33rd week of 2013 patent applcation highlights part 70 |
Patent application number | Title | Published |
20130212378 | METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER - A method manages keys in a manipulation-proof manner for a virtual private network. The method includes authenticating a communication terminal on an authentication server by use of a first key over a public network and providing a communication key, which is suitable for the communication over a virtual private network in the public network, for the authenticated communication terminal over the public network. The communication key in the communication terminal is encrypted by a second key, which is provided by a manipulation-protected monitoring device. | 2013-08-15 |
20130212379 | DYNAMIC GENERATION AND PROCESSING OF CERTIFICATE PUBLIC INFORMATION DIRECTORIES - Digital certificate public information is extracted using a processor from at least one digital certificate stored within at least one digital certificate storage repository. The extracted digital certificate public information is stored to at least one dynamically-created certificate public information directory. At least a portion of the digital certificate public information stored within the at least one dynamically-created certificate public information directory is provided in response to a digital certificate public information request. | 2013-08-15 |
20130212380 | SECURELY UPGRADING OR DOWNGRADING PLATFORM COMPONENTS - A method for securely altering a platform component is provided, comprising: assigning certificates for public encryption and signature verification keys for the device; assigning certificates for public encryption and signature verification keys for an upgrade server; mutually authenticating a device containing the platform component and the upgrade server; causing the device and the upgrade server to exchange a session key; and providing an alteration to be made to the platform component from the upgrade server to the device using the session key. | 2013-08-15 |
20130212381 | SYSTEM AND METHOD FOR CONTROLLING AUTHORIZED ACCESS TO A STRUCTURED TESTING PROCEDURE ON A MEDICAL DEVICE - Methods and systems for authorizing access to a medical device are disclosed. The methods and systems use authorization certificates to allow and prevent access to one or more operations of the medical device. The methods and systems also allow the tracking of changes made to the medical device by an authorized user. | 2013-08-15 |
20130212382 | DEVICE-BOUND CERTIFICATE AUTHENTICATION - A device-bound certificate authority binds a certificate to one or more devices by including digital fingerprints of the devices in the certificate. A device only uses a device-bound certificate if the digital fingerprint of the device is included in the certificate and is verified. Thus, a certificate is only usable by one or more devices to which the certificate is explicitly bound. Such device-bound certificates can be used for various purposes served by certificates generally such as device driver authentication and authorization of access to secure content, for example. | 2013-08-15 |
20130212383 | Revocation Information for Revocable Items - Techniques for providing revocation information for revocable items are described. In implementations, a revocation service is employed to manage revocation information for various revocable items. For example, the revocation service can maintain a revoked list that includes revoked revocable items, such as revoked digital certificates, revoked files (e.g., files that are considered to the unsafe), unsafe network resources (e.g., a website that is determined to be unsafe), and so on. In implementations, the revocation service can communicate a revoked list to a client device to enable the client device to maintain an updated list of revocation information. | 2013-08-15 |
20130212384 | ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 2013-08-15 |
20130212385 | UTILIZATION OF A PROTECTED MODULE TO PREVENT OFFLINE DICTIONARY ATTACKS - Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module. | 2013-08-15 |
20130212386 | Storage Access Authentication Mechanism - In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes responder side software for an authentication protocol and an agent in the client VM includes the requestor side of the authentication protocol. The certificate of the client is securely provided to the encryption switch, which associates the client VM with the LUN. The client private key is securely provided to the client VM, which retains it only non-persistently. The client VM requests LUN access and performs an authentication handshake with the encryption switch. If successful the client VM than has access to the LUN. As the original certificate is linked to the client, if the client is itself a VM, should the client be moved to a different host, the certificate moves with it and LUN accessibility is maintained. | 2013-08-15 |
20130212387 | SYSTEM AND METHOD FOR DELIVERING A CHALLENGE RESPONSE IN AN AUTHENTICATION PROTOCOL - A system and method for authenticating a user that includes receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response. | 2013-08-15 |
20130212388 | PROVIDING TRUSTWORTHY WORKFLOW ACROSS TRUST BOUNDARIES - Methods, systems and apparatuses for providing trustworthy workflow across trust boundaries are disclosed. One method includes a curator generating a first public key (PK | 2013-08-15 |
20130212389 | ENTERPRISE COMPUTER INVESTIGATION SYSTEM - A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims. | 2013-08-15 |
20130212390 | METHOD AND SYSTEM FOR AUTHENTICATING ENTITY BASED ON SYMMETRIC ENCRYPTION ALGORITHM - A method and a system for authenticating an entity based on a symmetric encryption algorithm are provided. The method includes the following steps: 1) an entity A sends an authentication request message to an entity B; 2) after receiving the authentication request message, the entity B sends an authentication response message to the entity A; 3) the entity A determines the validity of the entity B according to the received authentication response message. The implementation cost of the system can be reduced by using the authentication according to the invention. | 2013-08-15 |
20130212391 | ELLIPTIC CURVE CRYPTOGRAPHIC SIGNATURE - A method includes generating a randomized base point and causing the randomized base point and a private key to be loaded into a signature engine device. The method also includes signing a message using the randomized base point and the private key as a base point as well as the private key in an elliptic curve cryptographic (ECC) signature. | 2013-08-15 |
20130212392 | KEY MANAGEMENT ON DEVICE FOR PERIMETERS - There is provided a method and apparatus for resetting a password for a device or managing the device, the device having an encryption perimeter. A device shares a public/private key pair with a server, the public key being on the device and the private key being on the server. An intermediate value is encrypted on the mobile device using the public key. If the password is lost or the device needs to be managed, the server can request the encrypted intermediate value, decrypt it, and send the decrypted value to the mobile device which may then resume operations. A new password may be provided by the server or the user may set a new password once the encryption key is recreated from the decrypted intermediate value. | 2013-08-15 |
20130212393 | SECURING A SECRET OF A USER - Methods, systems and apparatuses for securing a secret are disclosed. One method includes receiving a secret from the user and generating encrypted shares based on the secret, a policy, and a plurality of public keys. The encrypted shares are provided to a custodian, wherein the custodian verifies that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares. | 2013-08-15 |
