption, which corresponds to the voltage or available power monitored by the monitor, with reference to the table. The controller sets a start-up condition of the electronic device to start up the electronic device in the start-up condition determined by the determining unit. | 2013-08-22 |
20130219204 | METHOD AND SYSTEM FOR WAKING UP REMOTE DEVICES - Disclosed are a method and a system for remote wake-up and status check, with a wake-up signal generating unit generating and transmitting a wake-up signal to wake up an electricity supply unit of a remote device to operate normally and provide electricity for the remote device. The wake-up signal has an assigned electric voltage with specific characteristics for detection by the electricity supply unit while in power-off mode and, upon signal detection, the electricity supply unit wakes up to provide normal electric voltage output. The wake-up signal generating unit determines, according to an electric current on a wake-up signal feed line, whether the remote device is in an active mode. A low wake-up energy consumption enables system wake-up and a true powered-off sleep mode. | 2013-08-22 |
20130219205 | METHOD AND APPARATUS FOR SAVING POWER BY EFFICIENTLY DISABLING WAYS FOR A SET-ASSOCIATIVE CACHE - A method and apparatus for disabling ways of a cache memory in response to history based usage patterns is herein described. Way predicting logic is to keep track of cache accesses to the ways and determine if an access to some ways are to be disabled to save power, based upon way power signals having a logical state representing a predicted miss to the way. One or more counters associated with the ways count accesses, wherein a power signal is set to the logical state representing a predicted miss when one of said one or more counters reaches a saturation value. Control logic adjusts said one or more counters associated with the ways according to the accesses. | 2013-08-22 |
20130219206 | Method And Apparatus For Reducing Server Power Supply Size And Cost - Computing and server power supplies are typically sized larger to deliver the maximum power the system may need. However since systems are not often used to capacity a smaller power supply may be used in conjunction with a thermal sensor to monitor a critical component of the power supply defined as the particular component within the power supply whose temperature reaches its maximum allowed limit sooner than any other power supply component when the average (continuous) power may exceed the power supply's max rating. When a critical temperature has been reached, an interrupt signal is generated by the power supply to signal the host to throttle back until the temperature comes back into an acceptable range. | 2013-08-22 |
20130219207 | Distributed MEMS Devices Synchronization Methods and Apparatus - A method is provided for time synchronization in a MEMS (MicroElectroMechanical system) based system having a MEMS processor and a plurality of MEMS devices. In a specific embodiment, the method includes, in the MEMS processor, transmitting a synchronization signal to the plurality of MEMS devices and saving a local time upon transmitting the synchronization signal. The MEMS processor also receives sampled data and time information from the plurality of MEMS devices, when the data and information become available. The method also includes, in one or more of the MEMS devices, receiving the synchronization signal from the MEMS processor and storing a local time upon receiving the synchronization signal. The MEMS device also performs a sensing operation and stores sampled sense data and sense time information. | 2013-08-22 |
20130219208 | METHOD OF CORRECTING A DUTY RATIO OF A DATA STROBE SIGNAL - A method of correcting a duty ratio of a data strobe signal is provided. By the method, a duty ratio of a data strobe signal output from a semiconductor memory device is detected and a duty ratio of a clock signal input to the semiconductor memory device is adjusted based on the duty ratio of the data strobe signal. | 2013-08-22 |
20130219209 | ELECTRONIC DEVICE WITH AN OVERCLOCKING MODE AND METHOD - An electronic device with an overclocking mode includes a processor, a memory storing a first range and a second range, and a digital controller which includes a first register, a second register, a monitor module, a determining module, a first writing module, an implementing module, and a second writing module. The monitor module monitors a value of current of the processor. The determining module determines whether the current is within the first range. The first writing module writes the current value in the first register. The implementing module reduces a value from the current value to acquire a new current value. The second writing module writes the new current value in the second register. The processor reads the new current value, detects whether the new current value is within the second range, and keeps itself in the overclocking mode when the new current value is within the second range. | 2013-08-22 |
20130219210 | Flat Panel Display Driver Method and System - Methods and systems are described for enabling display system data transmission during use. An integrated circuit package includes input interface circuitry configured to receive an audio-video data stream having a video signal and timing information and timing extraction circuitry that can identify blanking patterns for the video signal. The package includes input processing circuitry for receiving audio-video signal and converting the audio-video data stream input into a low voltage differential signal (LVDS). The package includes a timing controller having timing extraction circuitry, a set of symbol buffers, a scheduler, and timing control circuitry. All configured to implement LVDS data transfer and in some implementation enable point to point data transfer from data buffers to associated column drivers. | 2013-08-22 |
