42nd week of 2011 patent applcation highlights part 60 |
Patent application number | Title | Published |
20110258446 | SYSTEMS AND METHODS FOR SERVER AIDED PROCESSING OF A SIGNED RECEIPT - A method for processing security communication protocol compliant signed receipts at a mobile communication device linked to a host system is provided. The host system receives an email message linked to a digital signature, and a signed receipt. The host system redirects the signed receipt to the mobile communication device. The host system determines if the email message is available at the mobile communication device, and if not, the host system retrieves the email message and redirects the email message to the mobile communication device. The mobile communication device can then verify the signed receipt based on the email message. Optionally, rather than the email message, the host system retrieves and/or recalculates data elements associated with the email message and required to verify the signed receipt, and redirects these data elements to the mobile communication device. A related system is provided, as well as server computer program for the host system, and device computer program for the mobile communication device. | 2011-10-20 |
20110258447 | METHOD, SYSTEM AND AUTHENTICATION CENTRE FOR AUTHENTICATING IN END-TO-END COMMUNICATIONS BASED ON A MOBILE NETWORK - The invention discloses a method for authenticating in end-to-end communications based on a mobile network, applied to a system including a first service entity requesting a service, a second service entity providing the service and an entity authentication centre, EAC; respectively performing a mutual authentication between the first service entity and the EAC and that between the second service entity and the EAC according to the negotiated authentication mode; if the first service entity requests the second service entity to provide the service, the EAC providing authentication inquiring for the first service entity and the second service entity according to the negotiated authentication mode, and generating a shared derived key according to the negotiated authentication mode; and the first service entity and the second service entity authenticating each other according to the shared derived key and the negotiated authentication mode, and generating a session key for protecting the service. | 2011-10-20 |
20110258448 | METHOD AND SYSTEM OF SECURED DIRECT LINK SET-UP (DLS) FOR WIRELESS NETWORKS - Method and system of secured direct link set-up (DLS) for wireless networks. In accordance with aspects of the method, techniques are disclosed for setting up computationally secure direct links between stations in a wireless network in a manner that is computationally secure. | 2011-10-20 |
20110258449 | SECURE PROXIMITY VERIFICATION OF A NODE ON A NETWORK - A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification protocol. The node-verification protocol includes a query-response sequence, wherein the source node communicates a query to the target node, and the target node communicates a corresponding response to the source node. The target node is configured to communicate two responses to the query: a first response that is transmitted immediately upon receipt of the query, and a second response based on the contents of the query. The communication time is determined based on the time duration between the transmission of the query and receipt of the first response at the source node and the second response is compared for correspondence to the query, to verify the authenticity of the target node. | 2011-10-20 |
20110258450 | METHOD FOR TRANSMITTING SYNCML SYNCHRONIZATION DATA - The present invention provides methods for transmitting SyncML synchronization data. One is that the originator constructs a SyncML message after encrypting the user data to be transmitted and then transmits the data in an existing transmission way; the user data includes, but is not confined to, authentication information, terminal capability information and the data to be synchronized; the other method is that the originator encrypts the SyncML message in the transport layer before transmitting the message, and the recipient deciphers the received SyncML message from transport layer and processes the message subsequently. The two methods can be used either separately or together. If they are used together, the transmission of SyncML synchronization data is provided with double safety insurance. By using the present invention, user data can be transmitted safely without being intercepted by the third party. | 2011-10-20 |
20110258451 | METHOD FOR UPDATING MOBILE TERMINAL SOFTWARE AND MOBILE TERMINAL - Disclosed are a method for updating mobile terminal software and a mobile terminal. The method comprises the following steps: the mobile terminal software and/or the tool software used for updating the mobile terminal software perform hand-shaking according to encrypted hand-shaking data sent by the other party; wherein in the case that said hand-shaking is successful, the mobile terminal software or the tool software carries out verification of new mobile terminal software according to the pre-encrypted feature identifier of the mobile terminal software and the feature identifier of the new mobile terminal software, and determines whether the update is allowable according to the verification result. By introducing the two authentications of both the handshaking data and of the feature identifier, this invention greatly eliminates the possibility that the terminal may be modified by a software, avoids terminal unlocking and modification of language in the relevant technology, overcomes the deficiencies of the prior art in preventing such unlocking and language modification, ensures to the largest extend the terminal security, and effectively protects the interests of providers. | 2011-10-20 |
20110258452 | REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES - The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader. | 2011-10-20 |
20110258453 | METHOD AND APPARATUS FOR AUTHENTICATION TOKEN-BASED SERVICE REDIRECTION - A method, apparatus, and computer readable medium is provided. According to an embodiment, a method includes, receiving a message from a client. The method further includes, forwarding the message to a first service when the message includes an authentication token, where the authentication token indicates that the client can access the first service. The method further includes, forwarding the message to a second service when the message excludes the authentication token. The receiving the message from the client and the forwarding the message to the first service occur over a confidential channel. | 2011-10-20 |
20110258454 | CROSS-DOMAIN IDENTITY MANAGEMENT FOR A WHITELIST-BASED ONLINE SECURE DEVICE PROVISIONING FRAMEWORK - A method for managing identifiers associated with network-enabled devices and used in an identity data system provisioning the network-enabled devices with identity data includes receiving a first set data that includes a previously assigned identifier for one or more of the network-enabled devices that are authorized to be provisioned with new identity data. If identity data is currently installed on the one or more network-enabled devices, each of the previously assigned identifiers in the first set of data is associated with a corresponding identifier linked to the identity data currently installed on the one or more network-enabled devices to establish a second set of data. New identity data is bound to each of the one or more network-enabled devices by assigning a new identifier linked with the new identity data to each of the one or more network-enabled devices to establish a whitelist. The whitelist specifies, for each of the one or more network-enabled devices, its previously assigned identifier, its corresponding identifier and its new identifier that is linked with the new identity data. | 2011-10-20 |
20110258455 | MASKED DIGITAL SIGNATURES - The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual EIGamal or ECDSA type signature verification. | 2011-10-20 |
20110258456 | EXTENSIBLE MANAGEMENT OF SELF-ENCRYPTING STORAGE DEVICES - Security device objects can be utilized to support a stack of components of computer-executable instructions that are directed to managing the security functionality represented by the security device object. In the case of hardware encrypting storage devices, a security device object can represent the self-encrypting capabilities of those devices and the attendant stack can comprise drivers directed to band and key management. A default band management driver can support a band-centric set of input/output controls that can be redirected to the band management driver. It can cache band authentication keys or provide callback mechanisms for key providers to register themselves to provide keys on-demand. Key provider identifiers can be stored on the storage device and utilized to dynamically load, install or upgrade key providers when the band authentication key is required. The band management driver can also prevent the powering-down of the storage device in an unlocked state. | 2011-10-20 |
