27th week of 2011 patent applcation highlights part 52 |
Patent application number | Title | Published |
20110167240 | Method of rotating data in a plurality of processing elements - A method of rotating data in a plurality of processing elements comprises a plurality of shifting operations and a plurality of storing operations, with the shifting and storing operations coordinated to enable a three shears operation to be performed on the data. The plurality of storing operations is responsive to the processing element's positions. | 2011-07-07 |
20110167241 | SUPERCONDUCTING CIRCUIT FOR HIGH-SPEED LOOKUP TABLE - A high-speed lookup table is designed using Rapid Single Flux Quantum (RSFQ) logic elements and fabricated using superconducting integrated circuits. The lookup table is composed of an address decoder and a programmable read-only memory array (PROM). The memory array has rapid parallel pipelined readout and slower serial reprogramming of memory contents. The memory cells are constructed using standard non-destructive reset-set flip-flops (RSN cells) and data flip-flops (DFF cells). An n-bit address decoder is implemented in the same technology and closely integrated with the memory array to achieve high-speed operation as a lookup table. The circuit architecture is scalable to large two-dimensional data arrays. | 2011-07-07 |
20110167242 | Multiple instruction execution mode resource-constrained device - A resource-constrained device comprises a processor configured to execute multiple instruction streams comprising multiple instructions having an opcode and zero or more operands. Each of the multiple instruction streams is associated with one of multiple instruction execution modes having an instruction set comprising multiple instruction implementations. At least one of the multiple instruction implementations is configured to change the processor from a first instruction execution mode to a second instruction execution mode. The processor comprises an instruction fetcher configured to fetch an instruction from one of the multiple instruction streams based at least in part upon a current instruction execution mode. | 2011-07-07 |
20110167243 | SPACE-EFFICIENT MECHANISM TO SUPPORT ADDITIONAL SCOUTING IN A PROCESSOR USING CHECKPOINTS - Techniques and structures are disclosed for a processor supporting checkpointing to operate effectively in scouting mode while a maximum number of supported checkpoints are active. Operation in scouting mode may include using bypass logic and a set of register storage locations to store and/or forward in-flight instruction results that were calculated during scouting mode. These forwarded results may be used during scouting mode to calculate memory load addresses for yet other in-flight instructions, and the processor may accordingly cause data to be prefetched from these calculated memory load addresses. The set of register storage locations may comprise a working register file or an active portion of a multiported register file. | 2011-07-07 |
20110167244 | EARLY INSTRUCTION TEXT BASED OPERAND STORE COMPARE REJECT AVOIDANCE - A method and system for early instruction text based operand store compare avoidance in a processor are provided. The system includes a processor pipeline for processing instruction text in an instruction stream, where the instruction text includes operand address information. The system also includes delay logic to monitor the instruction stream. The delay logic performs a method that includes detecting a load instruction following a store instruction in the instruction stream, comparing the operand address information of the store instruction with the load instruction. The method also includes delaying the load instruction in the processor pipeline in response to detecting a common field value between the operand address information of the store instruction and the load instruction. | 2011-07-07 |
20110167245 | Task list generation, parallelism templates, and memory management for multi-core systems - There is provided a multi-core system that provides automated task list generation, parallelism templates, and memory management. By constructing, profiling, and analyzing a sequential list of functions to be executed in a parallel fashion, corresponding parallel execution templates may be stored for future lookup in a database. A processor may then select a subset of functions from the sequential list of functions based on input data, select a template from the template database based on particular matching criteria such as high-level task parameters, finalize the template by resolving pointers and adding or removing transaction control blocks, and forward the resulting optimized task list to a scheduler for distribution to multiple slave processing cores. The processor may also analyze data dependencies between tasks to consolidate tasks working on the same data to a single core, thereby implementing memory management and efficient memory locality. | 2011-07-07 |
20110167246 | Systems and Methods for Data Detection Including Dynamic Scaling - Various embodiments of the present invention provide systems and methods for data processing. For example, a data processing system is disclosed that includes a channel detector circuit. The channel detector circuit includes a branch metric calculator circuit that is operable to receive a number of violated checks from a preceding stage, and to scale an intrinsic branch metric using a scalar selected based at least in part on the number of violated checks to yield a scaled intrinsic branch metric. | 2011-07-07 |
20110167247 | System for efficiently tracing data in a data processing system - A data processing apparatus is provided comprising prediction circuitry for predicting a response of the data processing circuitry at at least one given execution point to execution of a program instruction; tracing circuitry for tracing operation of the data processing apparatus for outputting a prediction indicator indicating whether or not the predicted response is correct; a data store configured to store information relating to the predicted response of said data processing circuitry at the given execution point for use by at least one of said prediction logic and said tracing circuitry a later execution point; and a history buffer configured to store historical information with regard to one or more entries of the data store at a corresponding execution point previous to the given execution point to enable restoration of said data store to a state corresponding to said previous execution point. | 2011-07-07 |
20110167248 | EFFICIENT RESUMPTION OF CO-ROUTINES ON A LINEAR STACK - Unsuspended co-routines are handled by the machine call stack mechanism in which the stack grows and shrinks as recursive calls are made and returned from. When a co-routine is suspended, however, additional call stack processing is performed. A suspension message is issued, and the entire resume-able part of the call stack is removed, and is copied to the heap. A frame that returns control to a driver method (a resumer) is copied to the call stack so that resumption of the co-routine does not recursively reactivate the whole call stack. Instead the resumer reactivates only the topmost or most current frame called the leaf frame. When a co-routine is suspended, it does not return to its caller, but instead returns to the resumer that has reactivated it. | 2011-07-07 |
20110167249 | COMPUTER SYSTEM AND METHOD CAPABLE OF REMOTELY RESTORING OPERATING SYSTEM - A computer system and a method for remotely restoring, upgrading, or booting an operating system (O.S). A communication unit communicates with an external device in which a restoring image of the operating system is stored. A user's input request for initialization, causes a controller to perform an initialization according to a power-on input, including checking whether or not a request for restoring the O.S. has been received from a user prior to starting a boot of the operating system. If a request for restoring the operating system is received, the restoring image stored in the external device is accessed through the communication unit to restore the operating system installed in the computer system. | 2011-07-07 |
20110167250 | METHODS FOR REMOTE PROVISIONING OF ELETRONIC DEVICES - There is provided a method and system to automatically provide software and/or firmware updates to the electronic devices, particularly mobile devices used by consumers such as portable health-care data interchange devices. There is also provided a method and system of updating software in electronic devices without requiring a wired data interface to affect changes. There is also provided a method and system for tracking the configuration of electronic devices that are sold to and configured by particular consumers, especially consumers/patients using electronic devices related to health care. Further, there are also provided a methods and systems for integrating the purchase, and ordering, and software configuration of electronic devices. | 2011-07-07 |
