FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Date/App# patent app List of recent Den-related patents
07/24/14
20140208456
 Application of ossro1c gene in controlling rice drought resistance patent thumbnailApplication of ossro1c gene in controlling rice drought resistance
Rice ossro1c gene conferring enhanced drought resistance of a plant is provided, wherein the said gene encodes an amino acid sequences as set forth in seq id no: 2. Dna constructs, transgenic plants or cells comprising the ossro1c gene and the uses of the ossro1c gene in improving though resistance of a plant are also provided.
07/24/14
20140208455
 Chimeric promoters capable of mediating gene expression in plants upon pathogen infection and uses thereof patent thumbnailChimeric promoters capable of mediating gene expression in plants upon pathogen infection and uses thereof
Described are synthetic promoters capable of mediating gene expression in plants upon pathogen infection. Furthermore, recombinant genes and vectors comprising said chimeric promoters as well as host cells transformed with such chimeric promoters, recombinant genes, or vectors are provided.
07/24/14
20140208453
 Soybean plants having superior agronomic performance and methods for their production patent thumbnailSoybean plants having superior agronomic performance and methods for their production
This invention provides compositions including favorable alleles of marker loci associated with genetic elements contributing to superior agronomic performance. Also provided are markers for identifying favorable alleles of marker loci associated with genetic elements involved in superior agronomic performance, as well as methods employing the markers..
07/24/14
20140208449
 Genetics of gender discrimination in date palm patent thumbnailGenetics of gender discrimination in date palm
This invention relates to the genetics of gender discrimination in the dioecious date palm. Methods of the present invention involve analyzing dna or rna from a date palm plant, tissue, germplasm, or seed for the presence of (i) a nucleic acid sequence or genotype that identifies the sex of the plant, tissue, germplasm, or seed or (ii) a molecular marker in linkage disequilibrium with the nucleic acid sequence or genotype.
07/24/14
20140208443
 System and methodology for selectively controlling the transmission of content patent thumbnailSystem and methodology for selectively controlling the transmission of content
According to one aspect of the present invention, a system and methodology is provided which controls whether or not content is permitted to be transmitted from a source device depending upon the nature of the content and/or other factors more fully described herein. Source devices may include devices such as mobile phones, tablets, netbooks, laptops, desktop computers, and any other devices which are capable of transmitting content which is resident on such device.
07/24/14
20140208440
 Application usage in device identification program patent thumbnailApplication usage in device identification program
Embodiments of the invention are directed to systems, methods and computer program products for using a device identification program. In some embodiments, a system is configured to: receive device identification information from a mobile device, search a database of records based on the identification information, and in response to determining a match between information associated with a record in the database and the identification information, enable first access to an application initiated on the mobile device..
07/24/14
20140208433
 System and method for the secure unidirectional transfer of software and software updates patent thumbnailSystem and method for the secure unidirectional transfer of software and software updates
A system is disclosed that provides an authenticated payload, e.g., a software program or update, to a recipient device. A storage device stores a payload.
07/24/14
20140208429
 Method for evaluating system risk patent thumbnailMethod for evaluating system risk
A method for evaluating the vulnerability of a system having at least one portal is provided, wherein at least a portion of the method is implemented via a controller. The method includes examining the at least one portal to identify at least one accessible portal, performing a qualitative analysis responsive to the at least one accessible portal, generating a risk profile responsive to the performing a qualitative analysis and operating the controller to cause the controller to at least one of log the risk profile in a storage device, and display the risk profile via a display device..
07/24/14
20140208420
 System for remotely monitoring status information of devices connected to a network patent thumbnailSystem for remotely monitoring status information of devices connected to a network
A system for monitoring the status of one or more networks and/or of devices coupled to each of the one or more networks. Status monitoring applications are associated with the networks and/or devices.