20130219211 | Elastic Cloud-Driven Task Execution - A method, an apparatus and an article of manufacture for cloud-driven application execution. The method includes determining a plurality of attributes of a failed application, wherein the plurality of attributes comprises at least one policy context attribute and at least one context attribute, correlating each of the plurality of attributes to at least one alternative asset, wherein the at least one alternative asset is a part of an environment on which the failed application can be executed, using the plurality of attributes correlated to the at least one alternative asset to identify an alternative asset set of alternative assets, wherein the alternative asset set is capable of enabling an alternative environment on which to execute the failed application, and provisioning the alternative assets in the alternative asset set from at least one cloud network to create the alternative environment on which the failed application is executed. | 2013-08-22 |
20130219212 | ARRAY MANAGEMENT DEVICE, ARRAY MANAGEMENT METHOD AND INTEGRATED CIRCUIT - To provide an array management device that changes criterion for judging whether to execute re-redundancy in accordance with configuration type of communication path. An array management device that executes redundancy on storage devices, and controls access to each storage device includes: a judgment unit judging whether access to each storage device has succeeded or failed; a holding unit holding therein configuration type of communication path to each storage device; a derivation unit, for each storage device, deriving a waiting period in accordance with the configuration type, the waiting period being from failure of access to the storage device to start of redundancy; and a redundancy processing unit, when access to a given storage device is judged to have failed, and then access to the given storage device is not judged to have succeeded within the waiting period, executing redundancy on the storage devices other than the given storage device. | 2013-08-22 |
20130219213 | SYSTEM AND METHOD FOR RECOVERING DATA OF HARD DISKS OF COMPUTING DEVICE - A computing device includes a redundant array of independent disks (RAID) card, a serial attached small computer system interface expander (SAS expander), and a RAID array. The RAID array includes a plurality of hard disks. Each hard disk of the RAID array connects with at least one backup hard disk. If a hard disk of the RAID array malfunctions, the computing device selects a backup hard disk. The computing device stores data which are stored in a hard disk of the RAID which is not malfunctioning into the selected backup hard disk. | 2013-08-22 |
20130219214 | ACCELERATED REBUILD AND ZERO TIME REBUILD IN RAID SYSTEMS - A RAID data storage system incorporates permanently empty blocks into each stripe, distributed among all the data storage devices, to accelerate rebuild time by reducing the number of blocks that need to be rebuilt in the event of a failure. | 2013-08-22 |
20130219215 | SOLVING CONSTRAINT SATISFACTION PROBLEMS HAVING LOOSELY INTERCONNECTED SUB-PROBLEMS - A method, apparatus and product. The method comprising automatically determining an abstract CSP based on a formally defined problem having interconnected sub-problems, wherein the abstract CSP corresponds to the problem, wherein the abstract CSP has a reduced complexity in comparison to a CSP representing the problem, wherein the abstract CSP captures the interconnection between the sub-problems and reduces the details of each sub-problem, wherein the abstract CSP comprises constraints over variables, wherein each variable having an associated domain; and repeatedly: (1) propagating constraints of the abstract CSP to reduce domains of the abstract CSP; (2) selecting a sub-problem to solve; (3) solving the sub-problem; and (4) updating the abstract CSP with values in accordance with the solution of the sub-problem. Whereby, a solution to the formally defined problem is determined based on the solutions to the sub-problems. | 2013-08-22 |
20130219216 | Hybrid Memory Failure Bitmap Classification - Aspects of the invention relate to techniques for classifying memory failure bitmaps using both rule-based classification and artificial neural network-based classification methods. The rule-based classification method employs classification rules comprising those for global failure patterns. The artificial neural network-based classification method classifies local failure patterns. One of the artificial neural network models is the Kohonen self-organizing map model. The input vector for a failure pattern may contain four elements: pattern aspect ratio, failing bit ratio, dominant failing column number and dominant failing row number. | 2013-08-22 |
20130219217 | SYSTEM AND METHOD FOR AUTOMATED TEST CONFIGURATION AND EVALUATION - A comprehensive system for enabling automated configuration and testing of software applications and services is disclosed. The system includes test interfaces, a test database and test functionality. Configuration functionality allows for rapid, accurate and efficient set up of one or more test accounts. Data manipulation interfaces and methods allow for the inspection of state variables and manipulating state-based data to simulate, initiate and reverse transactional data. Application programming interfaces enable the testing of external systems with a target system that is simulated in the testing environment. | 2013-08-22 |
20130219218 | Mobile Communication Platform for Test System Applications - A mobile communication platform for a test facility to monitor various testing devices. The mobile communication platform is configured to transmit data or information to a remote test platform remote from a test facility or laboratory. In embodiments described, the communication platform is configured to interface with the one or more controller units to receive input or output data from the one or more test devices and transmit the input output data to the remote test platform via a messaging protocol initiated by the communication platform coupled to the testing device. | 2013-08-22 |
20130219219 | Customizing Code Modules of Software and Programmable Hardware for a Test Instrument - Customizing a test instrument. A plurality of pairs of code modules may be provided. Each pair of code modules may include a first code module having program instructions for execution by a processor of the test instrument and a second code module for implementation on a programmable hardware element of the test instrument. For each pair of code modules, the first code module and the second code module may collectively implement a function in the test instrument. User input may be received specifying modification of a second code module of at least one of the plurality of pairs of code modules. Accordingly, a hardware description may be generated for the programmable hardware element of the test instrument based on the modified second code module. | 2013-08-22 |