20110258457 | Method and System for Cryptographic Processing Core - A combination firmware and hardware cryptographic core architecture is provided for encrypting, decrypting and authenticating data. The core provides flexibility to change and add new cryptographic protocols, while providing increased performance by loading new firmware into a microcontroller that programs behavior of various components in the core. The core combines a microcontroller programmable by firmware, and flexible aligner, insertion and removal controllers programmed by the microcontroller that process, manage and manipulate an incoming data stream as it moves through the core. The firmware may be reprogrammed upon an enhancement or change to a protocol while still realizing performance benefits of the hardware. Reprogramming the microcontroller allows it to change the way the aligner, insertion and removal controllers manipulate the data stream as it enters various components. Such systems provide redesign time savings compared to hardware cryptographic core architectures, and improved speed and throughput compared to software cryptographic core architectures. | 2011-10-20 |
20110258458 | METHOD AND APPARATUS FOR MANAGING KEYS USED FOR ENCRYPTING DATA - A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information. | 2011-10-20 |
20110258459 | METHOD FOR PROTECTING THE DECRYPTING OF THE CONFIGURATION FILES FOR PROGRAMMABLE LOGIC CIRCUITS AND CIRCUIT IMPLEMENTING THE METHOD - A method for protecting a programmable logic circuit includes storing data file(s) used for the configuration of the programmable resources of the circuit in a non-volatile memory after having been encrypted. A decryption module internal to the circuit is responsible for decrypting the file(s) by using a secret key stored in the circuit, the decryption module being protected against attacks aiming to obtain the key during the decryption operation by implementing at least one countermeasure technique. | 2011-10-20 |
20110258460 | SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION - A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. | 2011-10-20 |
20110258461 | SYSTEM AND METHOD FOR RESOURCE SHARING ACROSS MULTI-CLOUD ARRAYS - A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are distributed in one or more cloud storage arrays, and each storage resource comprises a unique object identifier that identifies location and structure of the corresponding storage resource at a given point-in-time. The cloud array storage (CAS) application manages the resource sharing process by first taking an instantaneous copy of initial data stored in a first location of a first storage resource at a given point-in-time and then distributing copies of the instantaneous copy to other storage resources in the one or more cloud storage arrays. The instantaneous copy comprises a first unique object identifier pointing to the first storage location of the initial data in the first storage resource and when the instantaneous copy is distributed to a second storage resource, the first unique object identifier is copied into a second storage location within the second storage resource and the second storage location of the second storage resource is assigned a second unique object identifier. | 2011-10-20 |
20110258462 | METHOD, SYSTEM AND INTEGRATED CIRCUIT FOR ENABLING ACCESS TO A MEMORY ELEMENT - A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic is arranged to receive a security key, generate a system key using the received security key and a system specific seed, perform a comparison of the generated system key to a reference key stored in an area of memory of the at least one memory element. The signal processing logic is also arranged to configure a level of access to the at least one memory element based at least partly on the comparison of the generated system key to the reference key stored in memory. | 2011-10-20 |
20110258463 | LOW POWER PAGING OF CONSUMER ELECTRONICS - Systems, apparatuses, and methods are configured to monitor signals received via a transmission medium by a paging monitor to detect an activity trigger. Systems, apparatuses, and methods are further configured to, in response to detecting the activity trigger, cause, by the paging monitor, a main receiver to transition from an energy conservation mode to an active mode to monitor the transmission medium for data traffic. | 2011-10-20 |
20110258464 | Circuit and Method for Detecting a Legacy Powered Device in a Power over Ethernet System - In an embodiment, a power source equipment (PSE) device includes a network port configurable to couple to a network cable and a detection circuit coupled to the network port. The detection circuit is configured to apply a powered device (PD) detection voltage signal including first and second voltages to the network port and to sample a line current of the network port in response to the first and second voltages to detect a complex impedance indicating that a legacy PD is coupled to the network port. | 2011-10-20 |
20110258465 | System and Method for Physical Layer Device Enabled Power Over Ethernet Processing - A system and method for physical layer device enabled power over Ethernet (PoE) processing. A digital PoE control module is included within a physical layer device and is designed to complement an analog PoE control module within a power sourcing equipment. The inclusion of the digital PoE control within the physical layer device reduces the complexity of the power sourcing equipment without sacrificing PoE control features. | 2011-10-20 |
20110258466 | BASEBAND ETHERNET EXTENSION SYSTEM OVER COAXIAL CABLE - The Ethernet extension system contains at least a signal and power conversion device, a conversion device, and a coaxial cable connected in between. The signal and power conversion device receives baseband network signal and electricity in accordance with PoE, and delivers the baseband network signal and electricity to the conversion device through the coaxial cable. The conversion device then provides the baseband network signal to an ordinary Ethernet network device. Baseband network signal and electricity as such could be delivered through a coaxial cable beyond the conventional Ethernet without additional configuration of power supplies or power sources, and without repeatedly modulation and demodulation, coding and decoding, or conversion of communication protocols. | 2011-10-20 |
20110258467 | Leveraging a Power Distribution System to Provide a Mobile Marketing Platform - Some embodiments leverage a power distribution system to provide a mobile platform with which establishments can connect to users and provide targeted advertising and marketing to the user. Specifically, the power distribution system includes several distributed power stations and a server that authorizes access to power of each power station. Additionally, the power distribution system provide a mobile application that runs on an electronic device and that sends to the server a request to access power from a power station at a particular establishment. Through the mobile application, establishments can provide content that includes advertising, promotions, and other information to keep the users interested in the goods and services of the establishments. The advertising, promotions, and other information may be customized per user based on previous user information or activity that is logged by the mobile application. | 2011-10-20 |
20110258468 | OPTIMIZING POWER MANAGEMENT IN PARTITIONED MULTICORE VIRTUAL MACHINE PLATFORMS BY UNIFORM DISTRIBUTION OF A REQUESTED POWER REDUCTION BETWEEN ALL OF THE PROCESSOR CORES - Handling requests for power reduction by first enabling a request for an amount of power change, e.g. reduction by any partition. In response to the request for power reduction, an equal proportion of the whole amount of power reduction is distributed between each of a set of cores providing the entitlements to the partitions, and the entitlement of the requesting partition is reduced by an amount corresponding to the whole amount of the power change. | 2011-10-20 |
20110258469 | POWER REDUCTION FOR SYSTEM ON CHIP - Disclosed herein are SOC devices with peripheral units having power management logic. | 2011-10-20 |
20110258470 | ELECTRONIC DEVICE AND POWER CONSUMPTION MEASURING METHOD THEREOF - An embodiment is directed to an electronic device, including a power management device, the power management device generating a plurality of powers according to power management information, and a processor, the processor including a plurality of power blocks supplied with the plurality of powers through a plurality of power lines, and including a power consumption measurement block that measures power consumption of respective power blocks of the plurality of power blocks. | 2011-10-20 |
20110258471 | BATTERY MANAGEMENT SYSTEM AND METHOD FOR TRANSFERRING DATA WITHIN THE BATTERY MANAGEMENT SYSTEM - A battery management system is provided. The system includes a battery monitoring device having a microprocessor and a hardware component. The microprocessor identifies a non-modifiable node ID from the hardware component. The microprocessor also obtains operational parameters associated with the at least one battery cell. The microprocessor computes a network ID for the battery monitoring device based on the non-modifiable node ID. The system further includes a main controller that communicates with the battery monitoring device via a communication bus utilizing the network ID. | 2011-10-20 |