07/24/14
20140208418
 Automatic protection of partial document content patent thumbnailAutomatic protection of partial document content
Protecting a fragment of a document includes automatically detecting the fragment without user intervention based on the content of the fragment and/or the context of the fragment within a set of documents, selectively encrypting the fragment to prevent unauthorized access, and providing an alternative view of the fragment that prevents viewing and access of content corresponding to the fragment unless a decryption password is provided. Automatically detecting the fragment may include detecting numbers and alphanumeric sequences of sufficient length that do not represent commonly known abbreviations, detecting generic terms, detecting proper names, detecting terms signifying a type of content, detecting mutual location of terms and sensitive content, and/or detecting user defined terms.
07/24/14
20140208416
Cross transport authentication
An authentication controller coupled to a first communication port of a portable media device is allowed to provide authentication on behalf of an accessory device coupled to a second communication port of the portable media device. In one embodiment, a cross transport connector includes a connector configured to couple with an accessory and a connector configured to couple with a portable media device such that the accessory can be coupled to the second communication port of the portable media device.
07/24/14
20140208413
System and method for an endpoint hardware assisted network firewall in a security environment
A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server.
07/24/14
20140208410
Simplified user registration
Methods, systems, and computer-readable media are provided. Some embodiments include receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device.
07/24/14
20140208408
Methods and apparatus to facilitate single sign-on services
Methods, articles of manufacture and apparatus are disclosed to facilitate single sign-on services. An example method includes monitoring web session activity for an indication of entry of first credentials, identifying an sso framework associated with the device in response to detecting a context event indicative of web session termination, querying the sso framework for second credentials associated with the web session, and configuring sso services on the device when the second credentials are absent from the sso framework..
07/24/14
20140208407
Single sign-on between device application and browser
An aspect provides a method, including: receiving user credentials at a client application via an input device of an information handling device; creating a token using the user credentials; launching a web browser after receiving input at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. Other aspects are described and claimed..
07/24/14
20140208405
Simplified and safe user authentication
Machines, systems and methods for authenticating against one or more access points, the method comprising: receiving data identifying an electronic device and destination information for forwarding a code to a user, in response to the user providing the destination information to a user interface prompt displayed on the electronic device when attempting to authenticate against an access point accessible via the electronic device; generating the code, in response to receiving the destination information and data identifying the electronic device; associating the code with the data identifying the electronic device; and forwarding the code in a message to a destination associated with the destination information, wherein the code is retrieved from the message when the message is received, receiving the code transmitted by way of the electronic device to an authentication server; and authenticating the user against the access point, in response to determining that the code matches related records.. .
07/24/14
20140208403
Method for identifying pulse optical signal and device thereof
The invention provides a method for identifying pulse optical signal, including: a. Receiving first trigger information; b.
07/24/14
20140208399
Method and system for accessing a computing resource
Access to a computing resource or service, to gain access to the computing resource or service is defined by access parameters contained in a certificate accessible by an access controller (which can also be referred to as a unit-of-use controller). Identification data associated with a user is provided by a computer-controlled device to the access controller, which retrieves the certificate related to the identification data.
07/24/14
20140208398
Resource-centric authorization schemes
A first request to change a permission of a first user for accessing a first resource is received via a service application programming interface (api) of an authorization server. In response to the first request, a first resource-based permission data structure associated with the first resource is accessed to identify an entry associated with the first user, wherein the first resource-based permission data structure has a plurality of entries corresponding to a plurality of users, respectively, each user being associated with one or more permissions for accessing the first resource.
07/24/14
20140208395
System and method for access of user accounts on remote servers
In certain embodiments, the system of the invention automatically replicates a user's personal computing environment and provides associated remote server access using authentication credentials and data files supplied by a local handheld device as coordinated by session level software common to the handheld device, the replicated system, the system on which the replication occurs, and the remote servers. The application enables a handheld computing device to transfer a user's various online account credentials to a user's other computing devices securely and automatically.
07/24/14
20140208394
Network user identification and authentication
A method of identifying and authenticating a network user includes receiving a first network layer packet from a first user entity. The first network layer packet may include first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet.
07/24/14
20140208392
Information providing apparatus, information providing method, and non-transitory computer readable medium
An information providing apparatus includes following components. A storing unit stores marker image identification information, an image feature of a marker placed area, related information, and disclosure limitation information indicating whether the related information is to be disclosed to specific users in an image information memory.