20130219220 | GENERATING A REPLAYABLE TESTING SCRIPT FOR ITERATIVE USE IN AUTOMATED TESTING UTILITY - A method for generating a replayable testing script for iterative use by an automated testing utility may include recording a plurality of scripts, each script relating to a separate iteration of a transaction between a user and a tested application performed by an operator. The method may also include comparing the recorded scripts to identify a location of a data item by finding different values in a pair of corresponding locations in the recorded scripts, indicative of a dynamic data item. The method may further include generating the replayable testing script comprising one of the recorded scripts and having a variable parameter at the identified location of the dynamic data item. | 2013-08-22 |
20130219221 | SYSTEMS AND METHODS TO SIMULATE STORAGE - The embodiments described herein include a host that includes an operating system and a storage simulation module in communication with the host. The storage simulation module includes a pseudo-adapter configured to emulate a storage adapter and a pseudo-storage device coupled to the pseudo-adapter, wherein the pseudo-storage device is configured to emulate a storage device. The storage simulation module is configured to simulate an error event for the pseudo-adapter and/or the pseudo-storage device upon receipt of an operation from the operating system. | 2013-08-22 |
20130219222 | SYSTEMS AND METHODS TO TEST PROGRAMS - The embodiments described herein include a host that includes an operating system and a storage simulation module in communication with the host. The storage simulation module includes a pseudo-adapter configured to emulate a storage adapter and a pseudo-storage device coupled to the pseudo-adapter, wherein the pseudo-storage device is configured to emulate a storage device. The storage simulation module is configured to simulate an error event for the pseudo-adapter and/or the pseudo-storage device upon receipt of an operation from the operating system. | 2013-08-22 |
20130219223 | Method for Metric Ranking in Invariant Networks of Distributed Systems - A method for metric ranking in invariant networks includes, given an invariant network and a set of broken invariants, two ranking processes are used to determine and rank the anomaly scores of each monitoring metrics in large-scale systems. Operators can follow the rank to investigate the root-cause in problem investigation. In a first ranking process, given a node/metric, the method determines multiple scores by integrating information from immediate neighbors to decide the anomaly score for metric ranking. In a second ranking process, given a node/metric, an iteration process is used to recursively integrate the information from immediate neighbors at each round to determine its anomaly score for metric ranking. | 2013-08-22 |
20130219224 | JOB CONTINUATION MANAGEMENT APPARATUS, JOB CONTINUATION MANAGEMENT METHOD AND JOB CONTINUATION MANAGEMENT PROGRAM - A job continuation management apparatus according to an exemplary aspect of the invention includes, job execution units that carrying out jobs; a job management information memory unit storing job identification information, identification information on the job execution unit, job execution information and job continuing execution priority in unit of the job; and a job continuation management unit referring to the job management information memory unit when a failure occurs in the job execution units, and, about records having identification information of the job execution unit identical with identification information of the failed job execution, sends the job identification information and the job execution information to one of the job execution units except for the failed unit sequentially in a order starting from a job having highest the job continuing execution priority to lowest, and making the job execution unit of a receiving party perform continuation execution of the job. | 2013-08-22 |
20130219225 | MANAGEMENT SYSTEM FOR OUTPUTTING INFORMATION DENOTING RECOVERY METHOD CORRESPONDING TO ROOT CAUSE OF FAILURE - A management server includes a meta rule for identifying an event to be a root cause and a failure recovery method that corresponds to the meta rule for an event capable of occurring in a plurality of node apparatuses, and also displays a cause event to be a root cause of an event detected by the management server, and a method for recovering from this cause event. | 2013-08-22 |
20130219226 | DISTRIBUTED TESTING WITHIN A SERIAL TESTING INFRASTRUCTURE - A serial testing infrastructure includes the capability to execute a distributed test on multiple virtual processors. A test executable may be stored in a library and the test description, including the name of the test, the test library, and other test characteristics, may be stored in a separate test data file. The serial testing infrastructure initiates multiple distributed test executors that each launch an instance of the distributed test as a process that runs concurrently with other instances of the distributed test. Each distributed test executor monitors execution of it corresponding process until completion or timeout. | 2013-08-22 |
20130219227 | Multi-Entity Test Case Execution Workflow - The present subject matter relates to a method for managing a testing workflow, based on execution of at least one Multi Entity Test Case (METC) of the testing workflow. The method includes assigning at least one role to each of a plurality of test steps of the METC, where the at least one role is indicative of a privilege level to execute each of the plurality of test steps. The method also includes defining a failure condition for each of the plurality of test steps, where the failure condition is indicative of an expected result of execution of each of the plurality of test steps. The method further includes specifying a failure action associated with the failure condition for execution of each of the plurality of test steps, executing one of the plurality of test steps, and applying the failure action to proceed with the testing workflow. | 2013-08-22 |