20110258472 | SYSTEMS, APPARATUS AND METHODS CAPABLE OF SHELF MANAGEMENT - A method according to one embodiment may include discovering, by software, at least one variable from at least one component populated on a shelf system. The method may also include performing, by the software, at least one shelf management function based on at least one variable. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment. | 2011-10-20 |
20110258473 | STORAGE SUBSYSTEM AND POWER SUPPLY SYSTEM - The present invention includes a plurality of disk units for storing data from a host computer, a plurality of power supply apparatuses for supplying DC power to each of the disk units via main power supply wirings, and a redundant power supply apparatus for generating, with any one of the disk units among the plurality of disk units as a load, DC power to the load. As auxiliary power supply wirings for guiding the output of the redundant power supply apparatus to each of the disk units, a common power supply wiring that is common to each of the power supply apparatuses, a plurality of branch power supply wirings branching from the common power supply wiring and connected to each of the disk units, and a redundant power supply wiring for connecting the redundant power supply apparatus and the common power supply wiring are wired to a backboard. | 2011-10-20 |
20110258474 | METHOD AND SYSTEM FOR PRECISE SYNCHRONIZATION OF AUDIO AND VIDEO STREAMS DURING A DISTRIBUTED COMMUNICATION SESSION WITH MULTIPLE PARTICIPANTS - Described are the architecture of such a system, algorithms for time synchronization during a multiway conferencing session, methods to fight with network imperfections such as jitter to improve synchronization, methods of introducing buffering delays to create handicaps for players with faster connections, methods which help players with synchronization (such as a synchronized metronome during a music conferencing session), methods for synchronized recording and live delivery of synchronized data to the audience watching the distributed interaction live over the Internet. | 2011-10-20 |
20110258475 | Dynamically Calibrated DDR Memory Controller - A DDR memory controller is described wherein a core domain capture clock is created by programmably delaying the core clock of the memory controller. The delay of this capture clock is typically calibrated during a power on the initialization sequence in concert with a DDR memory in a system environment, thereby minimizing the effects of system delays and increasing both device and system yield. An additional embodiment also includes programmably delaying the incoming dqs signal. To compensate for voltage and temperature variations over time during normal operation, a runtime dynamic calibration mechanism and procedure is also provided. | 2011-10-20 |
20110258476 | APPARATUS FOR DETECTING PRESENCE OR ABSENCE OF OSCILLATION OF CLOCK SIGNAL - A semiconductor apparatus includes an arithmetic circuit that executes a program based on an operating clock signal input through a clock transfer node, an internal oscillator that generates an internal clock signal to be used internally, a watch dog timer that counts the internal clock signal, detect that a count value reaches a predetermined value of an execution time of the program in the arithmetic circuit and output a notification signal, and a clock monitor circuit that detects presence or absence of the operating clock signal in response to the notification signal. | 2011-10-20 |
20110258477 | SELECTIVE LIMITS ON PROCESSOR TURBO MODES - A method, computer program product and system for controlling the maximum turbo mode of a processor in a turbo boost state. The method comprises limiting a maximum turbo mode available to the processor by over-reporting the amount of current drawn by the processor to the current monitoring feedback line to the processor, wherein the processor uses the over-reported current to maintain operation of the processor within performance specifications of the processor. An automatic calibration routine may be used to determine nominal amounts of current over-reporting that may be used to prevent the processor performance from exceeding the maximum turbo mode. In one embodiment, a digital potentiometer is included in the voltage regulator circuit to over-report the current as instructed. | 2011-10-20 |
20110258478 | FACADE FOR BUSINESS RISK MINIMIZATION IN CHANGE ADMINISTRATION VIA RISK ESTIMATION AND MISTAKE IDENTIFICATION BY TICKET ANALYSIS - A system and method of employing a façade to intercept change action commands to be carried out on a target IT endpoint resource. The intercepted commands are compared to information on a corresponding change ticket and any differences, along with the information such as target history, are used to compute a risk assessment of the risk in allowing the intercepted change action commands to be executed. Where the risk exceeds a predetermined threshold, the intercepted change action commands may be modified or eventually aborted. | 2011-10-20 |
20110258479 | SERVER-TO-SERVER INTEGRITY CHECKING - A method performed by a primary server includes receiving integrity criteria and sending a health check request to a secondary server based on the received integrity criteria. The method also includes receiving integrity information from the secondary server and checking the integrity information against the integrity criteria. The method further includes initiating a non-compliance action if the integrity information does not comply with the integrity criteria. | 2011-10-20 |
20110258480 | METHODS AND APPARATUS FOR MANAGING ASYNCHRONOUS DEPENDENT I/O FOR A VIRTUAL FIBRE CHANNEL TARGET - Methods and apparatus for managing exchange IDs for multiple asynchronous dependent I/O operations generated for virtual Fibre Channel (FC) target volumes. Features and aspects hereof allocate a range of exchange identifier (X_ID) values used in issuing a plurality of physical I/O operations to a plurality of physical FC target devices that comprise the virtual FC target volume. The plurality of physical I/O operations are dependent upon one another for completion of the original request to the virtual FC target volume and allow substantially parallel operation of the plurality of physical FC target devices. A primary X_ID is selected from the range of allocated X_ID values for communications with the attached host system that generated the original request to the virtual FC target volume. | 2011-10-20 |
20110258481 | Deploying A Virtual Machine For Disaster Recovery In A Cloud Computing Environment - Deploying a virtual machine in a cloud computing environment, the cloud computing environment including one or more virtual machines (‘VMs’), the VMs being modules of automated computing machinery installed upon cloud computers disposed within data centers, the cloud computing environment also including a cloud operating system and data center administration servers operably coupled to the VMs, including deploying, by the cloud operating system in a local data center, a VM, including flagging the VM for disaster recovery; storing, by the cloud operating system in computer memory in a remote data center, a copy of the flagged VM; and configuring, by the cloud operating system, the remote data center to replace data processing operations of the flagged VM in the local data center with data processing operations of the copy in the remote data center when the flagged VM in the local data center is lost through disaster. | 2011-10-20 |
20110258482 | Memory Management and Recovery for Datacenters - A system including a plurality of servers, a client, and a metadata server is described herein. The servers each store tracts of data, a plurality of the tracts comprising a byte sequence and being distributed among the plurality of servers. To locate the tracts, the metadata server generates a table that is used by the client to identify servers associated with the tracts, enabling the client to provide requests to the servers. The metadata server also enables recovery in the event of a server failure. Further, the servers construct tables of tract identifiers and locations to use in responding to the client requests. | 2011-10-20 |
20110258483 | Data Layout for Recovery and Durability - A Metadata server described herein is configured to generate a metadata table optimized for data durability and recovery. In generating the metadata table, the metadata server associates each possible combination of servers with one of the indices of the table, thereby ensuring that each server participates in recovery in the event of a server failure. In addition, the metadata server may also associate one or more additional servers with each index to provide added data durability. Upon generating the metadata table, the metadata server provides the metadata table to clients or servers. Alternatively, the metadata server may provide rules and parameters to clients to enable those clients to identify servers storing data items. The clients may use these parameters and an index as inputs to the rules to determine the identities of servers storing or designated to store data items corresponding to the index. | 2011-10-20 |
20110258484 | FAILOVER AND LOAD BALANCING - Also provided are techniques for failover when a network adapter fails, wherein the network adapter is connected to a miniport driver that is connected to a filter driver. With the miniport driver, it is determined that at least one of the network adapter and a data path through the network adapter has failed. With the miniport driver, the filter driver is notified that at least one of the network adapter and the data path through the network adapter has failed. | 2011-10-20 |