07/24/14
20140208391
System for multi-point publication syndication
Embodiments of methods, systems and storage media associated with publication of message content may be described. In embodiments, a content creator may provide content to a message management node.
07/24/14
20140208389
Enrollment of user in device identification program
Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to: receive device identification information from a mobile device, receive user information associated with a user, the user information enabling identification of the user, associate the device identification information with the user information, and create a record based on the device identification information and the user information..
07/24/14
20140208387
Device utilizing an optical signal to access an access point
Disclosed is a device that receives an optical signal having an authorization code that allows the device to utilize an access point to obtain access to the internet and other networks. The device may include: a modem; a light sensor; and a processor.
07/24/14
20140208382
User authentication based on network context
Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution.
07/24/14
20140208377
Method for processing non-real time service and broadcast receiver
A method of processing a non-real time service of a broadcast receiver includes receiving a signaling information table including additional information on contents configuring a non-real time service and a content identifier for each content, acquiring the additional information on contents and the content identifier for each content from the signaling information table, storing contents being downloaded through a flute or an internet in a storage medium, based upon the additional information on contents and the content identifier for each content, and displaying a list of recordings including the contents stored in the storage medium.. .
07/24/14
20140208370
Wireless terminal, wireless communication system, and wireless communication control device
A wireless terminal communicates with a wireless communication apparatus including one or more wireless access points, and is used in a facility including a plurality of seats. The wireless terminal includes a seat position identifying unit, a distance determination unit, and a processing setting unit.
07/24/14
20140208364
Information descriptor and extended information descriptor data structures for digital television signals
According to an aspect, there is provided a digital television (dtv) data stream including program and system information protocol (psip) data associated with content of the dtv data stream, the psip data including a virtual channel table (vct) and an event information table (eit), the eit comprising: a source identification field identifying a source of an associated event in a dtv data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a dtv data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories.. .
07/24/14
20140208359
Information descriptor and extended information descriptor data structures for digital television signals
According to an aspect, there is provided a digital television (dtv) data stream including program and system information protocol (psip) data associated with content of the dtv data stream, the psip data including a virtual channel table (vct) and an event information table (eit), the eit comprising: a source identification field identifying a source of an associated event in a dtv data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a dtv data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories.. .
07/24/14
20140208341
Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs
Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand (vod) programs are disclosed. An example method disclosed herein comprises obtaining subscriber metering data from a site metering device monitoring presentation of vod content at a first subscriber site, obtaining server metering data from a vod server, the server metering data including identification information for a plurality of subscriber sites to identify particular vod content provided uniquely to each of the subscriber sites, the identification information manipulated to preserve anonymity of the plurality of subscriber sites, manipulating at least a portion of the subscriber metering data to determine a first manipulated identifier to identify the first subscriber site, and using the first manipulated identifier to cross-reference the manipulated identification information included in the server metering data to merge the subscriber metering data and the portion of the server metering data uniquely associated with the first subscriber site..
07/24/14
20140208340
Dynamic content rating management across a variety of television input sources
Generally, this disclosure describes a system and method for dynamic content management across a variety of television input sources. The system may include an audience detection module configured to identify a viewer in a viewing area of a display configured to display received media content; a media scanning module configured to determine a media content rating associated with a portion of a media content received from at least one of a local content source and a remote content source; and a media player configured to adapt display of the portion of the received media content based on a policy when the associated media content rating corresponds to inappropriate content for the identified viewer..
07/24/14
20140208327
Method for simultaneous scheduling of processes and offloading computation on many-core coprocessors
A method is disclosed to manage a multi-processor system with one or more manycore devices, by managing real-time bag-of-tasks applications for a cluster, wherein each task runs on a single server node, and uses the offload programming model, and wherein each task has a deadline and three specific resource requirements: total processing time, a certain number of manycore devices and peak memory on each device; when a new task arrives, querying each node scheduler to determine which node can best accept the task and each node scheduler responds with an estimated completion time and a confidence level, wherein the node schedulers use an urgency-based heuristic to schedule each task and its offloads; responding to an accept/reject query phase, wherein the cluster scheduler send the task requirements to each node and queries if the node can accept the task with an estimated completion time and confidence level; and scheduling tasks and offloads using a aging and urgency-based heuristic, wherein the aging guarantees fairness, and the urgency prioritizes tasks and offloads so that maximal deadlines are met.. .