20130219228 | APPLICATION HARNESSING SYSTEM AND METHOD - Automated testing of application software is performed by recording the output of at least one sensor that produces sensor information. A harnessed app being tested requests sensor information. Those requests are intercepted and recorded information that corresponds to the requested sensor information is retrieved and sent to the harnessed app as sensor information. | 2013-08-22 |
20130219229 | FAULT MONITORING DEVICE, FAULT MONITORING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A fault monitoring device includes: a receiving unit that receives designation information which designates a plurality of monitored objects, an acquisition beginning condition of log data from the monitored objects, and a time interval for acquiring the log data; an acquiring unit that, when the acquisition beginning condition of log data is met, acquires the log data from the monitored objects according to the time interval; and an output unit that outputs the acquired log data in the form of a list according to time order. | 2013-08-22 |
20130219230 | DATA CENTER JOB SCHEDULING - A method, computer system, and computer program product for scheduling a computing job at a data center. The method may include receiving a computing job for a data center, determining an operating temperature for a plurality of system components in the data center, assigning a weighting factor for each system component, and scheduling an execution of the computing job using a selected system component, at least in part based upon the weighting factor for that system component where the weighting factor is based upon at least an operating temperature for the system component and an operational lifespan for that system component at that operating temperature. | 2013-08-22 |
20130219231 | Method for Storing and Propagating Error Information in Computer Programs - A method for storing and propagating error information in computer programs, in which a globally valid error variable is used for storing and propagating the error information, wherein for each recognized error a nonzero value for the error is added to the error variable as error information with a respective stipulated arithmetic sign, and wherein the value is formed from a discrepancy in the content of a coded variable from an expected value. This combination and integration of a separate global propagation variable with values derived from an error, particularly by virtue of detected discrepancies in the known error recognition and propagation paths using operations and operands in “coded processing”, achieves an increased propagation certainty. | 2013-08-22 |
20130219232 | METHOD AND SYSTEM TO PROCESS ISSUE DATA PERTAINING TO A SYSTEM - A computer-implemented method to processes issue data in a system. A plurality of issue reports are received from respective reporting entities, each issue report being in respect of a system issue which requires a response activity. The issue reports are parsed to obtain priority criterion data relating to at least one priority criterion. The priority criterion is unrelated to the dates and/or times of the issue reports and may include visibility data, severity data, exposure data, and performance data relating to past performance of a reporting entity or a reported entity. The reported issues are then prioritized for order of response based at least partially on the associated criterion data. | 2013-08-22 |
20130219233 | Systems and Methods for Quality Based Priority Data Processing - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for priority based data processing. | 2013-08-22 |
20130219234 | Data Integrity Field (DIF) Implementation with Error Detection and Intelligent Recovery Mechanism - An apparatus for providing a data integrity field implementation in a data processing system includes a controller operative to interface between a host device and a destination device in the data processing system for transferring at least one data block therebetween. The data processing system further includes an error detection module associated with the controller. The error detection module is operative to determine a probability of an error occurrence based at least in part on a measured current error rate for the data processing system. The controller is operative to implement an error correction methodology which is selectively adaptable as a function of the probability of an error occurrence. | 2013-08-22 |
20130219235 | MEMORY SYSTEM AND TEST METHOD THEREOF - According to one embodiment, two memory systems each including a memory and a controller are connected via a communication line. The controller includes a testing unit that performs a self-test process on the memory, a communication unit that communicates with the counterpart controller, and a status output unit. The communication unit performs a startup synchronization process which is performed before the self-test process and a termination synchronization process which is performed after the self-test process. The testing unit obtains a comprehensive test result from the test results of the two memory systems, and the status output unit of one memory system outputs the comprehensive test result. | 2013-08-22 |
20130219236 | Controlling Scan Access to a Scan Chain - A technique for controlling scan access of multiple scan devices (including or more slave scan devices and a master scan device) to a scan chain includes sending, by a requesting slave scan device included in the one or more slave scan devices, a first request for access to the scan chain to the master scan device. The master scan device and the one or more slave scan devices are connected to the scan chain. The technique also includes receiving, at the requesting slave scan device, an evaluation result from the master scan device and accessing, by the requesting slave scan device, the scan chain in response to the evaluation result indicating access granted. Finally, the technique includes sending, by the requesting slave scan device, one or more second requests for access to the scan chain to the master scan device in response to the evaluation result indicating access denied. | 2013-08-22 |