20110167251 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An information processing apparatus including an apparatus body and a system control apparatus. The apparatus body includes a first processing unit that executes an arithmetic operation; a first storage unit that stores configuration information of the first processing unit; and a first control unit that controls a readout of the configuration information. The system control apparatus includes a second storage unit that stores a program for controlling the system control apparatus and diagnosis procedures of the information processing apparatus; a second processing unit that reads the program and executes the program; and a second control unit that detects the first processing unit by reading the configuration information via the first control unit on the basis of the diagnosis procedures stored in the second storage unit simultaneously with the execution of the program by the second processing unit. | 2011-07-07 |
20110167252 | Separate power island for high performance processor that reboots to second boot sector - Separate power island for high performance processor. A multi-processor design is presented in which each of the processors is implemented in separately powered portions of a circuitry (e.g., an integrated circuit). One of the processors can be a main application processor, and another of the processors can be a baseband processor. In addition, the each of the processors can be implemented using different types of circuitry (e.g., one of the processors [such as the main application processor] is implemented using higher performance/higher leakage circuitry that another of the processors [such as the baseband processor]). One of the processors (e.g., main application processor) can be powered down when not needed thereby providing energy/power conservation which can be vital is handheld communication device applications such as wireless handheld communication devices. | 2011-07-07 |
20110167253 | Multi-processor systems and methods thereof - Multi-processor systems and methods thereof are provided. In an example, the multi-processor system may include a boot memory including a plurality of boot codes, each of the plurality of boot codes configured to facilitate an initialization process at one of a plurality of intellectual property (IP) blocks, each of the plurality of IP blocks having shared access to the boot memory. In another example, the multi-processor system may receive, from a first processor, a request to provide one of a plurality of boot codes from a boot memory, the received request sent in response to a system initializing signal, may read the requested boot code from the boot memory and may transfer, from a second processor, the read boot code to the first processor. | 2011-07-07 |
20110167254 | SYSTEM AND METHOD FOR ENSURING CONFORMANCE OF ONLINE MEDIA DISTRIBUTION TO COPYRIGHT RULES - A system and a method are described for presenting media content for users to view over the internet. Rights pertaining to said media to be viewed are uploaded to servers by users holding such rights to rent or resell such media content. Servers restrict the viewing of the content in accordance with the limitations of the uploaded rights such that copyright rules are respected at all times. | 2011-07-07 |
20110167255 | SYSTEM, APPARATUS AND METHOD FOR ENCRYPTION AND DECRYPTION OF DATA TRANSMITTED OVER A NETWORK - A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input text to obtain processed text, and transmitting the processed text to the server. Embodiments of the invention include securing data between a client device and a server by processing the input text at the intermediate module by applying an order-preserving transformation, the order-preserving transformation comprising: generating order information based on the input text, the order information indicative of a relative order of the input text within a set of possible input texts according to a collation rule. | 2011-07-07 |
20110167256 | ROLE-BASED ACCESS CONTROL UTILIZING TOKEN PROFILES - A method and system for managing role-based access control of token data using token profiles is described. | 2011-07-07 |
20110167257 | Method for issuing, verifying, and distributing certificates for use in public key infrastructure - The invention relates to a method for issuing, verifying, and distributing digital certificates for use in Public Key Infrastructure, in which a requester | 2011-07-07 |
20110167258 | Efficient Secure Cloud-Based Processing of Certificate Status Information - A cloud-based system having a secure database of certificate information and associated methods are provided. The system and methods may be used to supplement or replace traditional OCSP processing systems. Responses to OCSP requests are digitally signed and cached in a cloud database server remote from the requester. Other servers in the cloud may access the cached OCSP responses from the database server, rather than the originating certificate authority. Thus, the work traditionally done by the certificate authority is moved to the cloud, which eliminates a single point of failure and improves the resources available to perform transactional processing. | 2011-07-07 |
20110167259 | SOFTWARE LICENSE ENFORCEMENT - Systems and methods for performing software license enforcement are provided. According to one embodiment, file or operating system activity relating to a code module are intercepted by a kernel mode driver of a computer system. The kernel mode driver causes a cryptographic hash value of the code module to be authenticated with reference to a local whitelist containing cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist also contains licensing control information. If the cryptographic hash value matches a cryptographic hash value of an approved code module, then (i) authority to execute the code module is further validated if the licensing control information so indicates by performing a license check regarding the code module; and (ii) the code module is allowed to be loaded and executed within the computer system if the authority is affirmed by the license check. | 2011-07-07 |
20110167260 | COMPUTER SYSTEM LOCK-DOWN - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, a method is provided for locking down a computer system. A customized, local whitelist database is stored with a memory of the computer system. The whitelist database forms a part of an authentication system operable within the computer system and contains therein cryptographic hash values of code modules expressly approved for execution by the computer system. A kernel mode driver of the authentication system intercepts file system or operating system activity relating to a code module. The authentication system determines whether to authorize the request by causing a cryptographic hash value of the code module to be authenticated against the whitelist database. The authentication system allows the code module to be loaded and executed within the computer system if the cryptographic hash value matches one of the cryptographic hash values. | 2011-07-07 |
20110167261 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, file system or operating system activity relating to a first code module is initiated by a running process associated with a second code module. The file system or operating system activity is intercepted by a kernel mode driver of a computer system. The kernel mode driver selectively authorizes loading of the first code module by the running process based at least in part on one or more attributes of the second code module. | 2011-07-07 |
20110167262 | IDENTIFICATION AND AUTHORIZATION OF COMMUNICATION DEVICES - A method implemented by a wearable wireless communication device (“WWCD”) includes detecting a connection between the WWCD and an accessory device. The WWCD accesses a memory location in the accessory device, the memory location being designated for storing brand data indicating a brand identity associated with the accessory device. The WWCD determines a brand status of the accessory device based on data, if any, accessed from the memory location in the accessory device. The WWCD also determines one or more interactions permitted between the WWCD and the accessory device based at least in part on the brand status of the accessory device. | 2011-07-07 |
20110167263 | WIRELESS CONNECTIONS TO A WIRELESS ACCESS POINT - A method and apparatus for establishing a wireless connection. A digital certificate having a second name is obtained by a processor unit in response to receiving a selection of a network using a first name broadcast by a wireless access point. A determination is made by the processor unit as to whether the digital certificate is valid. A determination is made by the processor unit as to whether the second name in the digital certificate matches the first name broadcast by the wireless access point. The processor unit establishes the wireless connection to the wireless access point in response to the digital certificate being valid and the second name in the digital certificate matching the first name broadcast by the wireless access point. | 2011-07-07 |