20130212394 | Method for 802.1X Authentication, Access Device and Access Control Device - In a method for 802.1X authentication, used in a network which comprises an access device and an access control device, a WLAN security template and a 802.1X client template is enabled at the access device, a 802.1X client template is enabled at the access device, and a 802.1X device template is enabled at a tunnel port of the access control device. The access control device establishes a 802.1X authentication tunnel with the access device, receive a packet transmitted by a client at the access control device through the 802.1X authentication tunnel, authenticates the client after receiving the packet, and assists the access device through the 802.1X authentication tunnel to obtain a session key. | 2013-08-15 |
20130212395 | MONITORING AND CONTROLLING ACCESS TO ELECTRONIC CONTENT - Methods, systems and apparatuses for monitoring and controlling access to an electronic content are disclosed. One method includes creating, by an owner server, a group comprising generating a group public key PK | 2013-08-15 |
20130212396 | Methods and Systems for State Synchronization Over a Non-Reliable Network Using Signature Processing - Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the methods includes receiving a read request from a first client, sending a last known signature with a context object to the first client in response to receiving the read request, and receiving an appended signature from the first client with a context object for a transaction at the first client. The appended signature includes the last known signature and an increment by the first client. The operation of receiving the appended signature occurs upon execution of the transaction at the first client. The method further includes updating the last known signature to the appended signature and sending the updated last known signature to the first client to facilitate marking of the transaction as complete resulting in a definitive state synchronization. | 2013-08-15 |
20130212397 | APPARATUS AND METHOD FOR INCORPORATING SIGNATURE INTO ELECTRONIC DOCUMENTS - “Embodiments relate to methods and apparatus for facilitating the protection from tampering of an electronic document to which an electronic signature is applied. In non-limiting examples, techniques may relate to the handling of document appearance data, dynamic signature biometric data, digital footprints data, pixel history data, and camera-acquired image data.” | 2013-08-15 |
20130212398 | METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER - A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signature based on a comparison of the currently received signature to the set of previously received signatures associated with the candidate identifier. Also, a method that comprises obtaining a currently received signature from a device; decrypting the currently received signature to obtain a candidate identifier; and a candidate scrambling code; consulting a database to obtain a set of previously received scrambling codes associated with the candidate identifier; and validating the currently received signature based on a comparison of the candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier. | 2013-08-15 |
20130212399 | Travel Vault - A travel vault includes a system and method for backing up and retrieving an encrypted data file containing user identification and credential information held in the dedicated tamperproof module of a mobile device. During backup, the encrypted data file is locked by the user with a personal identification number (PIN) and stored on a server secured by an HSM (Hardware Security Module). The user may then later retrieve and re-provision the locked, encrypted data file containing the user's identification and credentials into another dedicated tamperproof mobile device, provided the user verifies his identity by providing the PIN used to lock the file, and/or verifies his identity through an out-of-band user authentication process. | 2013-08-15 |
20130212400 | DOUBLE AUTHENTICATION FOR CONTROLLING DISRUPTIVE OPERATIONS ON STORAGE RESOURCES - A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied. | 2013-08-15 |
20130212401 | METHODS AND DEVICES FOR AUTHENTICATION AND DATA ENCRYPTION - A storage device comprises a non-volatile storage media and a processor that is operative to receive, via an interface with one or more host devices, a first entered password needed for accessing data stored in the non-volatile storage media, generate a first number, combine the first entered password and the first number, generate a cryptographic key based on the combination of the first entered password and the first number, encrypt the received first entered password using the cryptographic key, and store the encrypted first entered password and the first number in the non-volatile media. The processor may be further operative to receive a request for authentication; provide a reply comprising the first number; receive a second number calculated based on a cryptographic combination of the first number and a second entered password, and authenticate the host device if the second number successfully decrypts the encrypted first entered password. | 2013-08-15 |
20130212402 | TECHNIQUES FOR CALIBRATING MEASURING DEVICES - Techniques for calibrating measuring devices are provided. A universal serial bus (USB) drive is inserted into a USB port on a device of a checkout system. A key in the USB drive initiates a calibration sequence on one or more weighing devices (measuring devices) of the checkout system. Audit information is captured during the calibration and usage of the weighing devices. When a command is recognized to communicate the audit information, the audit information is audibly communicated from speakers associated with the checkout system. | 2013-08-15 |
20130212403 | Electronic content rights with and-or expression - Methods and apparatus for creating a license defining permissions to use electronic content. The methods include selecting a plurality of habitat types, each an aspect of a user environment to which a license can be bound; determining one or more habitat values and relations for each selected type; and creating a license to use the electronic content, the license including an and or logic expression of habitat terms, each term containing one of the selected types and its set of corresponding values and relations. | 2013-08-15 |
20130212404 | DOCUMENT MODIFICATION DETECTION AND PREVENTION - Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented to a user. The electronic document has data representing a signed state and a current state. A disallowed difference between the signed state and the current state is detected, based on one or more rules that are associated with the electronic document. A digital signature associated with the electronic document is invalidated in response to the detecting. | 2013-08-15 |
20130212405 | SECURE DATA PARSER METHOD AND SYSTEM - The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. | 2013-08-15 |
20130212406 | TECHNIQUE FOR PROVIDING SECURE FIRMWARE - A technique to verify firmware. One embodiment of the invention uses a processor's micro-code to verify a system's firmware, such that the firmware can be included in a trusted chain of code along with the operating system. | 2013-08-15 |
20130212407 | METHOD FOR MANAGING MEMORY SPACE IN A SECURE NON-VOLATILE MEMORY OF A SECURE ELEMENT - The invention relates to a method for managing non-volatile memory space in a secure processor comprising a secure non-volatile internal memory, the method comprising steps of: selecting data elements to remove from the internal memory, generating, by the secure processor, a data block comprising the selected data elements, and a signature computed from the selected data elements using a secret key generated by the secure processor, transmitting the data block by the secure processor, and storing the transmitted data block in an external memory. | 2013-08-15 |
20130212408 | REGULATING A CLOCK FREQUENCY OF A PERIPHERAL - A method of communicating in an electronic system or apparatus is disclosed. The method includes using a processor to communicate with a peripheral. The processor has a power state. The method also includes regulating a clock frequency of the peripheral, where this regulation is based at least in part on the power state of the processor. | 2013-08-15 |