20130219237 | SCAN CHAIN FAULT DIAGNOSIS - Embodiments related to identifying a reference scan cell locationally related to a fault condition exhibited by a scan chain in which the reference scan cell is included are provided. In one example, a method for identifying a reference scan cell is provided, the method comprising, in a capture mode, outputting combinational logic values to scan cells in the scan chain so that scan cell values for the scan cells are based on respective combinational logic values, the combinational logic values electrically connected with the scan chain. The example method further comprises, in a shift mode, sequentially determining the scan cell value for each scan cell, and identifying as the reference scan cell a scan cell last determined to be at an expected logical state for that scan cell. | 2013-08-22 |
20130219238 | INTEGRATED CIRCUIT HAVING CLOCK GATING CIRCUITRY RESPONSIVE TO SCAN SHIFT CONTROL SIGNAL - An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises a scan chain having a plurality of scan cells. The integrated circuit further comprises a clock distribution network configured to provide clock signals to respective portions of the integrated circuit. The clock distribution network comprises clock gating circuitry configured to control delivery of one or more of the clock signals along respective clock signal lines of the clock distribution network at least in part responsive to a scan shift control signal that is also utilized to cause the scan cells to form a serial shift register during scan testing. The clock gating circuitry may be used to determine whether a clock delay defect that causes a scan error during scan testing will also cause a functional error during functional operation, thereby improving yield in integrated circuit manufacturing. | 2013-08-22 |
20130219239 | DIE STACK TEST ARCHITECTURE AND METHOD - A test control port (TCP) includes a state machine SM, an instruction register IR, data registers DRs, a gating circuit and a TDO MX. The SM inputs TCI signals and outputs control signals to the IR and to the DR. During instruction or data scans, the IR or DRs are enabled to input data from TDI and output data to the TDO MX and the top surface TDO signal. The bottom surface TCI inputs may be coupled to the top surface TCO signals via the gating circuit. The top surface TDI signal may be coupled to the bottom surface TDO signal via TDO MX. This allows concatenating or daisy-chaining the IR and DR of a TCP of a lower die with an IR and DR of a TCP of a die stacked on top of the lower die. | 2013-08-22 |
20130219240 | DATA PACKET TRANSMISSION/RECEPTION APPARATUS AND METHOD - A method and apparatus are provided for recovering data efficiently even when data loss has occurred over a channel or network. The packet transmission method includes arranging a first transmission packet in a source symbol in a first region of a source block; arranging a second transmission packet in a space starting with an empty space of a last source symbol where the first transmission packet is arranged, remaining after arranging the first transmission packet; arranging information related to the second transmission packet in a second region of the source block; performing Forward Error Correction (FEC) encoding on the source block; and transmitting the encoded source block. | 2013-08-22 |
20130219241 | METHOD FOR STOPPING ITERATION IN AN ITERATIVE TURBO DECODER AND AN ITERATIVE TURBO DECODER - The present document discloses a method for stopping iteration in an iterative Turbo decoder and an iterative Turbo decoder. Hard decisions from the two convolutional decoders of the iterative Turbo decoder are used simultaneously to determining when to stop the iteration in the iterative Turbo decoder. | 2013-08-22 |
20130219242 | MULTI-PROCESSING ARCHITECTURE FOR AN LTE TURBO DECODER (TD) - An apparatus comprising a decoder circuit and a memory. The decoder circuit may be configured to generate a single address signal to read a first parity data signal, a second parity data signal and read and/or write systematic information data, a first a-priori-information signal and a second a-priori-information signal. The decoder circuit (i) reads the first parity data signal, the systematic information data and the first a-priori-information during even half-iterations of a decoding operation and (ii) reads the second parity data, the systematic information data and the second a-priori-information during odd half-iterations of the decoding operation. The memory may be configured to store the systematic information data and the first and second a-priori-information signals such that each are accessible by the single address signal. | 2013-08-22 |
20130219243 | Handling burst error events with interleaved Reed-Solomon (RS) codes - Handling burst error events with interleaved Reed-Solomon (RS) codes. A received signal, that has undergone convolutional interleaving sometime before, is received from a burst noise affected communication channel. The signal undergoes convolutional deinterleaving and the codewords generated there from undergo appropriate successive cyclic shifting to arrange burst noise affected symbols of various codewords into at least some common symbol locations. For example, at least two codewords have burst noise affected symbols in common symbol locations. An ensemble decoder jointly decodes multiple codewords during a same time period (i.e., processes multiple codewords simultaneously). By processing multiple codewords simultaneously, the ensemble decoder has greater error correction capability than a decoder that processes a single codeword at a time. | 2013-08-22 |
20130219244 | STORAGE DEVICE - A nonvolatile memory is configured with blocks as deletion units, each block having several pages that are configured as write units. A controller for the nonvolatile memory includes an error correcting circuit, which detects and corrects an error in data read out of a page in one of the blocks of the nonvolatile memory, the page being referenced by a logical address. The controller also determines an error occurrence when the error cannot be corrected. An error block table is provided to store the logical address where the error occurred, and a physical address corresponding to the logical address. | 2013-08-22 |
20130219245 | CURRENT MODE ANALOG BELIEF PROPAGATION - An analog belief propagation system uses current mode implementations of storage elements and circuit implementations of at least some nodes of a factor graph using current representations. The system mitigates or avoids effects of non-linearities and approximations in storage and processing elements of the system, for instance, by using storage cells that reproduce current values and using factor circuits that separate control sections and signal path sections of the circuits. | 2013-08-22 |
