Patent application number | Description | Published |
20080211777 | Stroke number input - Stroke number input may be provided. A first integer corresponding to a number of stokes in a logogram or corresponding to a radical associated with the logogram may be received. If the first integer corresponds to the radical, a second integer corresponding to the number of stokes in the logogram other than the radical may be received. Next, if the first integer corresponds to the number of stokes, a plurality of logograms may be displayed each having a number of strokes equal to the received first integer. If, however, the first integer corresponds to the radical associated with a logogram, the plurality of logograms may be displayed each having a radical corresponding to the received first integer and a number of strokes, other than the radical, equal to the received second integer. Then, a selection of a one of the plurality of logograms may be received. | 09-04-2008 |
20080215307 | Shared language model - A shared language model may be provided. First, a first input may be received. Then, in response to the first input, an input mode may be determined comprising one of the following: a pinyin input mode, a stroke order input mode, and a stroke number input mode. Then, data may be received based on the determined input mode. The received data may be converted using the determined input mode and using a language model. The language model may be configured to be used with each of the following input modes: the pinyin input mode, the stroke order input mode, and the stroke number input mode. | 09-04-2008 |
20080215308 | Integrated pinyin and stroke input - Integrated pinyin and stroke input may be provided. First, a first input may be received. Next, in response to the first input, an input mode may be determined. The input mode may comprise a pinyin input mode, a stroke order input mode, or a stroke number input mode. Once the input mode is determined, data may be received based on the determined input mode. Then the received data may be converted based upon the determined input mode. | 09-04-2008 |
20100088303 | MINING NEW WORDS FROM A QUERY LOG FOR INPUT METHOD EDITORS - Described is a technology in which new words (including a phrase or set of Chinese characters) are mined from a query log. The new words may be added to (or otherwise supplement) an IME dictionary. A set of candidate queries may be selected from the log based upon market (e.g., the Chinese market) and/or by language. From this set, various filtering steps are performed to locate only new words that are frequently in used. For example, only frequent queries are kept for further processing, which may include filtering out queries based on length (e.g., less than two or greater than eight Chinese characters), and/or filtering out queries based on too many stop-words in the query. Processing may also include filtering out a query that is a substring of a larger query, or Vice-versa. Also described is Pinyin-based clustering and filtering, and filtering out queries already handled in the dictionary. | 04-08-2010 |
20100093213 | ESATA CONNECTOR - An eSATA connector includes a connector plug and a mated connector receptacle. The connector plug includes a plug member, a plug metal housing, plug data terminals and a terminal holding part, in which the plug data terminals are held, and further includes plug power terminals held in the terminal holding part, wherein the plug power terminals and the data terminals each other electrically insulated. | 04-15-2010 |
20120142216 | ESATA CONNECTOR - An eSATA connector includes a connector plug and a mated connector receptacle. The connector plug includes a plug member, a plug metal housing, plug data terminals and a terminal holding part, in which the plug data terminals are held, and further includes plug power terminals held in the terminal holding part, wherein the plug power terminals and the data terminals each other electrically insulated. | 06-07-2012 |
20120258625 | EXTERNAL SERIAL ADVANCED TECHNOLOGY ATTACHMENT CONNECTOR INCLUDING DATA TERMINALS AND POWER-SUPPLY TERMINALS ACCOMMODATED IN A TERMINAL ACCOMMODATING SPACE - An eSATA connector includes a connector plug and a mated connector receptacle. The connector plug includes a plug member, a plug metal housing, plug data terminals and a terminal holding part, in which the plug data terminals are held, and further includes plug power terminals held in the terminal holding part, wherein the plug power terminals and the data terminals each other electrically insulated. | 10-11-2012 |
20130031627 | Method and System for Preventing Phishing Attacks - A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented. | 01-31-2013 |
20130031628 | Preventing Phishing Attacks - A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented. | 01-31-2013 |
20130085747 | System, Method and Computer-Readable Storage Device for Providing Cloud-Based Shared Vocabulary/Typing History for Efficient Social Communication - An input method editor (IME) is associated with a local user. Memory stores local data and a processor, coupled to the memory, is configured to receive input from a local, first user, obtain shared data associated with at least a remote, second user from a remote server and generate prediction candidates and conversion candidates based on the input provided by the local, first user and correlation of the input and the obtained shared data. | 04-04-2013 |
20130191405 | LOCATING ELECTRONIC DOCUMENTS - The present disclosure relates to processing computer documents. According to one aspect, a method for locating an electronic document may include acquiring a source document of a target document to be located, wherein the target document has a sending-receiving relation with the source document. Metadata information of the source document may be extracted. The extracted metadata information may be packaged to generate a link to the source document, the link being used for locating the target document. According to an example method and the system, it may be possible to directly and automatically locate the target document having a sending-receiving relation with a source document based on a link to the source document containing metadata information without manually analyzing and extracting the related information on the source document or changing the existing access right to the source document and the target document. | 07-25-2013 |
20130223532 | MOTION ESTIMATION AND IN-LOOP FILTERING METHOD AND DEVICE THEREOF - A motion estimation method is provided. The method has the following steps of: determining a start searching point according to multiple neighboring macroblocks of a current macroblock, wherein the current macroblock corresponds to a searching window; determining a best candidate pixel according to a first line segment where the start searching point is located, and a second/third line segment above/beneath the first line segment; determining whether the best candidate pixel is located at the first line segment; if so, setting a candidate motion vector corresponding to the best candidate pixel as a first motion vector of the current macroblock; and if not, dynamically adjusting the second line segment or the third line segment in the searching window to update the best candidate pixel, and retrieving the first motion vector of the current macroblock corresponding to the updated best candidate pixel. | 08-29-2013 |
20150074766 | INFORMATION PROCESSING METHOD AND APPARATUS - An information processing method and apparatus are provided. The method is applicable to a first electronic device, where information about a first preset relationship between the first electronic device and a second electronic device is recorded upon detection of the first preset relationship. If it is judged from the recorded information on the first preset relationship that the first preset relationship between the second electronic device and the first electronic device satisfies a first preset condition, then the second electronic device is authorized for a data access privilege so that the second electronic device has a privilege to access data in the first electronic device. This method can lower the complexity of the data access and improve the convenience of the data access between the electronic devices. | 03-12-2015 |