20130212409 | Surface-mediated cell-powered portable computing devices and methods of operating same - This invention provides a portable computing device powered by a surface-mediated cell (SMC)-based power source, the portable device comprising a computing hardware sub-system and a rechargeable power source electrically connected to the hardware and providing power thereto, wherein the power source contains at least a surface-mediated cell. The portable computing device is selected from a laptop computer, a tablet, an electronic book (e-book), a smart phone, a mobile phone, a digital camera, a hand-held calculator or computer, or a personal digital assistant. | 2013-08-15 |
20130212410 | RENEWABLE ENERGY CONTROL SYSTEMS AND METHODS - Various examples are provided for renewable energy control. In one example, among others, a system includes a PV source, a multi-core processor load, and a solar power manager configured to adjust an operating point of the PV source about a maximum power point by dynamically adjusting a transfer ratio and a load level. In another example, a method includes sensing an output current supplied to a multi-core processor load by a power converter at a first transfer ratio, sensing another output current supplied at a second transfer ratio, and determining an operating point of the PV source with respect to a maximum power point based upon the output currents. In another example, a system includes a power manager configured to switch servers between a renewable energy supply and a utility energy supply based at least in part upon a budget level and the load power consumption. | 2013-08-15 |
20130212411 | SYSTEMS AND METHODS FOR CONFIGURING A POWER DISTRIBUTION UNIT - Methods, systems, and devices are described for configuration of multiple power distribution units (PDUs) in an efficient manner. Power distribution units may be discovered on a network, and automatically configured according to a configuration defined for a particular location. A location may be, for example, a geographical region, a data center, a zone within a data center, a cabinet, or an individual PDU. All PDUs associated with a particular location may be provided with a common configuration file that defines operating parameters for the PDUs. In such a manner, a user may simply connect the PDU to the network, with the appropriate configuration provided without additional involvement of the user. | 2013-08-15 |
20130212412 | CONTROL CIRCUIT FOR TERMINAL ELECTRONIC DEVICE - A control circuit for a terminal electronic device includes a network card, a wakeup circuit, a south bridge, a restart circuit, and a controller. The network card receives a remote control command from a remote apparatus, and generates a wakeup signal if the terminal electronic device is turned off. The wakeup circuit activates the terminal electronic device according to the wakeup signal. The south bridge provides a low voltage power signal if the terminal electronic device is turned off. The controller receives the wakeup signal and the low voltage power signal, and outputs a first control signal to the restart circuit to disable the restart circuit. | 2013-08-15 |
20130212413 | Cloud Remote Wakeup - A technique for leveraging cloud resources includes maintaining a resource index for a user for resources that are available from a connected standby device. The resource index can store an identification of resources for an entity (e.g., a user or enterprise) that is stored on a connected standby device. The resource index can include resources of other devices, as well. A connected standby device will generally have at least three power states, online, offline, and connected standby. When a device is online, a processor of the device is powered up and capable of handling, e.g., remote requests for resources. When a device is offline, the device may or may not be off, but is in any case not responsive to remote access. When a device is on connected standby, a processor of the device is powered down, but the device is responsive to a wakeup packet, enabling the device to respond to a resource request, typically after a short delay while the processor powers up. | 2013-08-15 |
20130212414 | REDUCING PERFORMANCE DEGRADATION IN BACKUP SEMICONDUCTOR CHIPS - A system has at least a first circuit portion and a second circuit portion. The first circuit portion is operated at normal AC frequency. The second circuit portion is operated in a back-up mode at low AC frequency, such that the second circuit portion can rapidly come-online but has limited temperature bias instability degradation. The second circuit portion can then be brought on-line and operated at the normal AC frequency. A system including first and second circuit portions and a control unit, as well as a computer program product, are also provided. | 2013-08-15 |
20130212415 | Partition Level Power Management Using Fully Asynchronous Cores with Software that has Limited Asynchronous Support - A partition that is executed by multiple processing nodes. Each node includes multiple cores and each of the cores has a frequency that can be set. A first frequency range is provided to the cores. Each core, when executing the identified partition, sets its frequency within the first frequency range. Frequency metrics are gathered from the cores running the partition by the nodes. The gathered frequency metrics are received and analyzed by a hypervisor that determines a second frequency range to use for the partition, with the second frequency range being different from the first frequency range. The second frequency range is provided to the cores at the nodes executing the identified partition. When the cores execute the identified partition, they use a frequencies within the second frequency range. | 2013-08-15 |
20130212416 | MOTION ON COMPUTER - The processor of a computer in the form or a slate or clamshell can reconfigure a computer from a full power wake mode to a low power sleep mode or vice versa by using any combination of criteria that includes input and motion within a threshold period as detected by motion sensors such as a gyroscope, a shock sensor, and an accelerometer. | 2013-08-15 |
20130212417 | POWER MANAGEMENT WITH DYNAMIC FREQUENCY ADJUSTMENTS - A central processing unit (CPU) can specify an initial (e.g., baseline) frequency for a clock signal used by a device to perform a task. The CPU is then placed in a reduced power mode. The device performs the task after the CPU is placed in the reduced power mode until a triggering event causes the device to send an interrupt to the CPU. In response to the interrupt, the CPU awakens to dynamically adjust the clock frequency. If the clock frequency is reset to the baseline value, then the CPU is again placed in the reduced power mode. | 2013-08-15 |
20130212418 | ELECTRONIC DEVICE, IMAGE PROCESSING APPARATUS, AND DEVICE CONTROL METHOD - According to an embodiment, provided is an electronic device that includes: an energy generation unit that generates electrical power; an accumulating unit that accumulates therein the electrical power generated by the energy generation unit; and a network control unit that includes: a first function unit that performs network response processing; a second function unit that performs network response processing with a relatively smaller processing load than the network response processing performed by the first function unit; and a third function unit that controls the electrical power supply to the function units. The third function unit stops the electrical power supply to the first function unit in a predetermined standby operation mode that is standby for a network response request, and supplies the electrical power to the second function unit directly from the energy generation unit bypassing the accumulating unit. | 2013-08-15 |
20130212419 | MONITORING POWER SOURCE REDUNDANCY VIA A POWER DISTRIBUTION UNIT - A programmable logic circuit assigns a value to an outlet of a power distribution unit (PDU) that comprises a power source at an input of the PDU and at least one light-emitting diode (LED) associated with the outlet. The programmable logic circuit sends the value to a program on a hardware device that comprises one or more power supplies. The programmable logic circuit receives information from the program. Subsequently, an illumination state of the LED is modified based on the information. | 2013-08-15 |