20130219246 | Method and Apparatus for Detecting Free Page and a Method and Apparatus for Decoding Error Correction Code Using the Method and Apparatus for Detecting Free Page - A method and apparatus for detecting a free page of a memory device, and a method and apparatus for decoding an error correction code by using the method and apparatus for detecting a free page are provided. Free page data read from the memory is converted into a converted codeword for inclusion as an element of an error correction code field. The converted codeword is compared to an initially set target codeword to detect an amount of non-identical bits. A page read from the memory is determined to be a free page when the amount of non-identical bits is equal to or less than an initially set threshold value. | 2013-08-22 |
20130219247 | Method for Accessing Flash Memory and Associated Flash Memory Controller - An exemplary method for accessing a flash memory. The method comprising obtaining a first random sequence; utilizing the first random sequence as a first seed for generating a second random sequence, wherein the first random sequence is not equivalent to the second random sequence; scrambling data according to the second random sequence for generating scrambled data; performing an error correction encoding operation upon the first random sequence and the scrambled data for generating parity check code; and storing the scrambled data and the parity check code to the flash memory. | 2013-08-22 |
20130219248 | STORAGE CONTROL APPARATUS AND STORAGE CONTROL METHOD - A storage control apparatus receives a write request for a storage apparatus. When the storage control apparatus receives the write request, the storage control apparatus duplicates into a specific storage area, data stored in a storage area of the storage apparatus and parity data whose generation source is the data. The storage control apparatus determines whether one of the storage apparatuses is started up for which a writing process is executed in response to the write request. When the storage apparatus is re-started, the storage control apparatus writes the data duplicated in the specific storage area into the storage area of the duplication source of the storage apparatus and writes the parity data duplicated in the specific storage area into the storage area of the duplication source of the storage apparatus. | 2013-08-22 |
20130219249 | METHOD FOR DETERMINING PARITY CHECK MATRIX UTILIZED IN FLASH MEMORY SYSTEM AND RELATED FLASH MEMORY SYSTEM THEREOF - A method for determining a parity check matrix utilized in a flash memory system is disclosed. The parity check matrix comprises M×N blocks. The method comprises generating a first set of candidate blocks as candidates of a first set of blocks of the M×N blocks; calculating a plurality of first estimated results corresponding to the first set of candidate blocks; determining content of a first block of the M×N blocks according to a best result of the first estimated results; generating a second set of candidate blocks as candidates of a second set of blocks of the M×N blocks; calculating a plurality of second estimated results corresponding to the second set of candidate blocks by considering the content of the first block; determining content a second block of the M×N blocks according to the second estimated results. | 2013-08-22 |
20130219250 | METHODS FOR DECODING, METHODS FOR RETRIEVING, METHOD FOR ENCODING, METHOD OF TRANSMITTING, CORRESPONDING DEVICES, INFORMATION STORAGE MEANS AND COMPUTER PROGRAM PRODUCTS - A method for decoding comprises the following steps:
| 2013-08-22 |
20130219251 | ELECTRONIC APPARATUS, RECEIVING APPARATUS, AND ERROR CORRECTION METHOD - In an electronic apparatus, a soft decision likelihood value is generated and subject to a decoding process supporting a convolutional code; and a data series is interleaved, subjected to an error correction process, and decoded data is generated. A detecting unit, based on information concerning the position of a symbol for which an error has been corrected successfully by the error correction process, estimates whether an error occurs in a symbol for which the error correction process failed and detects the position of a symbol estimated to have an error. A setting unit sets based on the decoded data and information concerning the position of the symbol estimated to have an error, a correction value of the soft decision likelihood value. The electronic device interleaves the order of a correction value series of the soft decision likelihood value and feeds the resulting correction value series back to the decoding process. | 2013-08-22 |
20130219252 | METHOD AND SYSTEM FOR PREVENTING HOLDING-OFF OF A PROTECTION SWITCHING FOR A PLURALITY OF ALARMS - The various embodiments herein provide a method and system for providing protection switching at a client layer on squelching of clients by a server layer protection controller in a nested protection system. The method comprises of marking a plurality of alarms of a pre-defined pattern and disabling a hold-off period for the plurality of marked alarms on receiving a squelch operation indication. The system comprises of one or more hold-off timers pre-configured with a hold off period and an alarm filter and hold-off processor (AFHP) for disabling the hold-off timer to invalidate the hold-off period for the plurality of marked alarms, wherein the plurality of marked alarms is an AIS generated due to squelching. | 2013-08-22 |
20130219253 | Editing systems and methods - Editing systems and methods to be used in a digital content/e-book editing environment are provided. An editing interface in a use interface (for example, a browser picture) in a development platform structured on a cloud network has a universal interactive component frame. At least one user selects required editing components/editing tools to design e-book content and/or digital content, and various interactive program codes are automatically integrated, thus to efficiently finish the required e-book content and/or digital content. The finished e-book content and/or digital content comprising interactive webpage and/or content is packed into a form of application according to the format of an operating system used for packing, wherein the packed application can be downloaded for use and/or published to a shopping mall of application software. | 2013-08-22 |