20110258485 | TRANSITIONAL REPLACEMENT OF OPERATIONS PERFORMED BY A CENTRAL HUB - A central hub is coupled to a plurality of computational devices. The central hub stores a data structure that grants locks for accessing common data stored at the central hub, wherein the common data is shared by the plurality of computational devices. Each computational device maintains locally those locks that are held by the computational device in the data structure stored at the central hub. In response to a failure of the data structure stored at the central hub, a selected computational device of the plurality of computational devices is determined to be a manager system. Other computational devices besides the manager system communicate to the manager system all locks held by the other computational devices in the data structure stored at the central hub. The data structure and the common data are generated and stored at the manager system. Transactions are performed with respect to the data structure stored at the manager system, until the data structure stored at the central hub is operational. | 2011-10-20 |
20110258486 | RESTORING PROGRAMS AFTER OPERATING SYSTEM FAILURE - A state restoration unit tracks opening and closing of programs within a computer operating system. Responsive to detecting opening and closing of programs, a state restoration structure is updated. After the computer operating system restarts from a failure, the state restoration structure is accessed. The state restoration unit restores those of the programs indicated as open in the state restoration structure. | 2011-10-20 |
20110258487 | NAND POWER FAIL RECOVERY - Techniques to recover data from an indirected non-volatile memory system after unexpected power failure, as, e.g., NAND memory in electronic devices are disclosed. | 2011-10-20 |
20110258488 | Server Failure Recovery - A metadata server configured to maintain storage assignment mappings in non-persistent storage is described herein. The tract storage assignment mappings associate servers with storage assignments, the storage assignments representing the data stored on the servers. Responsive to a failure, the metadata server receives the storage assignments from the servers and rebuilds the storage assignment mappings from the storage assignments. The metadata server is also configured to enable clients to operate during a recovery process for a failed server by providing the storage assignment mappings to the clients during the recovery process. Also during the recovery process, the replacement server for the failed server conditionally overwrites stored data with other data received from other servers as part of the recovery process. The replacement server conditionally overwrites based on version information associated with the data and version information associated with the other data, the version information being associated with one or more versions of the storage assignment mappings | 2011-10-20 |
20110258489 | TEST SYSTEM WITH DIGITAL CALIBRATION GENERATOR - The present invention relates to calibration of a computerized test system ( | 2011-10-20 |
20110258490 | Testing Components for Thread Safety - A checking system is described for determining whether a component is thread safe in the course of interacting with two or threads in a client environment. The checking system uses a manual, automatic, or semi-automatic technique to generate a test. The checking system then defines a set of coarse-grained observations for the test, in which the component is assumed to exhibit linearizability when interacting with threads. The set of coarse-grained observations may include both complete and “stuck” histories. The checking system then generates a set of fine-grained observations for the tests; here, the checking system makes no assumptions as to the linearizability of the component. The checking system identifies potential linearizability errors as those entries in the set of fine-grained observations that have no counterpart entries in the set of coarse-grained observations. The checking system may rely on a stateless model checking module to perform its functions. | 2011-10-20 |
20110258491 | TEST APPARATUS AND TEST METHOD - A test apparatus includes: a test executing section executing a test on the device under test; a fail memory storing a test result outputted by the test executing section, the fail memory implementing an interleave technology for interleaving accesses to a plurality of banks; a buffer memory storing the test result transferred from the fail memory and transfers at least part of the test result to a cache memory, the buffer memory being either a memory not implementing the interleave technology or a memory implementing the interleave technology but having a smaller number of banks than the fail memory; the cache memory storing the at least part of the test result transferred from the buffer memory, the cache memory allowing random access in shorter time than the buffer memory does; and an analysis section analyzing the test result stored in the cache memory. | 2011-10-20 |
20110258492 | DEVICE FOR TESTING SERIAL INTERFACE - A device for testing a serial interface of a circuit board. The device includes a testing serial interface, a memory, a processor. The testing serial interface is coupled to the serial interface of the circuit board. The processor is electrically connected between the memory and the at least one testing serial interface. The processor is configured for receiving first serial data from the circuit board via the testing serial interface, converting the first serial data to parallel data, and writing the parallel data into the memory, and also configured for reading the parallel data from the memory, converting the parallel data to second serial data and transmits the second serial data to the circuit board via the testing serial interface. | 2011-10-20 |
20110258493 | DETECTING NO PROGRESS STATE OF AN APPLICATION - A method, system, and computer usable program product for detecting a no progress state of an application are provided in the illustrative embodiments. A resource usage and an output of a set of applications are monitored. The resource usage and the output are measured to determine a resource usage value and an output value at a given time. A determination is made whether the resource usage value is included in a sub-range of a resource usage scale and the output value is included in a sub-range of an output scale where the sub-range of the resource usage scale corresponds to the sub-range of the output scale. The no progress state of the application is detected if the determination is negative | 2011-10-20 |
20110258494 | Method for Correcting Prediction Errors of Signal Values with Time Variation Subjected to Interference by Various Uncontrollable Systematic Effects - A method for correcting the prediction of values of signal with time variation, in particular for navigation messages sent by the global satellite navigation systems, includes the following steps for the correction of the predictions of a parameter included in a received signal and varying in time: estimation of the prediction error based on a first batch of values estimated during a determined time period by comparing these values to the values previously predicted for the same determined time period, analysis of the predicted time-oriented series of prediction errors by a method for processing the signal and isolating the contributions of the systematic effects, and extrapolation of the behavior of the contributions of the systematic effects during the time period concerned and correction of the predictions using the duly extrapolated values. | 2011-10-20 |
20110258495 | METHODS OF CALCULATING COMPENSATION VOLTAGE AND ADJUSTING THRESHOLD VOLTAGE AND MEMORY APPARATUS AND CONTROLLER - Methods of calculating a compensation voltage and adjusting a threshold voltage, a memory apparatus, and a controller are provided. In the present invention, data is written into a rewritable non-volatility memory, and the data is then read from the rewritable non-volatility memory and compared with the previously written data to obtain error bit information. The compensation voltage of the threshold voltage is calculated according to the error bit information, and the threshold voltage is adjusted according to the compensation voltage. | 2011-10-20 |
20110258496 | DATA READING METHOD, MEMORY STORAGE APPARATUS AND MEMORY CONTROLLER THEREOF - A data reading method for a writable non-volatile memory module having physical pages is provided. The method includes grouping the physical pages into a plurality of physical page groups. The method also includes reading first data from a physical page of a first physical page group by applying a first threshold voltage set. The method still includes, when the first data can be corrected by an error checking and correcting circuit and an error bit number corresponding to the first data is not smaller than an error bit number threshold, calculating compensation voltages for the first threshold voltage set. The method further includes adjusting the first threshold voltage set by the compensation voltages and applying the adjusted first threshold voltage set to read data from the physical pages of the first physical page group. Accordingly, data stored in the rewritable non-volatile memory module can be correctly read. | 2011-10-20 |