20130212420 | TIME-STAMPING OF INDUSTRIAL CLOUD DATA FOR SYNCHRONIZATION - A cloud-capable industrial device that provides time-stamped industrial data to a cloud platform is provided. The industrial device collects or generates industrial data in connection with monitoring and/or controlling an automation system, and includes a cloud interface that couples the industrial device to one or more cloud-based services running on a cloud platform. The industrial device can apply time stamps to respective items of industrial data reflecting a time that the data was measured or generated prior to providing the data to the cloud platform. To accurately reflect temporal relationships between data sets provided to the cloud platform from different locations and time zones, the industrial device can synchronize its internal clock with a clock associated with the cloud platform. | 2013-08-15 |
20130212421 | USING PULSES TO CONTROL WORK INGRESS - Clock pulses of a variable speed clock are adjusted relative to system utilization. A load monitor periodically collects sensor measurements of resources and based on the sensor measurements, the load monitor adjusts the clock speed up or down. | 2013-08-15 |
20130212422 | Method And Apparatus For Rapid Disaster Recovery Preparation In A Cloud Network - Various embodiments provide a method and apparatus of providing a rapid disaster recovery preparation in cloud networks that proactively detects disaster events and rapidly allocates cloud resources. Rapid disaster recovery preparation may shorten the recovery time objective (RTO) by proactively growing capacity on the recovery application(s)/resource(s) before the surge of recovery traffic hits the recovery application(s)/resource(s). Furthermore, rapid disaster recovery preparation may shorten RTO by growing capacity more rapidly than during “normal operation” where the capacity is increased by modest growth after the load has exceeded a utilization threshold for a period of time. | 2013-08-15 |
20130212423 | Match Server for a Financial Exchange Having Fault Tolerant Operation - Fault tolerant operation is disclosed for a primary match server of a financial exchange using an active copy-cat instance, a.k.a. backup match server, that mirrors operations in the primary match server, but only after those operations have successfully completed in the primary match server. Fault tolerant logic monitors inputs and outputs of the primary match server and gates those inputs to the backup match server once a given input has been processed. The outputs of the backup match server are then compared with the outputs of the primary match server to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup match server to take over for the primary match server in a fault situation wherein the primary and backup match servers are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. | 2013-08-15 |
20130212424 | COMPUTER SYSTEM AND BOOT CONTROL METHOD - When a primary computer is taken over to a secondary computer in a redundancy configuration computer system where booting is performed via a storage area network (SAN), a management server delivers an information collecting/setting program to the secondary computer before the user's operating system of the secondary computer is started. This program assigns a unique ID (World Wide Name), assigned to the fibre channel port of the secondary computer to allow a software image to be taken over from the primary computer to the secondary computer. | 2013-08-15 |
20130212425 | ENHANCED DEBUGGING FOR EMBEDDED DEVICES - Methods, machine-readable tangible storage media, and data processing systems that enable a debug host device to acquire memory dump information from a debug target device after the target device suffers an unrecoverable system malfunction are disclosed. In one embodiment, data in the volatile memory on a debug target device is accessed via a hardware integrated debug framework, which is also used to access data on a nonvolatile electronically erasable semiconductor memory of a debug target device, and one or more registers of one or more processors on a debug target device, and a core dump is created on the debug host device. | 2013-08-15 |
20130212426 | Controlling Memory Redundancy In A System - In one embodiment, the present invention provides an ability to handle an error occurring during a memory migration operation in a high availability system. In addition, a method can be used to dynamically remap a memory page stored in a non-mirrored memory region of memory to a mirrored memory region. This dynamic remapping may be responsive to a determination that the memory page has been accessed more than a threshold number of times, indicating a criticality of information on the page. Other embodiments are described and claimed. | 2013-08-15 |
20130212427 | RECLAIMING DISCARDED SOLID STATE DEVICES - Discarded memory devices unfit for an original purpose can be reclaimed for reuse for another purpose. The discarded memory devices are tested and evaluated to determine the level of performance degradation therein. A set of an alternate usage and an information encoding scheme to facilitate a reuse of the tested memory device is identified based on the evaluation of the discarded memory device. A memory chip controller may be configured to facilitate usage of reclaimed memory devices by enabling a plurality of encoding schemes therein. Further, a memory device can be configured to facilitate diagnosis of the functionality, and to facilitate usage as a discarded memory unit. Waste due to discarded memory devices can be thereby reduced. | 2013-08-15 |
20130212428 | INFORMATION STORAGE MEDIUM LIBRARY ARRAY APPARATUS, INFORMATION RECORDING METHOD AND INFORMATION RECORDING PROGRAM - Each of a plurality of information storage media and an alternative information storage medium record data continuously on tracks, each of a plurality of recording and reproduction devices record data on the information storage medium that is a recording object, of the plurality of information storage media, and the information storage media installed respectively in the plurality of recording and reproduction devices constitute a disk array, and the array controller detects the occurrence of a fault in which the information storage medium installed in any of the plurality of recording and reproduction devices has become unable to perform recording, and the backup recording and reproduction device alternatively records to the alternative information storage medium data that ought to be recorded to a faulty information storage medium where the occurrence of a fault has been detected by the array controller. | 2013-08-15 |
20130212429 | STORAGE DEVICE REPLACEMENT METHOD, AND STORAGE SUB-SYSTEM ADOPTING STORAGE DEVICE REPLACEMENT METHOD - Based on information security rules, it is not possible to take out a failure HDD to the exterior of a facility for replacement without erasing data therefrom. According to the present storage sub-system, a slot in which failure has occurred and a slot not registered to a configuration information of a storage sub-system are used to simultaneously perform correction copy to a spare HDD and data erase of the failure HDD in parallel, so as to enable the failure HDD to be brought out to the exterior of the storage facility. Further, time required from when failure has occurred to the HDD to data recovery is shortened, so as to prevent deteriorated redundancy that may be caused by another failure occurring during data recovery and to reduce the risk of data loss. | 2013-08-15 |