20130219254 | 2D CODE LINKED TO CUSTOMIZED WEB PAGE WITH USER-UPLOADED CONTENT - Described herein are techniques related to delivering content and more particularly delivering customized web content with the aid of two-dimensional codes. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 2013-08-22 |
20130219255 | Authorized Syndicated Descriptions of Linked Web Content Displayed With Links in User-Generated Content - Syndicated descriptions of web content are obtained from feeds. For each item of each feed, a link is followed to a content page, and it is determined whether the content page directly or indirectly points back to the feed. If so, the description of the item from the feed is stored as an authorized description with a canonical form of the link to the item. Subsequently, when an item of user-generated content that includes a link to web content is received, the link to the web content is canonicalized. Based on the canonicalized link, any stored authorized syndicated descriptions of the linked content is obtained. If more than one authorized syndicated description of an item of linked content is available, one is selected. Then, the item of user-generated content containing a link can be published with an authorized syndicated description of the linked content. | 2013-08-22 |
20130219256 | SCROLLING IN LARGE HOSTED DATA SET - A computer-implemented method of presenting an electronic document via a web browser includes maintaining on a computing device a client data model of the electronic document, the client data model comprising data that defines content of the electronic document and formatting of the content of the electronic document, and rendering a first sub-portion of content of the electronic document from the client data model to a document object model (DOM) for the web browser. The method also includes providing the DOM to the web browser, for the web browser to display a view of the electronic document from the DOM. | 2013-08-22 |
20130219257 | TEXTUAL AND FORMATTED DATA PRESENTATION - A computer-implemented method and apparatus, the apparatus comprising an information receiving component, a text presentation component for presenting at least a first part of the information on a first pane as text; a form presentation component for presenting at least a second part of the information as a structured form comprising one or more fields on a second pane; and an update component for updating information displayed in the first pane or the second pane in response to changes entered to information displayed in the second pane or in the first pane, respectively. | 2013-08-22 |
20130219258 | METHOD AND DEVICE FOR POPULATING A CONTACT ENTRY WITH CONTEXTUAL INFORMATION - Methods and devices for populating a portion of a contact entry are described. In one aspect, a method comprises: receiving a contact entry, the contact entry having a contact identifier; identifying, in a data store, a record which is associated with the contact identifier and which has a time identifier identifying a time that was prior to the time when the contact entry was received; and populating a portion of the contact entry with data from the identified record. | 2013-08-22 |
20130219259 | BROWSER NAVIGATION CONTROL LOCKING MECHANISM - A browser locking tool for an information handling system (IHS) may prevent data loss on a webpage. The browser locking tool may prevent navigation away from the webpage by both browser level navigation controls and webpage level navigation controls. Alternatively, the browser locking tool may allow navigation away from the webpage when the navigation should not cause data loss. | 2013-08-22 |
20130219260 | INSTRUMENT, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - Disclosed is an instrument including a display part, a transmission part configured to transmit attribute information of the instrument to an information processing device, a display control part configured to transmit a request for acquisition of a list of identification information of a Web page to the information processing device and display the list sent from the information processing device in response to the request for acquisition on the display part, and an acquisition part configured to acquire a program through a network when identification information of a Web page selected in the list is associated with identification information of the program. | 2013-08-22 |
20130219261 | APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - A disclosed apparatus includes a display control unit that causes a screen to be displayed by a display unit indicated by screen information included in a Web page, and a call unit that calls a method corresponding to a character string designated by an argument of a first script included in the Web page, the method being included in a program causing a function to be performed with the apparatus. | 2013-08-22 |
20130219262 | SYSTEM AND METHOD FOR INFORMATION AGGREGATION - A system for electronically reconstituting an issue of an electronic publication to simulate its paper analog. The system includes an application web server programmed to collect metadata related to a plurality of electronic publication. A user's viewing device is programmed to receive table of contents metadata for a plurality of the electronic publication, a plurality of issues of the electronic publication, and a plurality of articles for the issues. An input device on the user's viewing device is provided to identify from the table of contents metadata a selected electronic publication, a selected issue from the selected publication, and a selected article from the selected issue. A digital object identifier resolver is programmed to identify a URL for the selected article. A display device on the user's viewing device displays a full text version of the selected article. | 2013-08-22 |
20130219263 | WEB SITE DESIGN SYSTEM INTEGRATING DYNAMIC LAYOUT AND DYNAMIC CONTENT - A system for implementing dynamic layout on a website. The system includes a receiver on a server to receive events caused by dynamic layout triggers from at least one client and a coordinator on the server to coordinate dynamic layout updates between the server and the at least one client according to the events and associated dynamic layout rules stored on the server. | 2013-08-22 |