20110258497 | UTILIZATION OF MEMORY REFRESH CYCLES FOR PATTERN MATCHING - Searching for patterns stored on a hardware storage device. A method includes, as part of a memory refresh operation, performing a read to read contents of a portion of a memory. The method further includes writing the read contents of the portion of memory back to the portion of memory. The read contents are provided to data comparison logic. Using the data comparison logic; the read contents are compared to predetermined data patterns. A determination is made as to whether or not the contents match at least one of the predetermined data patterns. When the read contents match at least one of the predetermined data patterns, a software readable indicator is provided indicating that the read contents match at least one of the predetermined data patterns. Similar embodiments may be implemented using hard drive head wear leveling operations. | 2011-10-20 |
20110258498 | Test Architecture Including Cyclical Cache Chains, Selective Bypass Scan Chain Segments, And Blocking Circuitry - A test architecture is described that adds minimal area overhead and increases encoding bandwidth by using one or more cyclical cache chains for a set of the test patterns provided to the scan chains of the design. A multiplexer associated with a scan chain can be used to bypass a segment of the scan chain that includes unknown values. Blocking circuitry can be programmed to completely block one or more scan chains including unknown values. | 2011-10-20 |
20110258499 | SYSTEM FOR PERFORMING THE TEST OF DIGITAL CIRCUITS - A system performs the test of a digital circuit. The system comprises a controller configured for executing the test of the digital circuit, a memory configured for storing a status of the digital circuit, and a state machine configured for controlling, before the execution of the test, the storage into the memory of the status of the digital circuit and configured for controlling, after the execution of the test, the restore into the digital circuit of the status stored into the memory. | 2011-10-20 |
20110258500 | ADAPTING SCAN ARCHITECTURES FOR LOW POWER OPERATION - Scan architectures are commonly used to test digital circuitry in integrated circuits. The present disclosure describes a method of adapting conventional scan architectures into a low power scan architecture. The low power scan architecture maintains the test time of conventional scan architectures, while requiring significantly less operational power than conventional scan architectures. The low power scan architecture is advantageous to IC/die manufacturers since it allows a larger number of circuits (such as DSP or CPU core circuits) embedded in an IC/die to be tested in parallel without consuming too much power within the IC/die. Since the low power scan architecture reduces test power consumption, it is possible to simultaneously test more die on a wafer than previously possible using conventional scan architectures. This allows wafer test times to be reduced which reduces the manufacturing cost of each die on the wafer. | 2011-10-20 |
20110258501 | METHOD AND APPARATUS FOR LOW-PIN-COUNT SCAN COMPRESSION - A low-pin-count scan compression method and apparatus for reducing test data volume and test application time in a scan-based integrated circuit. The scan-based integrated circuit contains one or more scan chains, each scan chain comprising one or more scan cells coupled in series. The method and apparatus includes a programmable pipelined decompressor comprising one or more shift registers, a combinational logic network, and an optional scan connector. The programmable pipelined decompressor decompresses a compressed scan pattern on its compressed scan inputs and drives the generated decompressed scan pattern at the output of the programmable pipelined decompressor to the scan data inputs of the scan-based integrated circuit. Any input constraints imposed by said combinational logic network are incorporated into an automatic test pattern generation (ATPG) program for generating the compressed scan pattern for one or more selected faults in one-step. | 2011-10-20 |
20110258502 | WAFER SCALE TESTING USING A 2 SIGNAL JTAG INTERFACE - Testing of die on wafer is achieved by; (1) providing a tester with the capability of externally communicating JTAG test signals using simultaneously bidirectional transceiver circuitry, (2) providing die on wafer with the capability of externally communicating JTAG test signals using simultaneously bidirectional transceiver circuitry, and (3) providing a connectivity mechanism between the bidirectional transceiver circuitry's of the tester and a selected group or all of the die on wafer for communication of the JTAG signals. | 2011-10-20 |
20110258503 | Fully X-tolerant, Very High Scan Compression Scan Test Systems And Techniques - Scan testing and scan compression are key to realizing cost reduction and shipped quality. New defect types in ever more complex designs require increased compression. However, increased density of unknown (X) values reduces effective compression. A scan compression method can achieve very high compression and full coverage for any density of unknown values. The described techniques can be fully integrated in the design-for-test (DFT) and automatic test pattern generation (ATPG) flows. Results from using these techniques on industrial designs demonstrate consistent and predictable advantages over other methods. | 2011-10-20 |
20110258504 | TEST ACCESS MECHANISM FOR DIAGNOSIS BASED ON PARTITIOINING SCAN CHAINS - Disclosed are representative embodiments of methods, apparatus, and systems for partitioning-based Test Access Mechanisms (TAM). Test response data are captured by scan cells of a plurality scan chains in a circuit under test and are compared with test response data expected for a good CUT to generate check values. Based on the check values, partition pass/fail signals are generated by partitioning scheme generators. Each of the partitioning scheme generators is configured to generate one of the partition pass/fail signals for one of partitioning schemes. A partitioning scheme divides the scan cells into a set of non-overlapping partitions. Based on the partition pass/fail signals, a failure diagnosis process may be performed. | 2011-10-20 |
20110258505 | METHOD AND APPARATUS FOR AC SCAN TESTING WITH DISTRIBUTED CAPTURE AND SHIFT LOGIC - An integrated circuit device includes a plurality of functional tiles. Each functional tile may be configured into a scan chain. A clock generator is operable to generate an internal clock signal that is distributed to each of the functional tiles. A clock gater is associated with each of the functional tiles. Each clock gater is operable to receive an external enable signal and the internal clock signal, generate a scan clock signal for loading a test pattern into the scan chain based on the external enable signal and the internal clock signal, and generate at least one capture clock signal for capturing a response of the tile to the test pattern responsive to identifying the loading of the test pattern. | 2011-10-20 |
20110258506 | REDUCED SIGNALING INTERFACE METHOD & APPARATUS - This disclosure describes a reduced pin bus that can be used on integrated circuits or embedded cores within integrated circuits. The bus may be used for serial access to circuits where the availability of pins on ICs or terminals on cores is limited. The bus may be used for a variety of serial communication operations such as, but not limited to, serial communication related test, emulation, debug, and/or trace operations of an IC or core design. Other aspects of the disclosure include the use of reduced pin buses for emulation, debug, and trace operations and for functional operations. In a fifth aspect of the present disclosure, an interface select circuit, FIGS. | 2011-10-20 |
20110258507 | MULITCAST VIDEOCONFERENCING - In one embodiment, the invention is a method of transferring data. The method includes receiving a first video data stream at a first machine. The method also includes multicasting the first video data stream in uncompressed and raw form through a network. The method further includes receiving the first video data stream at a second machine. The method also includes playing the first video data stream on the second machine. | 2011-10-20 |
20110258508 | Systems and Methods for Dynamic Scaling in a Data Decoding System - Various embodiments of the present invention provide systems and methods for data processing. As an example, a data processing circuit is disclosed that includes a decoder circuit and a scalar circuit. The decoder circuit is operable to perform a data decoding algorithm by processing at least one decoder message, and the scalar circuit is operable to multiply the decoder message by a variable scalar value. | 2011-10-20 |