20130212430 | ELECTRONIC DEVICE WITH FIRMWARE RECOVERY FUNCTION AND METHOD FOR RECOVERING FIRMWARE - An electronic device with firmware recovery function includes a connecting port to connect the electronic device to an external device and a BMC. The BMC includes a firmware memory storing firmware data of the BMC and a microprocessor. The microprocessor determines whether the BMC is able to execute the firmware data in the firmware memory, and determines whether a download command for downloading firmware data is received from the external device when the BMC is not able to execute the firmware data in the firmware memory. The microprocessor further reads the firmware data from the external device into a memory space of the microprocessor upon receiving the download command, and recovers the firmware data in the firmware memory by writing the firmware data from the memory space of the microprocessor into the firmware memory. A related method is also provided. | 2013-08-15 |
20130212431 | METHOD AND SYSTEM FOR PROVIDING A SMART MEMORY ARCHITECTURE - A smart memory system preferably includes a memory including one or more memory chips, and a processor including one or more memory processor chips. The processor may include a common address/data/control memory bus that is configured to provide an asynchronous handshaking interface between the memory array and the memory processor. The processor can offload error data from the memory chip for analysis, and can store poor retention bit address information for memory refreshing in a non-volatile error retention memory. Program logic can also be included for memory address re-configuration. Power management logic can also be included, which may have a process-voltage-temperature compensation voltage generator for providing stable and constant read currents. An asynchronous handshaking interface is provided between the memory array and the memory processor. Write error tagging and write verification circuits can also be included. | 2013-08-15 |
20130212432 | SYSTEMS, METHODS, AND APPARATUS FOR FACILITATING CLAIMS PROCESSING - Systems, apparatus, methods, and articles of manufacture provide for facilitating upload of one or more electronic files from a user device to a remote server. In some embodiments, a background upload process manages connectivity of the user device to the remote server and staging file uploads in a disconnected mode for automatic processing when connectivity is restored. | 2013-08-15 |
20130212433 | SELF-MANAGED PROCESSING DEVICE - A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services. | 2013-08-15 |
20130212434 | FIELD TESTER FOR TOPOLOGIES UTILIZING ARRAY CONNECTORS AND MULTI-WAVELENGTH FIELD TESTER FOR TOPOLOGIES UTILIZING ARRAY CONNECTORS - A test instrument provides suggested next operational step function to provide a user with assistance during testing. A display is provided to show the amount of a project that has been completed, for example as a percentage completed value. Individual test results may be saved to a ‘fix later’ list, which may be later accessed to re-test items that may not have passed on initial testing. | 2013-08-15 |
20130212435 | Integrated Fuzzing - Integrated fuzzing techniques are described. A fuzzing system may employ a container configured as a separate component that can host different target pages to implement fuzzing for an application. A hosted target file is loaded as a subcomponent of the container and parsed to recognize functionality of the application invoked by the file. In at least some embodiments, this involves building a document object model (DOM) for a browser page and determining DOM interfaces of a browser to call based on the page DOM. The container then operates to systematically invoke the recognized functionality to cause and detect failures. Additionally, the container may operate to perform iterative fuzzing with multiple test files in an automation mode. Log files may be created to describe the testing and enable both self-contained replaying of failures and coverage analysis for multiple test runs. | 2013-08-15 |
20130212436 | Method and system for detecting abnormality of network processor - The disclosure discloses a method and a system for detecting an abnormality of a network processor. The method comprises the following steps: an abnormality detection operation code is added into an execution flow of each thread in a network processor, and the network processor sets a flag bit corresponding to a current thread in an abnormality protection flag data area in a shared memory to a first flag when executing the abnormality detection operation code in the current thread; and when a period of a timer is expire, a coprocessor detects all the flag bits in the abnormality protection flag data area in the shared memory, determines that a thread corresponding to a flag bit which is not the first flag is abnormal when detecting that not all the flag bits are the first flag, and sets all the flag bits to a second flag when detecting that all the flag bits are the first flag. Through the disclosure, the abnormality of a thread can be detected timely and efficiently, so that the failure detection capability of the network device using the network processor as a core unit at run time is improved without influencing the forwarding performance and service processing flow of the network processor. | 2013-08-15 |
20130212437 | Item-Level Restoration and Verification of Image Level Backups - Systems and methods for item-level restoration from and verification of an image level backup without fully extracting it. The method receives backup parameters and selection of an image level backup to restore or verify and initializes virtual storage. The method attaches the virtual storage to a hypervisor to launch a virtual machine (VM) to test and restore data objects. The method stores VM virtual disk data changes resulting from restoration and verification in a changes storage. The method optionally reconfigures VMs to use an isolated network. The method optionally uses a routing appliance to provide access to VMs running in the isolated network from a production network. The method determines if the VM operating system (OS) is able to start using restored copies of selected data objects and tests applications associated with selected data objects. The method displays restoration and test results in an interface and automatically delivers the results. | 2013-08-15 |
20130212438 | STACK-BASED TRACE MESSAGE GENERATION FOR DEBUG AND DEVICE THEREOF - During a debug mode of operation of a data processor it is determined whether a data access request is to a stack of the data processor. If not, a data trace message based on the data access request is generated for transmission to a debugger so long as an address being accessed by data access request meets a predefined address range criteria. Otherwise, if the data access request is to the stack of the data processor, a data trace message based on the data access request is prevented from being generated for transmission to the debugger regardless the predefined address range criteria. | 2013-08-15 |
20130212439 | METHOD AND SYSTEM FOR NETWORK MONITORING USING SIGNATURE PACKETS - A method of monitoring a network with a test device connected to the network includes monitoring a plurality of packets which pass through the test device, comparing a predefined field of each of the plurality of packets to a predefined pattern so as to identify signature packets, evaluating whether the signature packets satisfy a predefined condition, and, if the predefined condition is satisfied, sending a notification to a user. A system implementing the method is provided. | 2013-08-15 |
20130212440 | SYSTEM AND METHOD FOR VIRTUAL SYSTEM MANAGEMENT - A system and method for virtual system management. A set of data received from a plurality of data sensors may be analyzed, each sensor monitoring performance at a different system component. Sub-optimal performance may be identified associated with at least one component based on data analyzed for that component's sensor. A cause of the sub-optimal performance may be determined using predefined relationships between different value combinations including scores for the set of received data and a plurality of causes. An indication of the determined cause may be sent, for example, to a management unit. A solution to improve the sub-optimal performance may be determined using predefined relationships between the plurality of causes of problems and a plurality of solutions to correct the problems. | 2013-08-15 |