07/24/14
20140208325
Systems and methods for managing tasks
Systems and methods for creating and sharing tasks over one or more networks are disclosed. In one embodiment, a system comprises a message retrieval module configured to retrieve electronic messages and parse them into a plurality of tasks.
07/24/14
20140208324
Rate of operation progress reporting
According to one aspect of the present disclosure, a method and technique for rate of operation progress reporting is disclosed. The method includes: responsive to completion by an application of one or more batch operations, storing an operation count corresponding to each completed batch operation; and, responsive to being polled by a monitoring module: identifying a time reporting window for the batch operations; and reporting a rate of progress meter value for the batch operations to the monitoring module based on the operation counts and the time reporting window..
07/24/14
20140208323
Preventing unsafe sharing through confinement of mutable captured variables
The disclosed embodiments provide a system that facilitates the development and execution of a software program. During operation, the system provides a mechanism for restricting a variable to a runtime context in the software program.
07/24/14
20140208317
Multi-tenant system and control method of multi-tenant system
A management device allocates a first identifier that identifies, from among tenants included in a multi-tenant system, a tenant that uses virtual machines running on the multi-tenant system. The management device performs the following process, for each terminating device, from among tenants in the multi-tenant system, on virtual machines that are running on a second network in which terminating devices are installed.
07/24/14
20140208309
Method, apparatus, and communication system for implementing internet application
Methods, apparatus, and communication systems for implementing an internet application are disclosed. A number n of code files of a processing logic used for implementing a first internet application can be loaded in a memory and can be compiled into a runtime library.
07/24/14
20140208308
Computer system and method for resolving dependencies in a computer system
A computer system and a method are disclosed for use in automatically deploying an application program to execute with one or more library resources. The computer system includes a deployment unit which deploys the application program into a runtime execution environment.
07/24/14
20140208305
Automatically identifying criticality of software fixes specific to a client deployment and usage of software product
A mechanism is provided in a data processing system for identifying criticality of a software fix. The mechanism obtains a criticality description associated with a software fix of a software product deployed on the data processing system.
07/24/14
20140208304
Methods and systems for dynamic upgrade of an access manager
Methods and systems are described for upgrading an access manager framework. In response to an upgrade request from a client, current and new versions of the access manager framework are identified.
07/24/14
20140208303
Matching database schema with application code using dependency management
A package manager receives a request to install a version of an application on a host server, the version of the application having an associated database script provided by database scripts package. The package manager determines a currently installed schema in a management database associated with the host server and compares the database script associated with the application to the currently installed schema in the management database.
07/24/14
20140208302
Systems and methods for supporting multiple operating system versions
In accordance with embodiments of the present disclosure, a method may include querying, by an application program executing on a first information handling system, a second information handling system remotely coupled to the first information handling system for data comprising identities of versions or patches of an operating system certified by a provider of the operating system. The method may also include receiving the data in response to the query.
07/24/14
20140208298
Program subset execution and debug
In response to identification of an error in operation of a system, a debugging module determines where to set a debug entry point for a program subset debug session. An initial file state is captured for at least one file accessed by the system in response to initiation of a subsequent execution of the system.
07/24/14
20140208295
Method and system for creating and managing a dynamic route topography for service oriented software environments
A system, method, and computer-readable medium are provided for managing a route topography in a software environment. The system includes a dashboard user interface for allowing a user to manage the services that are part of a software application.
07/24/14
20140208292
Generating application model build artifacts
An application model build processor generates one or more application model build artifacts based on an application model. In one example, a method includes receiving inputs identifying application model subsets and audiences, and associating application model subsets with the audiences.