20110167264 | DECRYPTION-KEY DISTRIBUTION METHOD AND AUTHENTICATION APPARATUS - A decryption key for decrypting data from an access node is distributed to an access terminal intending to receive the data. An authentication unit receives a message for terminal authentication including a terminal identifier from the terminal and authenticates the terminal. The authentication unit refers to a content registration table having stored in advance the content type of a content which the terminal can receive, in association with the terminal identifier, according to the received terminal identifier to obtain a corresponding content type. The authentication unit refers to a decryption data base having stored in advance a decryption key and its valid period in association with a content type, according to the obtained content type to obtain a corresponding decryption key and valid period. The authentication unit sends an authentication result and the decryption key and valid period to the terminal or to a packet control unit. | 2011-07-07 |
20110167265 | CRYPTOGRAPHIC POLICY ENFORCEMENT - Objects can be extracted from data flows captured by a capture device. In one embodiment, the invention includes assigning to each captured object a cryptographic status based on whether the captured object is encrypted. In one embodiment, the invention further includes determining whether the object violated a cryptographic policy using the assigned cryptographic status of the object. | 2011-07-07 |
20110167266 | SYSTEMS AND METHODS FOR DOCUMENT CONTROL USING PUBLIC KEY ENCRYPTION - Systems and methods for document control using public key encryption are provided. An interface program serves as a software interface between user applications used to create and access documents and a data storage system that stores the documents in an encrypted form. When a document is saved for the first time, information corresponding to the destruction of that document is obtained either from a user or in accordance with predefined criteria. The document is encrypted and stored with a pointer to an encryption key on a token/key server. When the document is subsequently accessed, the interface program will read the pointer and attempt to retrieve the key. If the key has expired in accordance with the destruction policy, the document is inaccessible. Otherwise, the document is decrypted using the key. Multiple documents may be saved according to the same destruction policy and even the same key, thereby greatly enhancing the ability to “destroy” documents regardless of their location with minimal process. | 2011-07-07 |
20110167267 | SYSTEM AND METHOD FOR TOY ADOPTION AND MARKETING - Provided are a method and computer system for providing a virtual world. The computer system includes a virtual product interface system, which includes a server system with an encrypted part, a non-encrypted part, and a computer-readable memory for storing an encryption key. The server system includes a network connection and sends the encryption key over the network connection addressed to a client via a secured protocol. The non-encrypted part of the server system sends multimedia information addressed to the client over the network via a non-secure protocol. The encrypted part controls adopting a virtual product by receiving a code that is indicative of a virtual product to be virtually adopted by a user and confirming the code. A communication indicative of a specific product that has been registered is carried out using the encryption key, and communication indicative of the multimedia information is carried out unencrypted, without using the encryption key. | 2011-07-07 |
20110167268 | NETWORK DEVICE AUTHENTICATION - In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network aggregation device includes one or more optical Ethernet switches that can be adaptively configured to support authentication of one or more ONTs. For example, the optical network aggregation device may include a controller with an authentication unit for managing ONT authentication and an optical Ethernet interface for transmitting and receiving data over the optical network. The authentication unit may exchange authentication request messages via the optical Ethernet interface with an ONT and grant the ONT access to the provider network based on the exchange, thereby preventing rogue devices from gaining access to the provider network. | 2011-07-07 |
20110167269 | NETWORK DEVICE AUTHENTICATION - In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network aggregation device includes one or more optical Ethernet switches that can be adaptively configured to support authentication of one or more ONTs. For example, the optical network aggregation device may include a controller with an authentication unit for managing ONT authentication and an optical Ethernet interface for transmitting and receiving data over the optical network. The authentication unit may exchange authentication request messages via the optical Ethernet interface with an ONT and grant the ONT access to the provider network based on the exchange, thereby preventing rogue devices from gaining access to the provider network. | 2011-07-07 |
20110167270 | SECURE KEY AUTHENTICATION METHOD FOR COMMUNICATION NETWORK - A key authentication method between a user equipment (UE) and a serving network (SN) for binary CDMA network and a key re-authentication method during which the UE performs a handover within the same SN in binary CDMA network are provided. The key authentication method for the user equipment includes receiving a terminal authentication request message from a wireless access point, transmitting a terminal authentication response message that includes identification information for the user terminal, receiving user authentication request message that includes at least two random numbers and code information for message authentication from the wireless access point, and transmitting a user authentication response message that comprises first information that is generated using a master key. | 2011-07-07 |
20110167271 | SECURE MESSAGE AND FILE DELIVERY - The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email infrastructure, email management processes, and the addition of text, audio and visual format options to sending emails messages. In an exemplary embodiment, a secure message and file delivery method includes biometrically authenticating a sender of an electronic message; receiving the electronic message through a secure connection to the sender; storing the electronic message, wherein the electronic message is encrypted prior to storing; notifying a recipient of the electronic message; and delivering the electronic message through a secure connection to the recipient. | 2011-07-07 |
20110167272 | Secure Multi-UIM aka key exchange - An apparatus in one example, where the apparatus comprises a communication device component that performs an authentication key agreement protocol by receiving a first random nonce (RAND) and an authentication token, wherein the communication device component is configured with a shared secret key. The communication device component generates a derivation key by applying a pseudo random function to the RAND and the shared secret key. The communication device component generates a first set of session keys based on a second random nonce (RANDC) and the derivation key where the first set of session keys are used in encrypting communications. | 2011-07-07 |
20110167273 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - The present invention relates to a method for secure communications and communication networks having communication devices, using secure means like encryption system for securing communications. More particularly, the present invention relates to a method for secure communications from a first node (N | 2011-07-07 |
20110167274 | PROVIDING SERVICES TO DEVICES USING A ZIGBEE NETWORK - A network device may receive two different sets of authentication information from a user device over a ZigBee network. The network device may authenticate the user device based on the received two different sets of authentication information and permit, in response to authenticating the user device, the user device to obtain a service by exchanging information between the network device and the user device over the ZigBee network. | 2011-07-07 |
20110167275 | MALWARE DETECTION METHOD AND APPARATUS - According to a first aspect of the present invention there is provided a malware detection method implemented within a computer. The method includes, for a given electronic file, determining if the file is associated with a valid digital signature. If the file is associated with a valid digital signature, then verifying that the signature belongs to a trusted source. If the signature does belong to a trusted source then not performing a malware scan of said file, and if the signature cannot be verified as belonging to a trusted source then performing said scan. | 2011-07-07 |
20110167276 | Method and device for detecting if a computer file has been copied and method and device for enabling such detection - A method of detecting whether a computer file has been copied, the computer file comprising a software program and having an inode number. The inode number of the computer file is retrieved by the software program. From the computer file, a stored inode number is read, the stored inode number being the inode number of a file system from which the computer file should not be copied. The retrieved inode number and the read inode number are compared and it is determined that the computer file has been copied if the retrieved inode number does not match the read inode number. Also provided are a method of enabling detection of the copying of a computer file, and devices and software program products corresponding to the methods. | 2011-07-07 |