20130219264 | RICH BROWSER-BASED WORD PROCESSOR - A computer-implemented method for presenting a document for interaction with a user in a web browser includes accessing an electronic model of the document; determining, with a computing device, positions for items in a visual rendering of the electronic model based on relative sizes and positions of other items in the electronic model; and generating, with the computing device, a document object model (DOM) that defines an editing surface, wherein the DOM (a) places placing the items at the determined positions on the editing surface, (b) places a graphic element that represents a cursor at a determined location on the editing surface, and (c) is arranged to receive user input on the editing surface and to correlate a location of the received user input to a location in the electronic model. | 2013-08-22 |
20130219265 | Online Protocol Community - Provided herein is a computer-implemented method of personalizing a protocol in an online community of a plurality of users. The computer-implemented method includes providing a first protocol selected by a first user in the online community and receiving a request from the first user to modify the first protocol. The method further includes providing a set of editable fields to the first user for inputting a first modification, where the set of editable fields include a copy of dynamic content from the first protocol. The method includes generating a second protocol in response to the user inputting a first modification into one editable field of the set of editable fields, wherein the second protocol is based on the first protocol and includes the first modification. | 2013-08-22 |
20130219266 | SYSTEM AND METHOD FOR GENERATION OF A CUSTOMIZED WEB PAGE BASED ON USER IDENTIFIERS - A method for generating of a blog post respective of a blogger personalized web page is provided. The method comprises allocating a first display area within the blog post; generating at least one snippet of information received from at least one information source of relevant information, the relevant information being respective of a plurality of identifiers that uniquely characterizing a blogger of the blogger personalized web page, wherein the at least one snippet of information is placed in the first display area; generating a personal note display area within the blog post for the blogger to enter comments; allocating a viewer display area within the blog post for viewers to enter comments respective of the blog post; and feeding the blog post to at least one information source. | 2013-08-22 |
20130219267 | SYSTEM AND METHOD OF SOCIAL PUBLISHING - The invention provides a system and method of collaborative publishing including a computer operated by software with machine-readable instructions to allow a first user to connect with other users, utilize a brainstorming aide for customized writing assistance, collaboratively or independently draft and a book, and review and publish a book. | 2013-08-22 |
20130219268 | DOCUMENT ERROR HANDLING - In an embodiment, a document error handling method is disclosed. The document error handling method may include or comprise accessing an electronic document that includes or comprises a plurality of data fields, identifying a plurality of errors associated with the electronic document, and accessing a data field from among the plurality of data fields, wherein the data field corresponds to a selected error from among the plurality of errors. The document error handling method may also include or comprise editing the data field in response to an error editing input to thereby enable an elimination of the selected error. | 2013-08-22 |
20130219269 | ELECTRONIC TEXT MANIPULATION AND DISPLAY - Information is presented to a user by accessing a library of electronic publications that includes a first publication, generating a representation of the first publication in an electronic bookshelf, determining a state for the first publication and modifying the representation of the first publication to reflect the state of the first publication. | 2013-08-22 |
20130219270 | ELECTRONIC TEXT MANIPULATION AND DISPLAY - Information is presented to a user by accessing a library of electronic publications that includes a first publication, generating a representation of the first publication in an electronic bookshelf, determining a state for the first publication and modifying the representation of the first publication to reflect the state of the first publication. | 2013-08-22 |
20130219271 | CONSUMER MARKER OPTIMIZED FOR MOBILE MEDIUM - Disclosed are systems, methods, and non-transitory computer-readable storage media for providing a marker with an item of invitational content. A marker provided with an initial view of invitational content communicates features associated with a subsequent view, including the specifications or content of the invitational content, user terminal, or content provider. The marker is determined from input gathered from numerous data sources and according to a set of rules specifying what features and where and how the features are communicated. The rules can dictate that certain variants be selected based on gathered input concerning the user terminal or a user profile. The marker can be determined and changed based on real time status changes of the user terminal. A marker can receive input from the user which can be used to select a variant or change a setting. Marker data is stored and used to create reports and optimize future campaigns. | 2013-08-22 |
20130219272 | MONITORING AND GUIDING USER INPUT AMONG MULTIPLE COMPUTER PROGRAM USER INTERFACES - An example method includes a device recording a user input as a recorded user input associated with a first computer program user interface, and providing a display output comprising a first display output for the first computer program user interface and a second display output for a second computer program user interface. The device receives a current user input via a user input device while the second user interface is currently configured to receive user inputs, and while the first user interface is not currently configured to receive user inputs. The device determines that the current user input matches the recorded user input, and in response, the device prevents the current user input from being received by the second computer program user interface and provides the current user input to the first computer program user interface. | 2013-08-22 |