Patent application number | Description | Published |
20100100584 | Web Application Framework Method Enabling Optimum Rendering Performance on a Client Based Upon Detected Parameters of the Client - An improved web application framework methodology enables dynamically-created web content to be generated and downloaded to a client in a fashion that is configured for optimum rendering performance on the client based upon detected parameters of the client. | 04-22-2010 |
20100100585 | Web Application Framework Method Enabling the Creation of Applications That Provide an Interface With Clients That Is Independent of Scripting Capability - An improved web application framework methodology enables the creation of web applications which can respond to client requests in a fashion that results in rendering which appears on the client to be independent of scripting capability. | 04-22-2010 |
20100100869 | Method of Creating an Application That Provides for the Specifying of a New Menu Item in a Context Sensitive Menu - An improved application development tool enables the creation of an application and provides for the creation of additional context-sensitive menu items. | 04-22-2010 |
20100223471 | Cookie Verification Methods And Apparatus For Use In Providing Application Services To Communication Devices - In one illustrative example, a method in a communication device adapted for communications using Hypertext Transport Protocol (HTTP) involves setting, at the communication device, an HTTP cookie which includes a user identification of a user of the communication device and a message portion which is signed with a digital signature of the user. The communication device sends, to an application server site via the communication network, a request message which includes the HTTP cookie. If verification of the digital signature at the application server site is successful, the communication device will receive access to an application service of the application server site. In one variation, the HTTP cookie is alternatively set with a group identification of a group with which the user is associated, and the message portion is signed with a digital signature of the group. The group may be a plurality of users associated with a service provider which provides the communication device access to a communication service in the communication network. In this case, the HTTP cookie may be set with a token retrieved from the service provider, where the token includes the digital signature of the service provider. | 09-02-2010 |
20100332969 | Dynamic Use of Device Theme Parameters for Rendering Markup Content - An improved method enables markup content on an electronic device, such as a web page or other markup content, that includes its own rendering parameters to be rendered on the electronic device according to the theme rendering parameters of the device rather than the rendering parameters included on the web page. | 12-30-2010 |
Patent application number | Description | Published |
20090327659 | TRAP-BASED MECHANISM FOR TRACKING MEMORY ACCESSES - In general, the invention relates to a method. The method includes receiving notification, which includes context information, of a trap. The method further includes accessing, based at least partially upon the context information, a particular instruction that caused the trap, determining, based at least partially upon the context information, a particular address that is to be accessed by the particular instruction, updating a set of log information to indicate accessing of the particular address, causing subsequent accesses of the particular address to not give rise to a trap, after causing subsequent accesses of the particular address to not give rise to a trap, accessing the particular address, after accessing the particular address, causing subsequent accesses of the particular address to give rise to a trap, and causing the particular instruction to not be executed. | 12-31-2009 |
20100023702 | Shared JAVA JAR files - Techniques are disclosed for sharing programmatic modules among isolated virtual machines. A master JVM process loads data from a programmatic module, storing certain elements of that data into its private memory region, and storing other elements of that data into a “read-only” area of a shareable memory region. The master JVM process copies loaded data from its private memory region into a “read/write” area of the shareable memory region. Instead of re-loading the data from the programmatic module, other JVM processes map to the read-only area and also copy the loaded data from the read/write area into their own private memory regions. The private memory areas of all of the JVM processes begin at the same virtual memory address, so references between read-only data and copied data are preserved correctly. As a result, multiple JVM processes start up faster, and memory is conserved by avoiding the redundant storage of shareable data. | 01-28-2010 |
20110145358 | SHARED JAVA JAR FILES - Techniques are disclosed for sharing programmatic modules among isolated virtual machines. A master JVM process loads data from a programmatic module, storing certain elements of that data into its private memory region, and storing other elements of that data into a “read-only” area of a shareable memory region. The master JVM process copies loaded data from its private memory region into a “read/write” area of the shareable memory region. Instead of re-loading the data from the programmatic module, other JVM processes map to the read-only area and also copy the loaded data from the read/write area into their own private memory regions. The private memory areas of all of the JVM processes begin at the same virtual memory address, so references between read-only data and copied data are preserved correctly. As a result, multiple JVM processes start up faster, and memory is conserved by avoiding the redundant storage of shareable data. | 06-16-2011 |
20120102567 | Hybrid System Implementing Distinct and Co-existing Application Execution Environments and Methods for Implementing the Same - A hybrid system is provided. The system includes a computing device implementing a first application execution environment (AEE) and a second AEE. The first AEE is configured to be isolated from the second AEE. The first software application associated with the first AEE is configured to be processed on the first AEE such that the first software application is denied direct access to the second AEE. A second software application associated with the second AEE is configured to be processed on the second AEE such that the second software application is denied direct access to the first AEE. | 04-26-2012 |
20120117499 | METHODS AND APPARATUS TO DISPLAY MOBILE DEVICE CONTEXTS - Example methods and apparatus to display mobile device contexts are disclosed. An example method includes displaying a first context in a user interface of a mobile device based on first device platform information, the first context including a first arrangement of information, graphics, and application icons that are associated with the first device platform information, determining that second device platform information received after the first device platform information corresponds to a second context, the second context being different from the first context and including a second arrangement of information, graphics, and applications that are associated with the second device platform information, and displaying the second context in the user interface replacing the first context without prompting a user of the mobile device. | 05-10-2012 |