20110167277 | PROCESSING DEVICE, PROCESSING SYSTEM AND CONTROL METHOD FOR PROCESSING DEVICE - A processing device is provided. A first storage unit stores a correspondence table which is indicative of a correspondence relationship between attributes of data and encryption levels for encrypting data. An obtaining unit obtains data. A first determination unit determines an encryption level according to an attribute of the data obtained by the obtaining unit, using the correspondence table stored in the first storage unit. An encryption unit encrypts the data obtained by the obtaining unit in the encryption level determined by the first determination unit. A second storage unit stores the data encrypted by the encryption unit. | 2011-07-07 |
20110167278 | Secure processor and a program for a secure processor - The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside. | 2011-07-07 |
20110167279 | METHOD FOR PROTECTING A PROGRAMMABLE CRYPTOGRAPHY CIRCUIT, AND CIRCUIT PROTECTED BY SAID METHOD - A programmable cryptography circuit includes memory-based cells defining the logic function of each cell, integrating a differential network capable of carrying out calculations on pairs of binary variables, including a first network of cells implementing logic functions on the first component of the pairs and a second network of dual cells operating in complementary logic on the second component of the pair. A calculation step includes a precharge phase, in which the variables are put into a known state at the output of the cells, and an evaluation phase in which a calculation is made by the cells. A phase of synchronizing the variables is inserted before the evaluation phase or the precharge phase in each cell capable of receiving several signals conveying input variables, the synchronization being carried out on the most delayed signal. | 2011-07-07 |
20110167280 | Network Power Management System - A vertical-mount network remote power management outlet strip embodiment of the present invention comprises a long, thin outlet strip body with several independently controllable power outlet sockets distributed along its length. A power input cord is provided at one end, and this supplies AC-operating power to relays associated with each of the power outlet sockets. The relays are each addressably controlled by a microprocessor connected to an internal I2C-bus serial communications channel. The power-on status of each relay output to the power outlet sockets is sensed and communicated back on the internal I2C-bus. A device-networking communications processor with an embedded operating system translates messages, status, and controls between the internal I2C-bus and an Ethernet port, and other external networks. | 2011-07-07 |
20110167281 | ACCESSORY POWER MANAGEMENT - Methods, apparatus, and circuits for managing power among portable computing devices and one or more accessories. One example provides commands to improve power management between a portable computing device and one or more accessories. Other examples provide commands that may allow a portable computing device to charge at a maximum available current level while providing an accessory with sufficient current for its proper operation. Another may help prevent a portable computing device from drawing a high level of current that could be detrimental to an accessory, while others provide commands that may allow a battery pack to instruct a portable computing device to not charge its internal battery. Another example may allow a portable computing device to determine which power supply among multiple power supplies should be used to power an accessory, while others may allow an accessory to retrieve charging current parameters from a portable computing device. | 2011-07-07 |
20110167282 | POWER DISTRIBUTION UNIT MONITORING NETWORK AND COMPONENTS - A system to monitor power loading in a plurality of power distribution units. The system includes a power monitoring gateway with a port configured to communicate with an internet protocol network using an internet protocol address. The power monitoring gateway is also configured to communicate with the plurality of power distribution units through a communication link that does not use internet protocol addressing. The communication link in some embodiments is a wireless link. In other embodiments, the communication link uses a single pair of wires with the power monitoring gateway and the power distribution units configured in a daisy chain topology. | 2011-07-07 |
20110167283 | CPU Status Controlled Uninterruptible Power Supply - Systems, apparatus and methods for controlling the flow of power are provided. A current source ( | 2011-07-07 |
20110167284 | CHARGE SUSPEND FEATURE FOR A MOBILE DEVICE - An electronic device is described comprising connecting means configured to establish a connection to another device, and configured to receive electrical power from the connection and configured to receive information from the other device via the connection and comprising determining means configured to determine a set of limitations, wherein for at least one electronic unit configured to receive electrical power, the set of limitations comprises a limitation of electrical power to be distributed to the at least electronic unit and wherein the determining means is further configured to determine the set of limitations based on the information received from the other device, wherein the received information comprises a request for a reduced power consumption of the electronic device. | 2011-07-07 |
20110167285 | INFORMATION HANDLING SYSTEM INCLUDING WIRELESS SCANNING FEATURE - An information handling system (IHS) is provided which includes a system processor and a wireless section coupled to the system processor. While the system processor remains in a reduced power state, the wireless section is operable to be powered up to detect the presence of a wireless network external to the IHS and determine if that detected wireless network matches a network included in profile information stored in a memory that is accessible by the wireless section. An indicator is coupled to the wireless section and is operable to provide an indication that a wireless network is present. | 2011-07-07 |
20110167286 | Fine Grain Non-Intrusive Distributed Information Technology Infrastructure Power Management System - A power management system includes a power management agent and a computing device comprising a CPU, memory, persistent storage, operating system, and communication mechanism. A power management server communicates with the communication mechanism using a secure communication protocol, communicates with the power management agent when the agent is in the connected mode, and provides a non-intrusiveness monitoring function. The power management agent operates in both a connected and disconnected mode, and maintains a list of applications, tasks, and activities and their dependency on power manageable components in the device. An application control framework defines a non-intrusiveness of a device for every application on the device and a usage of the device to allow fine grain control of the device. A management station sends a set of monitoring commands to at least one agent to monitor the intrusiveness of a power management function on the device without enforcing any power management. | 2011-07-07 |
20110167287 | PROVIDING POWER TO AN ACCESSORY DURING PORTABLE COMPUTING DEVICE HIBERNATION - A portable computing device (PCD) can selectively supply power to an accessory during PCD hibernation. In some embodiments, the PCD's default behavior is to disable accessory power output during hibernation, and this default behavior can be overridden in response to a request from a connected accessory. The accessory can use the power supplied during PCD hibernation to detect user input (or other) events and wake the PCD from hibernation in response to a detected event. Some accessories can wake the PCD by emulating accessory detachment and reattachment. | 2011-07-07 |
20110167288 | Information processing apparatus and controlling method thereof - An information obtaining unit provided inside a system controller obtains operation states of processing units and processing units respectively of cabinets, calculates an average utilization of CPUs of the processing units, and determines whether or not any processing unit can be disconnected. When a hardware resource can be disconnected as a result of the determination, an electric power control determining unit calculates possible combinations of hardware resources to be disconnected and performs a disconnection by a cabinet unit when there is a combination enabling a disconnection by a cabinet unit. | 2011-07-07 |