20130212441 | System and Method for Signature-Based Redundancy Comparison - A system and method for signature-based redundancy comparison provides for receiving, by a master part, an input signal and generating, by the master part, a binary output signal, generating a delayed input signal based on the input signal, generating a first output signature based on the binary output signal, and generating a delayed first output signature based on the first output signature. The system and method further comprise generating a delayed binary output signal based on the delayed input signal, generating, by a checker part, a delayed second output signature based on the delayed binary output signal, comparing the delayed first output signature with the delayed second output signature, and generating an error signal, where the state of the error signal is based upon the comparison. | 2013-08-15 |
20130212442 | MONITORING CONNECTION QUALITY - In one example monitoring connection quality, data transceiving at a socket may be monitored by frequent pinging. Any error codes identified by the socket may be assigned a corresponding error description, which may then be transmitted to a proper entity for correction. | 2013-08-15 |
20130212443 | DISPLAY PROCESSING SYSTEM, DISPLAY PROCESSING METHOD, AND PROGRAM - A display processing system ( | 2013-08-15 |
20130212444 | METHODOLOGY FOR CORRELATED MEMORY FAIL ESTIMATIONS - Correlated failure distribution for memory arrays having different groupings of memory cells is estimated by constructing memory unit models for the groupings based on multiple parameters, establishing failure conditions of the memory unit model using fast statistical analysis, calculating a fail boundary of the parameters for each memory unit model based on its corresponding failure conditions, and constructing memory array models characterized by the fail boundaries. Operation of a memory array model is repeatedly simulated with random values of the parameters assigned to the memory cells and peripheral logic elements to identify memory unit failures for each simulated operation. A mean and a variance is calculated for each memory array model, and an optimal architecture can thereafter be identified by selecting the grouping exhibiting the best mean and variance, subject to any other circuit requirements such as power or area. | 2013-08-15 |
20130212445 | APPARATUS FOR JTAG-DRIVEN REMOTE SCANNING - A scan circuit (JTAG 1149 extension) for a microprocessor utilizes transport logic and scan chains which operate at a faster clock speed than the external JTAG clock. The transport logic converts the input serial data stream (TDI) into input data packets which are sent to scan chains, and converts output data packets into an output data stream (TDO). The transport logic includes a deserializer having a sliced input buffer, and a serializer having a sliced output buffer. The scan circuit can be used for testing with boundary scan latches, or to control internal functions of the microprocessor. Local clock buffers can be used to distribute the clock signals, controlled by thold signals generated from oversampling of the external clock. The result is a JTAG scanning system which is not limited by the external JTAG clock speed, allowing multiple internal scan operations to complete within a single external JTAG cycle. | 2013-08-15 |
20130212446 | PACKET RETRANSMISSION METHOD IN A WIRELESS TRANSMITTER - The present invention concerns a wireless device and a method at a wireless device for transmitting a packet, said method comprising the steps of setting a lifetime value to a packet to transmit and, while the packet lifetime has not expired and the packet transmission fails: retransmitting the packet up to a retry limit, and suspending transmitting said packet during a pause time before transmitting the packet up to a retry limit. | 2013-08-15 |
20130212447 | Non-Binary LDPC Decoder with Low Latency Scheduling - Various embodiments of the present invention provide systems and methods for decoding of non-binary LDPC codes. For example, a low density parity check data decoder is disclosed that includes a variable node processor operable to perform variable node updates based at least in part on check node to variable node message vectors, a check node processor operable to perform check node updates and to generate the check node to variable node message vectors, and a scheduler operable to cause the variable node processor to use check node to variable node message vectors from multiple decoding iterations when performing the variable node updates for a given decoding iteration. | 2013-08-15 |
20130212448 | SYSTEM AND METHOD OF SENDING CORRECTION DATA TO A BUFFER OF A NON-VOLATILE MEMORY - A method includes receiving data from a buffer of a non-volatile memory. An error correction coding (ECC) operation is initiated to correct bit errors in the data. Correction data is sent to the buffer to correct the bit errors in the data. | 2013-08-15 |
20130212449 | SELF-REPAIRING MEMORY - A memory array has a plurality of rows including a plurality of memory words. Each first bit of a plurality of first bits is associated with a memory word of the each row. A state of the each first bit indicates whether the associated memory word has had an error. Each redundancy row of a plurality of redundancy rows includes a plurality of redundancy words. Each redundancy word is associated with a memory word. A corrected data cache has at least one repair word configured to store corrected data and at least one status bit associated with the at least one repair word, the status bit indicating whether the corrected data stored in the repair word is a pending repair. The corrected data cache is configured to write the corrected data stored in the repair word to at least one of a counterpart memory word or a counterpart redundancy word. | 2013-08-15 |
20130212450 | HIGH THROUGHPUT DECODER ARCHITECTURE FOR LOW-DENSITY PARITY-CHECK CONVOLUTIONAL CODES - A Low-Density Parity-Check Convolutional Code (LPDCCC) decoder ( | 2013-08-15 |
20130212451 | REDUCED COMPLEXITY NON-BINARY LDPC DECODING ALGORITHM - A custom decoding algorithm is introduced, in connection with a corresponding decoding structure, to resolve many complexity and large memory requirements of known decoders. A system. A variable node forms a confidence vector of four components, one component for each state of a memory cell, and passes the current primary component (e.g., the largest) to one or more check nodes. The check nodes calculate a temporary component and corresponding index based on all components received from the variable nodes, which they pass back to the respective variable nodes. The variable node updates the confidence vector based on the temporary nodes received from respective check nodes, and determines the correct state for corresponding memory cell based on which component in the confidence vector is currently the primary component. | 2013-08-15 |
20130212452 | Apparatus and Method for Comparing Pairs of Binary Words - An apparatus for comparing pairs of binary words includes an intermediate value determiner and an error detector. The intermediate value determiner determines an intermediate binary word so that the intermediate binary word is equal to a reference binary word for a first pair of equal or inverted binary words, so that the intermediate binary word is equal to the inverted reference binary word for a second pair of equal or inverted binary words and so that the intermediate binary word is unequal to the reference binary word and the inverted reference binary word for a pair of unequal and uninverted binary words, if the intermediate value determiner works faultlessly. Further, the error detector provides an error signal based on the intermediate binary word so that the error signal indicates whether or not the binary words of a pair of binary words are equal or inverted. | 2013-08-15 |