20110258509 | Multi-Level Signal Memory with LDPC and Interleaving - Embodiments of the present invention provide multi-level signal memory with LDPC and interleaving. Thus, various embodiments of the present invention provide a memory apparatus that includes a memory block comprising a plurality of memory cells, each memory cell adapted to operate with multi-level signals. Such a memory apparatus also includes a low density parity check (LDPC) coder to LDPC code data values to be written into the memory cells and an interleaver adapted to apply bit interleaved code modulation (BICM) to the LDPC coded data values to generate BICM coded data values. Other embodiments may be described and claimed, | 2011-10-20 |
20110258510 | CODE GENERATOR AND DECODER FOR COMMUNICATIONS SYSTEMS OPERATING USING HYBRID CODES TO ALLOW FOR MULTIPLE EFFICIENT USES OF THE COMMUNICATIONS SYSTEMS - A method of encoding data for transmissions from a source to a destination over a communications channel is provided. The method operates on an ordered set of source symbols and may generate zero or more redundant symbols from the source symbols, wherein data is encoded in a first step according to a simple FEC code and in a second step, data is encoded according to a second FEC code, more complex than the first FEC code. The first FEC code and/or the second FEC code might comprise coding known in the art. These steps result in two groups of encoded data in such a way that a low-complexity receiver may make use of one of the groups of encoded data while higher complexity receivers may make use of both groups of encoded data. | 2011-10-20 |
20110258511 | AUTOMATIC ERROR CONTROL SCHEME SELECTION FOR FIXED-LENGTH MESSAGES BASED UPON MESSAGE PAYLOAD SIZE - A communication system enabling wireless transmission of messages via packets; and a method of operating the system provides for improved accuracy in the transmission of a message, particularly for overcoming signal distortion associated with the phase changes and varying multipath found in transmissions from the locomotive of a moving train. The maximum benefit of forward-error correction (FEC) with Reed-Solomon (RS) coding is applied for a message payload that is significantly shorter than the fixed length of a packet, with lesser coding being performed with longer payloads. | 2011-10-20 |
20110258512 | Apparatus, System, and Method for Storing Data on a Solid-State Storage Device - An apparatus, system, and method are disclosed for storing data on a solid-state storage device. A method includes receiving a storage request to store data on the solid-state storage device, representing the data in an object entry in an object index maintained by a solid-state storage device controller, storing the data as one or more object data segments on the solid-state storage device, and referencing in the object entry the one or more object data segments on the solid-state storage device. | 2011-10-20 |
20110258513 | SNR-Based Variable-Threshold Majority-Logic Decoder - Apparatus having corresponding methods and tangible computer-readable medium embodying instructions executable by a computer to perform the methods comprise: a receiver adapted to receive a signal representing an input code block, wherein the input code block represents information encoded with a (N, K) difference-set cyclic code, wherein the input code block includes N symbols, and wherein the N symbols represent K bits of the information; an estimator adapted to estimate a signal-to-noise ratio of the signal; a raised-threshold majority-logic decoder adapted to decode the input code block according to a raised-threshold majority-logic decoding algorithm when the signal-to-noise ratio does not exceed a first predetermined threshold; and a variable-threshold majority-logic decoder adapted to decode the input code block according to a variable-threshold majority-logic decoding algorithm when the signal-to-noise ratio exceeds the first predetermined threshold. | 2011-10-20 |
20110258514 | OVERLAPPING ERROR CORRECTION OPERATIONS - Systems and methods of overlapping error correction operations are disclosed. A method at an encoder device includes receiving data bits to be encoded including a first bit, a second bit, and a third bit. A first encode operation to encode a first group of the data bits is initiated to generate a first codeword. The first group of the data bits includes the first bit and the second bit, but not the third bit. A second encode operation to encode a second group of the data bits is initiated to generate a second codeword. The second group of the data bits includes the second bit and the third bit, but not the first bit. | 2011-10-20 |
20110258515 | Memory Having an ECC System - An error correction code system for a memory is provided. The memory is provided with a parity array that is directly accessible. An embodiment of the error correction code system includes writing and reading test data directly to the parity array. The data read from the parity array is compared with the test data written to the parity array to detect errors. | 2011-10-20 |
20110258516 | Method, a device and a computer program support for verification of checksums for self-modified computer code - A function of a software program is stored in a memory during execution in a device of the software program. A processor relocates the function in a region of the memory comprising dummy code, transforms the dummy code in a predictable manner, generates a predicted checksum for the region based on a previous checksum, generates a calculated checksum over the region, and verifies the integrity of the function by comparing the predicted checksum and the calculated checksum. Also provided are a device and a computer program product. | 2011-10-20 |
20110258517 | DATA WRITING METHOD AND SYSTEM - A data writing method for writing data to a flash memory includes writing an initial value to the data storage area, determining whether or not the writing of the initial value is performed normally based on a write flag, writing data to the data storage area when the writing is performed normally, and erasing a block including the data storage area when the writing is not performed normally. An initial value is written to the data storage area before writing data, so that whether or not an error correction code storage area contains the initial value may be confirmed. An erase operation of the block is performed only when the error correction code storage area does not contain the initial value, so that the number of times of erasure of the block may be reduced and the life of the product may be increased. | 2011-10-20 |
20110258518 | Variable modulation with LDPC (Low Density Parity Check) coding - Variable modulation within combined LDPC (Low Density Parity Check) coding and modulation coding systems. A novel approach is presented for variable modulation encoding of LDPC coded symbols. In addition, LDPC encoding, that generates an LDPC variable code rate signal, may also be performed as well. The encoding can generate an LDPC variable code rate and/or modulation signal whose code rate and/or modulation may vary as frequently as on a symbol by symbol basis. Some embodiments employ a common constellation shape for all of the symbols of the signal sequence, yet individual symbols may be mapped according different mappings of the commonly shaped constellation; such an embodiment may be viewed as generating a LDPC variable mapped signal. In general, any one or more of the code rate, constellation shape, or mapping of the individual symbols of a signal sequence may vary as frequently as on a symbol by symbol basis. | 2011-10-20 |
20110258519 | Error Control On-Demand - The present invention relates to a new error control paradigm in a packet switched network that is particularly advantageous for multicast transmission. | 2011-10-20 |
20110258520 | LOCATING AND CORRECTING CORRUPT DATA OR SYNDROME BLOCKS - Disclosed is a method and system of determining a data block of a RAID level 6 stripe that has corrupted or incorrect data. For each data block of the stripe, a reconstructed data block is created using the other data blocks and the P syndrome data block. The reconstructed data block and the other data blocks are used to create a new Q syndrome data block. The new Q syndrome data block and the stored Q syndrome data block are compared. If the new Q syndrome data block and the stored Q syndrome data block match, the data block is marked as being suspected as having corrupted or incorrect data. This process is repeated for every data block in the stripe. If there is only a single suspected data block, the reconstructed data block is stored as a replacement of the suspect data block in the stripe. | 2011-10-20 |
20110258521 | INTERLEAVING SCHEME FOR AN LDPC CODED QPSK/8PSK SYSTEM - An approach is provided for interleaving low density parity check (LDPC) encoded bits in QPSK/8PSK modulation systems. By assigning the bits determining modulation symbols based on different bit degrees, one can efficiently find the desirable tradeoff between error performance and error floor provided by the LDPC codes in use. | 2011-10-20 |
20110258522 | Encoding apparatus, decoding apparatus, and encoding and decoding system - An encoding apparatus derives a bit order based on a puncturing table that specifies different puncturing patterns for different transmission rates. The encoding apparatus then generates an error correcting code from an input information bit string and rearranges the error correcting code in the derived bit order. The error correcting code is punctured by taking a number of consecutive bits from the rearranged error correcting code. The number of bits taken varies depending on the transmission rate. The punctured error correcting code is output to a decoding apparatus, which realigns the code bits according to the transmission rate and the puncturing table, then uses the realigned error correcting code to correct errors in erroneous data. Rearrangement of the error correcting code makes the puncturing process more efficient by avoiding the need to decide whether to take or discard each bit individually. | 2011-10-20 |