20110167289 | BATTERY DISCONNECTION FOR SECURE ASSEMBLY OF COMPUTER SYSTEMS - The disclosed embodiments provide a system that configures a battery for a computer system. During operation, the system disconnects the battery by simulating a fault condition using a safety circuit of the battery. The fault condition may be simulated to facilitate safe assembly of a computer system containing the battery. After assembly is complete, the system enables use of the battery in the computer system by applying external power to the computer system, which resets the safety circuit and reconnects the battery. | 2011-07-07 |
20110167290 | CONTROLLING POWER RECEIVED THROUGH MULTIPLE BUS INTERFACES IN A PORTABLE COMPUTING DEVICE - The disclosed embodiments provide a system that enables a portable computing device to receive power through multiple bus interfaces at the same time. When the system senses that a first power source is plugged into a first bus interface in the portable computing device, the system determines whether the first power source is a host or a power adapter. Next, based upon whether the first power source is a host or a power adapter, the system uses a first power manager coupled to the first bus interface to limit a first input current received from the first power source to power the computing device. The system also provides the maximum charging current to a rechargeable battery for the portable computing device by chaining together a second bus interface whether power is present on the second bus interface or not. | 2011-07-07 |
20110167291 | METHOD AND APPARATUS FOR TRANSMIT POWER CONTROL IN WIRELESS NETWORKS - A method and apparatus are described including receiving, by a transmitter, a report from an associated client, setting and using a downlink transmit power level responsive to the report for data transmissions to the associated client, determining a downlink data loss rate and adjusting the downlink transmit power level responsive to the downlink data loss rate, wherein said report includes received signal strength, client transmit power level and one of link margin and receiver sensitivity. Also described are a method and apparatus including receiving, by a receiver, a request for a report, transmitting the requested report, receiving an instruction to use an uplink transmit power level, setting and using the uplink transmit power level, determining an uplink data loss rate and adjusting the uplink transmit power level responsive to the uplink data loss rate, wherein said report includes said received signal strength, client transmit power level and one of said link margin and said receiver sensitivity. | 2011-07-07 |
20110167292 | COMPUTER SYSTEM WITH SYNCHRONIZATION/DESYNCHRONIZATION CONTROLLER - A computer system includes a processor, a submodule connected to the processor, an external access monitor configured to monitor a data transfer between the processor and the submodule, and a synchronization/desynchronization controller configured to synchronize or desynchronize the clock of the processor with respect to the clock of the submodule, depending on the result of the monitoring. Specifically, the processor clock is synchronized to the submodule clock when the frequency of access to the submodule by the processor is high, and the processor clock is desynchronized with respect to the submodule clock when the access frequency is low. | 2011-07-07 |
20110167293 | NON-DISRUPTIVE I/O ADAPTER DIAGNOSTIC TESTING - A primary I/O adapter and a redundant I/O adapter of a data processing system are assigned to support access to a system resource. While the primary I/O adapter is in service and the redundant I/O adapter is not in service in providing access to the system resource, a fail over command is issued to remove the primary I/O adapter from service and place the redundant I/O adapter in service in supporting access to the system resource. While the redundant I/O adapter is in service and the primary I/O adapter is not in service in providing access to the system resource, diagnostic testing on the primary I/O adapter is performed. In response to the diagnostic testing revealing no fault in the primary I/O adapter, a fail back command is issued to restore the primary I/O adapter to service and to remove the redundant I/O adapter from service. | 2011-07-07 |
20110167294 | STORAGE SYSTEM FOR RESTORING DATA STORED IN FAILED STORAGE DEVICE - A storage system including: a controller; and, a plurality of physical storage devices coupled to the controller and constituting a RAID group; wherein the controller provides one or more logical volumes belonging to the RAID group, each of the one or more logical volumes having a plurality of storage areas; one or more virtual volumes, wherein, when receiving a write request to a virtual volume of the one or more virtual volumes, the controller allocates a storage area in a logical volume to the virtual volume; and writes data to the allocated storage area, wherein, when a physical storage device of the plurality of physical storage devices fails, the controller selectively performs a RAID restore process to a storage area allocated to a virtual volume. | 2011-07-07 |
20110167295 | METHOD AND/OR APPARATUS FOR CERTIFYING AN OUT OF BAND MANAGEMENT APPLICATION IN AN EXTERNAL STORAGE ARRAY - A method for configuring a storage array, comprising the steps of (A) configuring the storage array with a minimal number of components for initial testing; (B) sending a first symbol call command to the storage array to initiate a test of a structure of the storage array; (C) receiving a response from the storage array; and (D) determining whether the test passed in response to the response. | 2011-07-07 |
20110167296 | REGISTER FILE SOFT ERROR RECOVERY - Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file. | 2011-07-07 |
20110167297 | CLOCK-DATA-RECOVERY TECHNIQUE FOR HIGH-SPEED LINKS - A receiver circuit is described. In the receiver circuit, an analog-to-digital converter (ADC) generates first samples of a data signal based on a first clock signal, and a clock-data-recovery (CDR) error-detection circuit generates second samples of the data signal based on a second clock signal. In addition, the CDR error-detection circuit estimates intersymbol interference (ISI) at a current sample in the second samples from an adjacent, subsequent sample in the second samples. Based on the second samples and the estimated ISI, a CDR circuit generates the first clock signal and the second clock signal, which involves modifying the skews of either or both of these clock signals so that the current sample is associated with a zero crossing of a pulse response of a communication channel from which the data signal was received, thereby reducing or eliminating the ISI from the adjacent, subsequent sample. | 2011-07-07 |
20110167298 | PACKET MIRRORING BETWEEN PRIMARY AND SECONDARY VIRTUALIZED SOFTWARE IMAGES FOR IMPROVED SYSTEM FAILOVER PERFORMANCE - Packet loss at a standby server during failover results when the primary fails. There is currently always some amount of packet traffic that is inbound to the primary that is lost during the failover interval. With existing solutions, this packet loss during failover is inevitable. The problem is that when this information is lost, the standby has the state of the last commit, so the standby will have the state information that is old and representative of system state accurately only to the system state at the time of the last commit. One solution is a method in which all inbound data packets targeted to be delivered to a primary software application, such as a virtualized software application, running in a primary virtual machine, are continuously monitored and copied by a Network Replication Device for simultaneous delivery to a backup image of the software application running on a standby system. | 2011-07-07 |
20110167299 | COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING THE SAME - For an error rate QBER, threshold values are preset, including a threshold value Q | 2011-07-07 |
20110167300 | DEVICE DRIVER ROLLBACK - Techniques for device driver management/installation are provided. In at least some embodiments, a device driver management system can be employed by a user to selectively rollback a currently installed device driver to one or a plurality of previously installed device driver(s). Additionally, the system can be employed by the user to revert to a pristine state of not having the device driver installed at all, for example, the NULL driver (e.g., in the situation in which the first driver installed on the device causes machine instability). The system stores information associated with driver(s) running on a specific device and allows a user to selectively revert to any one of a plurality of previously installed device driver(s), for example, if they experience a problem with a newer driver. Rollback point(s) can be stored, for example, in the system registry. | 2011-07-07 |
20110167301 | FORMULA SERVER FOR DIAGNOSTIC SYSTEMS - An apparatus and method are provided and include a formula server having formulas and conversion modules that are separate from a diagnostic application of a diagnostic tool. The diagnostic tool receives the diagnostic data and transmits it to a remote computer, where the data is converted using a formula. The resulting data is then transmitted back to the diagnostic tool for display. | 2011-07-07 |