20130212453 | CUSTOM CONTENT DISPLAY APPLICATION WITH DYNAMIC THREE DIMENSIONAL AUGMENTED REALITY - A system and method to customize and present an augmented reality environment featuring customized content: image(s), video, audio or combination thereof. A digital interface provides tools to empower users to create an augmented reality scene to be provided to other viewers. A viewer's client device launches an application and points the camera of the device at a graphic element (marker). The marker may be on printed media including an invitation or card. The marker may also be displayed digitally. The marker either has a unique access code built-in or it may have a separate access code inputted by the viewer. This code identifies the original creator's content. The device camera recognizes the marker to establish the position of the client device relative to the marker. The client device displays the augmented reality environment and content which is interactive as the viewer points and moves their device relative to the marker. | 2013-08-15 |
20130212454 | SYNCHRONIZED CONSUMPTION MODES FOR E-BOOKS - An e-book system receives and stores different versions of an e-book supporting different consumption modes. Additionally, the e-book system stores signposts for the e-book. The signposts include corresponding locations in different versions of the e-book. When a user switches from a first version to a second version, the e-book system determines based on the signposts a location in the second version of the e-book that corresponds to the current location in the first version. The e-book system then presents the content in the second version from the determined location. | 2013-08-15 |
20130212455 | System and Method for Examining the Financial Data of an Organization - A system and method for presenting views into general ledger data of an organization is described. In some examples, the system presents a hierarchy of views that include information associated with journal entries of the general ledger data along with links to other views within the hierarchy. | 2013-08-15 |
20130212456 | BROADCAST RECEIVING APPARATUS AND METHOD OF PROVIDING WEBSITE ACCESSING ROUTE USING THE SAME - A broadcast receiving apparatus and a method of providing a website accessing route using the broadcast receiving apparatus are provided. The broadcast receiving apparatus includes: a signal processing unit which performs signal processing with respect to received broadcast contents; a communicating unit which communicates with an external server to access websites; a display unit which displays the signal processed broadcast contents or the websites; and a controlling unit which provides links to a plurality of websites regarding a plurality of categories based on information about previous visits or current visits of a user to the websites and, if one of the plurality of categories is selected, the controlling unit provides a link to a website corresponding to the selected category. | 2013-08-15 |
20130212457 | Creating and Inserting Links by Drag and Drop - A user interface is provided. The user interface may include a first portion and a second portion. The first portion may contain one or more listings corresponding to one or more entities. The second portion may include an editable surface for viewing and editing the entities. A command to drag and drop a listing corresponding to a first entity from the first portion displaying the listing into the second portion displaying a second entity is received. In response to receiving the command to drag and drop the listing from the first portion into the second portion, a link to the first entity is inserted into the second entity. | 2013-08-15 |
20130212458 | DISPLAY CONTROL DEVICE, DISPLAY CONTROL METHOD, AND DISPLAY CONTROL PROGRAM - Disclosed is a display control device including a selection information acquiring part | 2013-08-15 |
20130212459 | SYSTEM AND METHOD FOR LEGAL DOCUMENT AUTHORING AND ELECTRONIC COURT FILING - A system for legal document authoring for a legal action and electronic court filing of such legal documents provides an online network for subscribers. The system provides a direct mechanism (and a web portal mechanism) for submitting a claim file containing party and claim information necessary for automatic legal document generation based on an auto-selected destination court (in some embodiments) and further based on at least certain party and claim information. The automatically-generated legal documents are compliant with the requirements of the destination court, providing end-to-end automation for improved efficiency in judicial debt collection. The system also provides an online network for facilitating communications between subscribers (litigants) and the court systems. | 2013-08-15 |
20130212460 | TRACKING VISIBILITY OF RENDERED OBJECTS IN A DISPLAY AREA - When rendering a page for display, objects in the page are marked as visible, partially visible, or visible, based on the size and position of each object and the position and size of the page in the display area. This information is tracked as the impression data and can be used to provide better recommendations, advertising revenue and pricing information, and other business uses. In the end, business intelligence based on impressions and click-throughs can be based on what a user actually saw, not just what was rendered. | 2013-08-15 |
20130212461 | BROWSER AND OPERATING SYSTEM COMPATIBILITY - A browser and operating system (OS) compatibility system may include a user interface to select a first combination of a browser and OS for comparison to a second combination of a browser and OS. A download engine may capture source files for browsers for the first and second combinations. A parse engine may create Document Object Model (DOM) trees of objects of first and second website pages respectively for the browsers for the first and second combinations. A metric engine may read the DOM trees for attributes of the objects to capture metrics of the objects. An analysis metric engine may compare a metric of an object of the first website page to a metric of the same object of the second website page to determine a compatibility of the browser and the OS for the first combination to the browser and the OS for the second combination. | 2013-08-15 |
20130212462 | METHOD AND APPARATUS FOR DISTRIBUTED SCRIPT PROCESSING - An approach is provided for providing a low-power browsing experience on a mobile device. A proxy platform receives a request for a webpage. The proxy platform also receives information about the mobile device. The proxy platform processes and/or facilitates a processing of the information about the mobile device and sends the webpage to the mobile device in a format that is based on the information about the mobile device. The mobile device may then operate in a low-power mode when browsing the requested website. | 2013-08-15 |
20130212463 | SMART DOCUMENT PROCESSING WITH ASSOCIATED ONLINE DATA AND ACTION STREAMS - Managing electronic notes includes storing data for at least one of the electronic notes, determining at least one particular action to be performed based on the content of the at least one of the notes, and automatically performing the at least one particular action. The at least one particular action may be determined automatically based on data stored in the at least one of the notes or may be determined by a user providing input to select an action. Actions may be recommended to a user based on at least one of: the extracted terms and the additional online information. Managing electronic notes may also include storing additional data and instructions to perform the at least one particular action. | 2013-08-15 |
20130212464 | PRINT SYSTEM, PRINT SERVER, CONTROL METHOD, AND STORAGE MEDIUM - A webpage print server transmits script to a client terminal that has run a bookmarklet, and the client terminal that has run the script transmits an HTML of a webpage under display by a web browser to the webpage print server. In the case where the webpage print server was unable to acquire the external files in accordance with an external file reference command contained in this HTML, the webpage print server transmits script that causes acquisition of external files to the client device, and the webpage print server acquires the external files from the client device. The webpage print server then generates printing data based on the acquired external files and the aforementioned HTML. | 2013-08-15 |