20110258523 | ELECTRONIC READING APPARATUS AND METHOD FOR FLIPPING THROUGH DISPLAYED FILES - An electronic reading apparatus includes a display unit, and a processing unit. The processing unit is configured to selectively control the electronic reading apparatus to enter a single page mode in which a single page interface is displayed on the display unit. Also enter a multipage mode in which a multipage interface is displayed on the display unit according to user inputs, and to display a page corresponding to a marked page icon in the single page mode when a confirm signal is received from an input unit, the single page interface displaying a set of page icons, each of the page icons corresponding to a page of a file. The multipage interface displaying a set of folder icons, each of the folder icons corresponding to a particular number of continuous pages of the file. A method for flipping through displayed files is also provided. | 2011-10-20 |
20110258524 | GROUPING QUICK HYPERLINK - A hyperlink and navigation apparatus for providing a fast and flexible form of user navigation is presented. The hyperlink may be configured to simultaneously open multiple destinations when activated. The multiple destinations may include any number of applications or webpages. The hyperlink may also be user configurable to define the destinations associated with the hyperlink. | 2011-10-20 |
20110258525 | System, method, and computer software for linked window interfaces - Systems, methods, and computer program products are described for providing a graphical user interface (GUI) that may include a first openable window of image features constituting, for example, a pseudo-image of a scanned probe array. The image features each have one or more characteristics representing one or more hybridization reactions associated with a probe of the probe array. The GUI also has a second openable window including data features, each relating to one or more quantifications of one or more hybridization reactions associated with a probe of the probe array. This second window may be, for example, a scatter plot of hybridization intensities of probes to two or more labeled samples. The GUI further includes a third openable window including descriptive features such as rows of a spreadsheet. Each row may include descriptive elements associated with a probe. When a user selects a feature from any of the two or more windows, a corresponding feature in at least one other of the two or more windows is highlighted. | 2011-10-20 |
20110258526 | WEB CONTENT ANNOTATION MANAGEMENT WEB BROWSER PLUG-IN - Annotation data can be captured for at least one user-created content annotation regarding Web content presented within a Web browser by a content annotation plug-in. The content annotation plug-in can be an auxiliary software component of the Web browser. The annotation data for the at least one user-created content annotation can be stored in a data store. The data store can be a component of a computing device currently running the Web browser or a content annotation server remotely located to the computing device. A viewable aggregate of the Web content and the annotation data can be provided to at least one user-specified recipient. | 2011-10-20 |
20110258527 | SYSTEM AND METHOD FOR ANNOTATING AN ELECTRONIC DOCUMENT INDEPENDENTLY OF ITS CONTENT - A system, method, and apparatus for annotating an electronic document independently of its content is provided. According to one variation, a tablet and stylus-based computer is programmed with a document browser that permits a user to annotate documents viewed through the browser. The annotations are stored separately from the viewed document pages but are correlated with the pages such that when a previously annotated page is revisited, annotations relating to that page are retrieved and displayed on top of the page as an “ink” layer. Three different annotation modes are possible: ink, highlight, and erase. Each mode can be selected through a user interface supplied through the browser or through controls embedded in a document. | 2011-10-20 |
20110258528 | METHOD AND SYSTEM FOR REMOVING CHROME FROM A WEB PAGE - A method and system for removing chrome from a web page is provided. An example system includes a parsing module, a text density analyzer, a content node selector | 2011-10-20 |
20110258529 | SYSTEMS AND METHODS FOR EXCLUDING SERVING AN ADVERTISEMENT CAMPAIGN TO UNDESIRED WEB PAGES - Systems and methods are presented for determining whether a web page loaded by a user from a server other than the server of the enterprise providing the advertisement content is safe for displaying the advertisement content. In some aspects, the systems and methods discussed determine if content of a web page to be augmented is content safe for delivering content from a publisher. A script of a web page being loaded by a browser which may execute on a client may identify that content from a publisher is to be displayed with content of the web page. The script may transmit to a server a request to check a safeness of the content of the web page prior to displaying the publisher's content. The script may receive from the server, responsive to the server determining the content of the web page is not safe for the publisher, a predetermined content not from the publisher to display on the web page. | 2011-10-20 |
20110258530 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed, which facilitates a terminal to be used in further consideration of user's convenience. According to at least one of embodiments of the present invention, while a webpage is being displayed in a mobile terminal, a function frequently used by the mobile terminal is available by interconnecting to the webpage despite that the webpage is not closed. The present invention includes storing an object oriented program having a prescribed function, accessing an external server providing a webpage, driving a web browser for a webpage source by receiving the webpage source of the webpage from the external server, and displaying the webpage by rendering the webpage provided by the external server with a modified webpage having the prescribed function reflected thereon in a manner that the web browser configures a document object model tree using the web browser source and the object oriented program together. | 2011-10-20 |
20110258531 | Method and Apparatus for Building Sales Tools by Mining Data from Websites - A website mining tool is disclosed that extracts information from, for example, a company's website and presents the extracted information in a graphical user interface (GUI). In one embodiment, web pages from a website are stored in, for example, computer memory and a structure of the web pages is identified. A plurality of blocks of information is then extracted as a function of this structure and a category is assigned to each block of information. The elements in the blocks of information are then displayed, for example to a salesperson, as a function of these categories. In another embodiment, Document Object Modeling parsing is used to identify the structure of the web pages. In yet another embodiment, a support vector machine is used to categorize each block of information. | 2011-10-20 |
20110258532 | MEMOIZING WEB-BROWSING COMPUTATION WITH DOM-BASED ISOMORPHISM - Methods and devices for accelerating webpage rendering by a browser store document object model (DOM) tree structures and computations of rendered pages, and compare portions of a DOM tree of pages being render to determining if portions of the DOM tree structures match. If a DOM tree of a webpage to be rendered matches a DOM tree stored in memory, the computations associated with the match DOM tree may be recalled from memory, obviating the need to perform the calculations to render the page. A tree isomorphism algorithm may be used to recognize DOM trees stored in memory that match the DOM tree of the webpage to be rendered. Reusing rendering computations may significantly reducing the time and resources required for rendering web pages. Identifying reusable portions of calculation results based on DOM tree isomorphism enables the browser to reuse stored webpage rendering calculations even when URLs do not match. | 2011-10-20 |
20110258533 | Markup Language Stylization - Markup language stylizations that may be applied to a source document are defined in overlay documents such that no special tags or markers are required in the source document to enable stylization via the overlay document. A manifest document defines an association between a source document and one or more overlay documents. | 2011-10-20 |