20110167302 | DIAGNOSTIC DATA SET COMPONENT - Various embodiments for retaining diagnostic information for data in a computing storage environment are provided. In one such embodiment, a diagnostic component associated with a base data set via a catalog association record is initialized. The diagnostic component configured to retain base data set-specific diagnostic information retrievable by the computing storage environment to assist in error diagnosis. | 2011-07-07 |
20110167303 | GUI EVALUATION SYSTEM, GUI EVALUATION METHOD, AND GUI EVALUATION PROGRAM - The consistency of the heading expressions used in each screen in a plurality of evaluated screens is exhaustively and reliably evaluated. The GUI evaluation system comprises: GUI information storage means for storing GUI information that concerns heading included in an evaluation target screen and includes information indicative of heading expression which is the expression used for the heading; heading group specification means for grouping headings included in each evaluation target screen by expression used for the headings in accordance with the GUI information stored in the GUI information storage means; and heading expression evaluation means for evaluating a consistency of heading expressions between a plurality of evaluation target screens by comparing heading groups that are grouped by the heading group specification means and included in all possible combinations of two of the plurality of evaluation target screens. | 2011-07-07 |
20110167304 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROVIDING REDUNDANCY IN A MEDIA DELIVERY SYSTEM - In a digital video system, high availability distribution is provided using spare modules such as an integrated receiver decoder, multimedia transcoder and streaming module in support of the primary modules. The primary modules multicast status messages which are monitored by the spare modules. When failure of a primary module is detected, the spare module takes over the role of the failed module, for example by joining the same multicast groups as the failed module and taking over processing of the streams of the failed module. Multiple redundancy schemes are described. | 2011-07-07 |
20110167305 | Methods and Apparatus for Soft Data Generation for Memory Devices Based on Performance Factor Adjustment - Methods and apparatus are provided for soft data generation for memory devices based on a performance factor adjustment. At least one soft data value is generated for a memory device, by obtaining at least one read value; and generating the soft data value based on the obtained at least one read value and an adjustment based on one or more performance factors of the memory device. The read values may comprise, for example, data bits, voltage levels, current levels or resistance levels. The read values may be soft data or hard data. The possible performance factors include endurance, number of read cycles, retention time, temperature, process corner, inter-cell interference impact, location within the memory array and a pattern of aggressor cells. One or more pattern-dependent performance factors and/pr location-specific performance factors may also be considered. The generated soft data value may be a soft read value that is used to generate one or more log likelihood ratios, or may be the log likelihood ratios themselves. | 2011-07-07 |
20110167306 | SEMICONDUCTOR TEST APPARATUS - A semiconductor test apparatus sorts addresses corresponding to memory cells in memory provided in a device under test, as well as failure data obtained as a result of testing the memory cells, and stores the sorted addresses and failure data in acquisition memory using burst access. The semiconductor test apparatus is provided with: an address generator configured to generate a burst target signal, which indicates that the addresses and failure data are target data for burst access; and a sort circuit configured to sort the addresses and failure data in order of continuous addresses suitable for burst access, on the basis of the burst target signal. | 2011-07-07 |
20110167307 | SEMICONDUCTOR MEMORY AND METHOD FOR TESTING THE SAME - A semiconductor memory in which arbitrary operation mode information is set in a plurality of CRs at test time and by which a test cost is reduced and a method for testing such a semiconductor memory. The plurality of CRs hold operation mode information. When a CR control circuit detects write commands to write to an address for register access or read commands to read from the address for register access in a predetermined order, the CR control circuit updates the operation mode information for each of the plurality of CRs on a time division basis. A command generation section generates the write commands, the read commands, or a test start command by which write operation or read operation does not occur, in response to a control signal from the outside. In addition, the command generation section regenerates the test start command each time the plurality of CRs are updated. A data pad compression circuit changes the operation mode information to be written to the plurality of CRs by using test data inputted to part of data pads, after inverting the test data or in its original condition according to a code, as data for a rest of the data pads, the code represented by part of an address inputted at the time of the test start command being sent. | 2011-07-07 |
20110167308 | MULTI-SITE TESTING OF COMPUTER MEMORY DEVICES AND SERIAL IO PORTS - A method and apparatus for multi-site testing of computer memory devices. An embodiment of a method of testing computer memory devices includes coupling multiple memory devices, each memory device having a serializer output and a deserializer input, wherein the serializer output of a first memory device is coupled with a deserializer input of one or more of the memory devices of the plurality of memory devices. The method further includes producing test signal patterns using a test generator of each memory device, serializing the test signal pattern at each memory device, and transmitting the serialized test pattern for testing of the memory devices, wherein testing of the memory devices includes a first test mode and a second test mode. | 2011-07-07 |
20110167309 | DECOMPRESSOR/PRPG FOR APPLYING PSEUDO-RANDOM AND DETERMINISTIC TEST PATTERNS - A novel decompressor/PRPG on a microchip performs both pseudo-random test pattern generation and decompression of deterministic test patterns for a circuit-under-test on the chip. The decompressor/PRPG has two phases of operation. In a pseudo-random phase, the decompressor/PRPG generates pseudo-random test patterns that are applied to scan chains within the circuit-under test. In a deterministic phase, compressed deterministic test patterns from an external tester are applied to the decompressor/PRPG. The patterns are decompressed as they are clocked through the decompressor/PRPG into the scan chains. The decompressor/PRPG thus provides much better fault coverage than a simple PRPG, but without the cost of a complete set of fully-specified deterministic test patterns. | 2011-07-07 |
20110167310 | SCAN BASED TEST ARCHITECTURE AND METHOD - An integrated circuit architecture including architecture for a scan based test, where the integrated circuit includes N scan chain sets including one or more scan chains and an input register bank. The input register bank includes an input for serially receiving an N-bit input vector synchronous with a first clock signal, and N-outputs configured to substantially simultaneously provide the N-bits of the received input vector as N separate output bits. The N separate output bits are used to provide test bits for simultaneously shifting into the respective inputs of the scan chain set synchronous with a second clock signal. | 2011-07-07 |
20110167311 | System and Method for Analyzing an Electronics Device Including a Logic Analyzer - A system for testing or debugging a system including the integrated circuit having an embedded logic analyzer. In one embodiment, the system includes a computing device coupled to the logic analyzer for receiving the at least one output. A user interface run on the computing device assigns an attribute to at least one signal associated with the logic analyzer, determines a new signal or value not provided by the logic analyzer, the new signal or value being based upon the at least one signal as received from the logic analyzer and upon a predetermined definition, and presents the new signal or value to a system user. | 2011-07-07 |
20110167312 | RADIO TRANSMISSION DEVICE AND RADIO TRANSMISSION METHOD - Provided are a radio transmission device and a radio transmission method which can reduce the transmission packet collision generation ratio even when no resource allocation signal is detected in retransmission. When control information outputted from a decoding unit ( | 2011-07-07 |