20130212465 | POSTPONED RENDERING OF SELECT WEB PAGE ELEMENTS - Method and apparatus for optimizing web page performance and/or enhancing user privacy by selectively delaying the loading and/or rendering and/or execution of specific web page elements until such time when the user specifically enables and/or interacts with and/or requires functionality of said elements. | 2013-08-15 |
20130212466 | SYSTEM AND METHOD OF CONCURRENT UNOBSTRUCTED CO-BROWSING AND CHAT MESSAGING - During a co-browsing session between a host computer and an agent computer, a co-browsing window is displayed on a display screen of the host computer. To facilitate concurrent chat messaging, a web browser running on the host computer displays a first chat window at a first area of the display screen. A second chat window is generated based on the first chat window. The first chat window is removed from display at the first area of the display screen, and the second chat window is displayed at a second area of the display screen where the second chat window obstructs less of the co-browsing window than the first chat window did before the first chat window was removed from display at the first area of the display screen. | 2013-08-15 |
20130212467 | Method, System and Device for Displaying a Web Page - According to an example, a method for displaying a webpage includes: A, obtaining, by the webpage parsing server, an original webpage corresponding to a Universal Resource Locator (URL) request transmitted by a mobile terminal, and executing JavaScript (JS) in the original webpage to obtain a result webpage; B, adding, by the webpage parsing server, a JSNODE attribute to the result webpage, transmitting the result webpage containing the JSNODE attribute to the mobile terminal, and the mobile terminal fills in a JS request protocol packet according to a JS event triggered by a user and the JSNODE attribute; and C, executing, by the webpage parsing server, the JS event according to the JS request protocol packet transmitted by the mobile terminal, and transmitting the result webpage in which the JS event has been executed to the mobile terminal for display. | 2013-08-15 |
20130212468 | Alert Driven Interactive Interface to a Website Mining System - Disclosed is a web server that includes a headlines module for automatically generating headlines based on data retrieved from a network (e.g., World Wide Web). The web server also includes an interactive agent for generating responses to inquiries relating to the headlines based on the data. | 2013-08-15 |
20130212469 | Web Reader for Readers with reading disabilities - A method and system for providing a web reader for people with reading disabilities. A web browser extension is included with a web browser add-on functionality that changes a web content hypersensitive marking code at real time to use a cascading style sheet specifically designed for people with a reading disability. | 2013-08-15 |
20130212470 | Device, Method, and Graphical User Interface for Sharing a Content Object in a Document - An electronic device with a display: concurrently displays a first electronic document and a second electronic document, the first electronic document including a displayed content object; detects a first user input that starts on the content object; in response to a determination that the first user input corresponds to a first command, creates and displays a copy of the content object in the second electronic document; and, in response to a determination that the first user input corresponds to a second command, distinct from the first command: selects the content object; displays an animation of the content object separating from the first electronic document; and initiates display of a plurality of icons proximate to the separated content object, the plurality of icons including at least one icon to initiate display of a user interface for sending the content object to one or more other users. | 2013-08-15 |
20130212471 | Optimizing Hyper Parameters of Probabilistic Model for Mixed Text-and-Graphics Layout Template - Example pages in which text and graphics have been laid out using a mixed text-and-graphics layout template are received from a user. Hyper parameters of a probabilistic model for the mixed text-and-graphics layout template are optimized, based on the example pages. | 2013-08-15 |
20130212472 | SYSTEM TO VIEW AND MANIPULATE ARTIFACTS AT A TEMPORAL REFERENCE POINT - One or more artifact drafts may be associated with each of a plurality of artifacts, each of the artifact drafts representing a state of the associated artifact at a point in time and one or more commands in a command stack that transformed the artifact draft's parent into the artifact draft. Multiple traceability links and traceability vertices represent connections between the artifact drafts of the artifacts. A traceability link includes an edge between an artifact draft of an artifact and an artifact draft of another artifact. A module is operable to navigate through said one or more artifacts of the plurality of artifacts from a reference temporal point via the plurality of traceability links. | 2013-08-15 |
20130212473 | SYSTEM TO VIEW AND MANIPULATE ARTIFACTS AT A TEMPORAL REFERENCE POINT - One or more artifact drafts may be associated with each of a plurality of artifacts, each of the artifact drafts representing a state of the associated artifact at a point in time and one or more commands in a command stack that transformed the artifact draft's parent into the artifact draft. Multiple traceability links and traceability vertices represent connections between the artifact drafts of the artifacts. A traceability link includes an edge between an artifact draft of an artifact and an artifact draft of another artifact. A module is operable to navigate through said one or more artifacts of the plurality of artifacts from a reference temporal point via the plurality of traceability links. | 2013-08-15 |
20130212474 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR FACILITATING CREATION OF BUSINESS PLANS AND REPORTS - A set of input parameters is received from a user relating to a particular business entity. A report is programmatically generated for the business entity, the report including grammatically correct statements that directly or indirectly reflect the input parameters. The report can be dynamically updated in response to changes made by the user to the set of input parameters. | 2013-08-15 |
20130212475 | SUGGESTING RELEVANT TERMS DURING TEXT ENTRY - A system for suggesting autocompletion terms during text entry of a report. A text entry unit ( | 2013-08-15 |
20130212476 | ELECTRONIC DEVICE AND DATA CONTROL METHOD THEREOF - An electronic device and data control method are provided. The electronic device includes a connector which is connected to an external storage medium storing media data therein; an identification unit which identifies a storage identifier (ID) of the external storage medium connected to the connector; and a controller which performs a media function corresponding to the media data stored in the external storage medium whose storage ID is identified by the identification unit. | 2013-08-15 |
20130212477 | Interactive Marketing System - This invention relates generally to a content integration and delivery system and a method of using the same. In particular, the present invention relates to a system that integrates digital video content with object-oriented script (hotspots) to provide object specific marketing, including potential channels of distribution, such as internet shopping. The system includes the process of identifying and marking the relative location of specific objects within digital media and providing an outlay for the users to locate the object over the global system of interconnected computer networks (e.g. Internet). By using the disclosed interactive platform, a user can easily view, display, select and purchase any featured product in the video through Internet. | 2013-08-15 |