20110258534 | DECLARATIVE DEFINITION OF COMPLEX USER INTERFACE STATE CHANGES - A visual layout system is described herein that supports complex interface transitions between declaratively defined interface templates and states. The system builds a correspondence between an old template and the new template, preserves visual elements that are present in both templates, and changes the visual elements' properties and position in a rendering tree as needed. The system creates or destroys visuals that are only in one template as needed. Using the visual layout system, a designer can specify states of a user interface within a declarative representation of the template that will produce the specified displays. The system allows sweeping state changes to be specified as templates for the designer. Thus, the visual layout system provides designers with an easy facility for specifying complex user interface transitions and manages the transitions at runtime for acceptable performance. | 2011-10-20 |
20110258535 | INTEGRATED DOCUMENT VIEWER WITH AUTOMATIC SHARING OF READING-RELATED ACTIVITIES ACROSS EXTERNAL SOCIAL NETWORKS - In various embodiments of the present invention, documents (such as PDF documents) are converted into HTML 5 (and CSS 3) formats and integrated into existing HTML 5 web pages in a manner that preserves the original fonts embedded within the documents. The fonts can also be integrated or embedded (e.g., via the standard HTML “iframe” tag) into other web pages. The original appearance of the source document is maintained, the text is preserved as searchable text, and the document is integrated into a web page that can be searched, zoomed, scrolled, printed, etc., utilizing standard web browser controls. As a result, a significantly increased “ad inventory” is enabled, wherein advertisements can be integrated between the individual pages (or even within a page) of the document. In addition, the resulting document (independent of its format) can be passively shared with desired members of a user's external social networks (as well as any social network within the host website), along with other activities and behavior performed by the user on the website hosting the document. | 2011-10-20 |
20110258536 | ONLINE MARKETPLACE FOR AUTOMATICALLY EXTRACTED DATA - A system for automatically locating and data-typing information originating from many Web pages, and then collecting that information in a database. The database is then made available via an online data marketplace which allows users from different organizations to buy and sell related data, associated advertisements, and access to the communities of end-users who may also view advertisements and make purchases. | 2011-10-20 |
20110258537 | GESTURE BASED EDIT MODE - A system and method for document editing. A system includes an operator input device, a processor, gesture recognition program, and an edit mode program. The operator input device that senses gestures and multiple simultaneous touch points. The processor is coupled to the operator input device. The processor executes the gesture recognition program, which recognizes inputs from the input device. The gesture recognition program recognizes a predetermined edit mode gesture and, based only on the gesture, causes the processor to execute the edit mode program. The edit mode program provides a plurality of document editing functions for modifying a currently displayed document. | 2011-10-20 |
20110258538 | Capturing DOM Modifications Mediated by Decoupled Change Mechanism - A DOM-based document editing system is disclosed that maintains an editor DOM that can be modified by a user and includes an edit capture extension. The edit capture extension encodes a change to the editor DOM in a hierarchical coordinate format to identify a location of the change. Encoded changes can then be transferred to a collaborator and/or a persistence engine. The DOM-based document editing system optionally maintains a store DOM in addition to the editor DOM. The edit capture extension identifies changes in the editor DOM by comparing differences between the editor DOM and the store DOM. Identified changes are reflected in the store DOM to ensure that the two DOMs are substantially synchronized. Related changes can be grouped in a group step. The related changes are from either non-contiguous regions of the document or a plurality of editor DOMs. Related changes can be undone and/or redone as a group. | 2011-10-20 |
20110258539 | HANDHELD ELECTRONIC DEVICE AND METHOD FOR PERFORMING SPELL CHECKING DURING TEXT ENTRY AND FOR PROVIDING A SPELL-CHECK LEARNING FEATURE - A handheld electronic device includes a reduced QWERTY keyboard and is enabled with a disambiguation routine that is operable to disambiguate text input. In addition to identifying and outputting representations of language objects that are stored in the memory and that correspond with a text input, the device is able to perform a spell check routine during input of a text entry and to learn and automatically correct mistakes typically made by the particular user. | 2011-10-20 |
20110258540 | INFORMATION PROCESSING APPARATUS FOR DISPLAYING DOCUMENT INFORMATION, ITS PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus displays document information obtained from a storing unit for storing document time/date information at which document data is processed and the document information including storing time/date information at which the document data is stored. The apparatus obtains displaying order information for deciding order of displaying the document information when the document information is displayed, sorts the document information in accordance with the obtained displaying order information, displays the sorted document information. The displaying order information is displaying order based on the storing time/date information. The document information is sorted in accordance with the storing time/date information in order from the old storing time/date information. on the basis of the storing time/date information of the document information, the document information in which a predetermined time has elapsed is displayed distinguishably from the document information in which the predetermined time has not elapsed. | 2011-10-20 |
20110258541 | METHOD AND APPARATUS FOR A TABBED MESSAGING INTERFACE - An approach is provided for improved messaging user interfaces. A subset of available messaging services is selected based, at least in part, on a touch control area of a user interface of a device. The user interface includes, at least in part, tabs corresponding to each of the available messaging services. Presentation of the user interface is caused, at least in part, at the device. The tabs presented in the user interface correspond to the subset. | 2011-10-20 |
20110258542 | PORTABLE ELECTRONIC DEVICE HAVING TOUCH-SENSITIVE DISPLAY WITH VARIABLE REPEAT RATE - A method of controlling the repeat rate of a button displayed on a touch-sensitive display of a portable electronic device is described. In accordance with one embodiment, there is provided a method of controlling touch input on a touch-sensitive display of a portable electronic device, the method comprising: displaying a user interface screen having at least one button on the touch-sensitive display; activating a variable repeat control mode in response to activation input; and repeating an action associated with the button at a rate in dependence on predetermined control input. | 2011-10-20 |
20110258543 | DIALOG SYSTEM - The present solution relates to a method for handling a menu-based user interface, input is received through the user interface. The input is at least one of audio input and menu navigation device input. The input is processed using Basic Dialogue, “BD” and Speech Cursor, “SC”, and then output is provided through the user interface. The output is at least one of audio output, and audio and visual output. | 2011-10-20 |
20110258544 | SYSTEM AND METHOD FOR SUGGESTING AUTOMATED ASSISTANTS BASED ON A SIMILARITY VECTOR IN A GRAPHICAL USER INTERFACE FOR MANAGING COMMUNICATION SESSIONS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for suggesting and inserting automated assistants in a graphical user interface for managing communication sessions. A system for suggesting an automated assistant generates a first vector describing a current context of a current communication session, and generates a comparison of the first vector and a second vector associated with a past context of an automated assistant in a past communication session. Then, if the comparison exceeds a similarity threshold, the system suggests the automated assistant to at least one user in the current communication session. Optionally, the system can predictively insert the automated assistant in a communication session if the comparison exceeds a similarity threshold. The graphical user interface for managing communication sessions displays automated assistants in a same manner as human participants. | 2011-10-20 |
20110258545 | Service for Sharing User Created Comments that Overlay and are Synchronized with Video - In one embodiment, a method for allowing an end user to create a comment stream synchronized to a content stream is provided. The method receives a selection of the content stream that contains video and/or audio that the end user is authorized to view. A computing device adds the comment stream composed of one or more comments that are synchronized with a timeline of the content stream without modifying the content stream. The comment stream and the content stream are stored separately. Playback of comment stream to the content stream is then synchronized. | 2011-10-20 |