20110167313 | MULTI-CHANNEL STATISTICAL MULTIPLEXING OF FEC DECODERS - A method for dividing a total number of decoders among decoder queues of codewords of different sizes, the codewords transmitted on return communication links from data terminals to a gateway of a satellite communications system, includes for each of K groups, allocating a respective number of decoders dedicated to decoding codewords of a particular size, where K is a number of different sizes of codewords, and the respective number of decoders is allocated from the total number of decoders and allocated in proportion to current offered load of codewords of the particular size. | 2011-07-07 |
20110167314 | Variable forward error correction for optical communication links - A method and system for setting a variable forward error correction overhead in an optical transport network frame for an optical link at a node are disclosed. In one embodiment, a method includes selecting a forward error correction overhead, signaling an optical node the selected forward error correction overhead, and setting the forward error correction overhead in the optical network transport frame for use in transmission of data over the optical link. In one embodiment, the forward error correction overhead is complementary to the data payload to maintain total transmission rate. | 2011-07-07 |
20110167315 | APPARATUS AND METHOD FOR CODING/DECODING BLOCK LOW DENSITY PARITY CHECK CODE IN A MOBILE COMMUNICATION SYSTEM - A system and method for processing a block Low Density Parity Check (LDPC) code are provided. The system includes, a decoding apparatus for decoding a block LDPC code using a parity check matrix, the parity check matrix including an information part and a parity part, the parity part including a first section (B) including a plurality of first permutation matrices, a second section (D) including a second permutation matrix, a third section (T) including a plurality of identity matrices (I) arranged diagonally within the third section and a plurality of third permutation matrices arranged below the plurality of identity matrices, and a fourth section (E) including a fourth permutation matrix. | 2011-07-07 |
20110167316 | METHOD AND DEVICE FOR ROW AND COLUMN INTERLEAVING OF BLOCKS OF VARIABLE SIZE - The present disclosure relates to a method for interleaving a stream of input data blocks, the method comprising steps of: subdividing a block into sub-blocks of fixed size in number of data rows and data columns, the sub-blocks being distributed in the block in rows of sub-blocks and in columns of sub-blocks, transferring the data contained in the block into a first memory, while respecting the order of the data in the input stream, transferring the data contained in the block by row of sub-blocks, into a second memory in which the data of each sub-block is accessible from the address of the sub-block, transferring the data of each sub-block by column of sub-blocks, from the second memory into a third memory, by putting back the data of each sub-block in data rows and columns, and transferring the data by data column from the third memory into an output stream. | 2011-07-07 |
20110167317 | APPARATUS FOR ADAPTABLE/VARIABLE TYPE MODULATION AND DEMODULATION IN DIGITAL TX/RX SYSTEM - Disclosed is an adaptable/variable type modulation/demodulation apparatus. A physical layer transmission apparatus for adaptable/variable type modulation, the transmission apparatus including a classification unit to classify a bit stream according to a standard that is determined in advance after receiving the bit stream, an uncoded bit group unit to group the bit stream not to be LDPC-coded by a predetermined number of bits, an LDPC encoder to perform LDPC-coding of the bit stream, a coded bit group unit to group the coded bit stream by the predetermined number of bits, a quadrature amplitude modulation (QAM) unit to select a symbol coset using the coded bit groups; and a convolutional interleaver to perform convolutional interleaving of the symbol. | 2011-07-07 |
20110167318 | READING METHOD OF A MEMORY DEVICE WITH EMBEDDED ERROR-CORRECTING CODE AND MEMORY DEVICE WITH EMBEDDED ERROR-CORRECTING CODE - A reading method for a memory device with error-correcting encoding envisages the steps of: carrying out a first reading of a plurality of memory locations (A | 2011-07-07 |
20110167319 | ERROR CORRECTION IN A STACKED MEMORY - Electronic apparatus, systems, and methods to construct and operate the electronic apparatus and/or systems include a stack of memory dies with user data and/or first level error correction data stored in a stripe across the memory dies. One such stack can include a second level error correction vault, such as a parity vault, to store parity data corresponding to the user data and/or first level error correction data. Additional apparatus, systems, and methods are disclosed. | 2011-07-07 |
20110167320 | FLASH MEMORY - A flash memory includes a memory sector, a command interface, a first signal buffer, a control signal generation circuit, a data input buffer, an error correction circuit, an address buffer, an address signal generation circuit, a plurality of data memory circuits, and write circuit. The command interface receives a write data input instruction from an external device to generate a write data input instruction signal, and receives a write instruction from the external device to generate a write instruction signal. The error correction circuit is activated by the write data input instruction signal to receive the write data in synchronization with the write enable signal, and is activated by the write instruction signal to generate a check data for an error correction in synchronization with the control signal. | 2011-07-07 |
20110167321 | APPARATUS AND METHOD OF TRANSMITTING AND RECEIVING DATA FOR IMPROVING TRANSMISSION RATE - A data transmitter and receiver for improving a data rate, and more particularly, to an apparatus and method of transmitting and receiving an orthogonal frequency division multiplexing (OFDM) symbol in which a pilot signal is added to a data signal is provided. The apparatus includes a transmitter including: a pilot adder to add a pilot signal to a data signal; and a guard interval inserting unit to insert a guard interval to the data signal with the added pilot signal, and a receiver including: a guard interval removal unit to remove a guard interval in a received time domain signal; a fast Fourier transform (FFT) unit to transform the time domain signal in which the guard interval is removed to a frequency domain signal; a channel estimator to estimate a channel value from the time domain signal in which the guard interval is removed; an equalizer to equalize the frequency domain signal based on the estimated channel value; and a pilot signal removal unit to remove the pilot signal in the equalized frequency domain signal. | 2011-07-07 |
20110167322 | Methods to improve ACS performance - In one embodiment, systems and methods of operating a SOVA system is disclosed that comprises determining the start and stop values for a trellis tree and using the start and stop values to determine the initial states of a plurality of branches within the trellis tree. | 2011-07-07 |
20110167323 | Error-Correcting Apparatus and Method Thereof - The invention discloses an error-correcting apparatus for decoding an input signal by using a Viterbi algorithm to generate a Viterbi-decoded signal, including an erasure unit and a decoder. The erasure unit is configured to generate at least one logic signal according to at least one path metric difference of path metrics in the Viterbi algorithm, and generate erasure information, wherein the erasure information indicates data reliability of at least one location of the Viterbi-decoded signal. The decoder is configured to decode the Viterbi-decoded signal according to the erasure information. | 2011-07-07 |
20110167324 | Logic circuit protected against transient disturbances - The invention concerns a circuit protected against transitory perturbations, comprising a combinatorial logic circuit ( | 2011-07-07 |
20110167325 | Back Channel Communication - Various embodiments are described for back channel communication. One embodiment is a method that comprises receiving data at customer premises equipment (CPE), determining at least one error in the received data, formatting the determined error for communication to a central office (CO), and sending the formatted error to the CO via a back channel, wherein the formatted error is sent between sync frames of a discrete multitone (DMT) superframe. | 2011-07-07 |
20110167326 | RELAY APPARATUS AND WIRELESS COMMUNICATION SYSTEM - A relay station and a wireless communication system wherein novel retransmission control is achieved in cases when a TTI-bundling technique and a relay technique are used in communication between a terminal and a base station. A relay station ( | 2011-07-07 |
20110167327 | Method for preparation of a digital document for the display of said document and the navigation within said - The present invention relates to a method for preparation of a digital document for the display of said document and the navigation within said document in a mobile device, said display and navigation operations being realized by a computer program, said document comprising a plurality of elements and at least one page characterized in that it comprises the following steps: upon the reception of the document: pre-interpretation of the digital document and encoding of a part at least of the elements of said digital document into objects directly exploitable by said computer program; upon reception of a display command of a page of the digital document: identification of the tasks associated with this page and creation of a reference table pointing directly to the objects describing the tasks of said page, and displaying of said page comprising a possible highlighting of objects that can be activated and/or a possible scrolling of the page, then execution of the tasks upon request of a user. | 2011-07-07 |
20110167328 | ACCESSIBLE CONTENT REPUTATION LOOKUP - Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link. | 2011-07-07 |
20110167329 | Mindmap Illustrator - A method of generating a linked client master mind map. Client actions and documents are linked to a client master mind map to generate a linked client master mind map. The linked client master mind map and a client relationship management program are reviewed and packaged. | 2011-07-07 |
20110167330 | DYNAMICALLY FILTERING AGGREGATE REPORTS BASED ON VALUES RESULTING FROM ONE OR MORE PREVIOUSLY APPLIED FILTERS - Methods, systems, and computer program products dynamically filter an aggregate report based on values resulting from one or more filters previously applied to the aggregate report. A method involves maintaining a collection of filters to be applied in a designated evaluation order to the aggregate report, applying a first filter to the aggregate report, and evaluating values in the aggregate report to produce aggregate values resulting from applying the first filter. The method also involves applying a next filter to the aggregate report and evaluating the aggregate values in the aggregate report resulting from applying the first filter therein producing aggregate values resulting from applying the next filter to the aggregate report. Additionally, the method involves displaying the aggregate report wherein evaluating values resulting from previously applying any filter to the aggregate report involves evaluating visual values displayed in the aggregate report after each previous filter has been applied. | 2011-07-07 |
20110167331 | METHOD AND SYSTEM FOR ANNOTATING DOCUMENTS USING AN INDEPENDENT ANNOTATION REPOSITORY - A method and system for generating workflow messages based on adding annotations to a file repository or database independent of an original document that they annotate. By separately storing the annotations in a searchable annotation repository, original documents can be preserved unchanged while still providing the ability to comment on the original document. By generating workflow messages, a system can track who has reviewed a document, whose proposed changes and/or comments require action by another person, and if everyone has reviewed the documents within the time constraints established. | 2011-07-07 |
20110167332 | System and Method for Generating Web Pages - A page resource builder provides an interface between development source files and a production Web page or other compiled file. The page resource builder may identify components in the source files and compile them into production files, each of which includes only those components used by the production Web page. The production files also may exclude components not used by the production files. Production files generated by the page resource builder may allow for a production Web page to be downloaded with a minimum of request/response exchanges between an end user Web browser and a Web server. | 2011-07-07 |
20110167333 | WEB PAGE DISTRIBUTION SYSTEM - Provided is a web page distribution system capable of distributing web pages that satisfy the output condition of a distribution target. The web page distribution system comprises a plurality of mobile phones and a web page distribution server. The mobile phones can communicate with Internet and have individually set output conditions for outputting all web pages including text data and image data referred to from the text data. The web page distribution server specifies, based on the reception of the distribution request for the web pages, the output conditions of the mobile phones and determines whether the web pages satisfy the specified output conditions or not. When it is determined that the output conditions are not satisfied, the web page distribution server converts the web pages that do not satisfy the output conditions into the ones that satisfy the output conditions and performs a process for distributing the web pages. | 2011-07-07 |
20110167334 | Visual Document Structure Indicator System - Systems and methods for represent and manipulate (i.e., processing) the underlying structure of a structured document (e.g., a mark-up language document), while maintaining a What You See Is What You Get (WYSIWYG) environment. The traditional WYSIWYG editor view is paired with a Visual Document Structure Indicator (VDSI) pane to allow for both WYSIWYG and structure editing within a single interface. The VDSI pane includes left pane and upper pane, which are configured along the left and top borders, respectively. The document editor allows document content to be created, edited, and maintained in the WYSIWYG environment while keeping document structure information available to the user. | 2011-07-07 |
20110167335 | System and Method for Generating Web Pages - Systems and methods for creating Web pages are provided. Web page development components, referred to as “pods,” may be used to encapsulate discrete functionality for use and re-use within Web pages. The pods may be contained in a library, from which a developer may select one or more pods that provide the functionality and/or presentation definitions the developer wishes to include in the Web page. A pod may contain all the functional and presentation information required to implement the desired functionality, and may contain only that functional and presentation information. | 2011-07-07 |
20110167336 | GESTURE-BASED WEB SITE DESIGN - A method of generating a web site including one or more web pages includes receiving user input including a selection of one of a plurality of web site layouts, each web site layout including a plurality of elements configured to be customized by a user. The plurality of elements of the selected web site layout is displayed on a display device, including a first element displayed in a first position on the display device. User input including a drag and drop action performed on the first element is received. The first element is then displayed in a second position on the display device, the second position being different than the first position according to the user input including the drag and drop action. | 2011-07-07 |
20110167337 | Auto-Trimming of Media Files - A system (and a method) is disclosed for processing a media file for transmission. The system determines a size of the media file and a threshold size for transmission of the media file to a destination. In responsive to the size of the media file exceeding the threshold size for the destination, the system sets a crop window for the media file, the crop window within the threshold size and provides for display an overlay of the crop window relative to the media file. The system generates a cropped media file based on a position of the overlay of the crop window relative to the media file. The generated cropped media file has a size within the threshold size. The system transmits the cropped media file to the destination. | 2011-07-07 |
20110167338 | Visual History Multi-Media Database Software - A virtual library of photographs stored in electronic pages, volumes (“album”), and bookshelves (“collections”) for easy retrieval. An extended multimedia database is created to provide a method of distinguishing and sorting consumer photographs in a meaningful manner conducive to network sharing by interested groups. By providing a graphic representation of the photograph, motion picture, audio file (way, mp3, etc.), document, or other multimedia file stored, new and useful means of recalling and sorting the media files (hereinafter referred to exemplarily as “photographs”) are obtained. In an initial method, a virtual library of photographs is provided having a bookshelf holding individual volumes of photographs containing multiple pages of photographs. This virtual library allows the photographs to be stored on pages, volumes, and bookshelves sorted according to user criteria. The user can then pull a particular volume of photographs from the shelf to access a particular cross-section of the stored photographs. | 2011-07-07 |
20110167339 | Device, Method, and Graphical User Interface for Attachment Viewing and Editing - A method is performed at a multifunction device with a display and a touch-sensitive surface. The method includes, while in a first application: displaying content from an object in a read-only viewer and concurrently displaying one or more application start icons with the read-only viewer. The method also includes detecting a user input on an application start icon; and, in response to detecting the user input on the application start icon, opening the object in a second application that corresponds to the application start icon. | 2011-07-07 |