07/24/14
20140208290
Application source code scanning for database migration
Systems, methods, and other embodiments associated with application source code scanning for database migration are described. In one embodiment, a method includes identifying a subset of application source code files that are likely to require modification to access a destination database.
07/24/14
20140208283
Dummy shoulder structure for line stress reduction
Semiconductor integrated circuit line structures for improving a process window in the vicinity of dense-to-isolated pattern transition areas and a technique to implement the line structures in the layout process are described in this disclosure. The disclosed structure includes a semiconductor substrate, and a material layer above the substrate.
07/24/14
20140208282
Conflict detection for self-aligned multiple patterning compliance
Among other things, one or more techniques and systems for performing design layout are provided. An initial design layout is associated with an electrical component, such as a standard cell.
07/24/14
20140208269
Mobile terminal and control method thereof
A mobile terminal including a wireless communication unit configured to wirelessly communicate with at least one other terminal; a display unit; and a controller to receive a lock screen input command, display a lock screen on the display unit upon receiving the lock screen input command, receive a predetermined touch input on the lock screen, display a home screen in an overlapping manner with the lock screen on the display unit upon receiving the predetermined touch input on the lock screen, identify an icon displayed at a position on the home screen corresponding to a position of the predetermined touch input among a plurality of icons included in the home screen, and release the lock screen and execute an application corresponding to the identified icon when the predetermined touch input is released.. .
07/24/14
20140208266
Managing applications on a computing device
Disclosed are methods, apparatus, systems, and computer readable storage media for managing applications on a computing device. A computing device may receive allowed application data indicating applications that are launchable by a base application.
07/24/14
20140208263
System and method for dynamically displaying characters over a screen of a computerized mobile device
A method of changing a display of an original image on a screen of a computerized mobile device is provided herein. The method comprises the following steps: (i) dynamically identifying conditions related to display changes.
07/24/14
20140208256
Turning pages of an electronic document by means of a single snap gesture
A system and associated method for contextualizing a page turn in an electronic book pursuant to a snap gesture made by a user on a touch screen of a tablet device, as performed by an e-reader program running in the tablet device. The snap gesture is quantified with data elements including linger time and direction of the snap gesture.
07/24/14
20140208240
Updating assets rendered in a virtual world environment based on detected user interactions in another world
A virtual world controller receives an identifier of a detected interaction by a user within another world, separate from a particular virtual world environment accessible by the user, from a device that detects and reports user interactions within the other world. The virtual world controller identifies at least one particular trigger tag name assigned to the identifier of the detected interaction from among a plurality of separate detectable user interactions in a trigger tag database.
07/24/14
20140208237
Sharing functionality
A user interface comprises a controller which is configured to display image data, receive input indicating a selection area comprising content corresponding to at least a portion of said image data, receive input indicating a movement of the selection area, identify a recipient and send the content to the recipient in response thereto.. .
07/24/14
20140208236
Dynamic access to external media content based on speaker content
An interactive conference based is supplemented based on terminology content. Terminology content from a plurality of interactive conference participants is monitored.
07/24/14
20140208235
Dynamic information management system and method for content delivery and sharing in content-, metadata- & viewer-based, live social networking among users concurrently engaged in the same and/or similar content
Disclosed are tools, methods, and systems for establishing generally live, content-based social networks, and for concurrently sharing content and content-relevant information within a social network. A service registers viewers and/or n-users, and provides tools that enable a viewer to identify n-users concurrently viewing the same or similar content, or having an interest in the same or similar content.
07/24/14
20140208227
Aggregate and hierarchical display of grouped items spanning multiple storage locations
Techniques for the aggregate and hierarchical display of grouped items spanning multiple storage locations are described. Some techniques may aggregate items in response to user input identifying a scope for item retrieval.
07/24/14
20140208217
Interface for managing splittable timestamps across event records
Embodiments are directed towards a graphical user interface to identify locations within event records with splittable timestamp information. A display of event records is provided using any of a variety of formats.
07/24/14
20140208216
Activation of dormant features in native applications
A native application can be deployed that obtains configuration information for the native application at run-time. Digital marketing users or other marketing users can view or control the behavior of the native application by displaying or setting the configuration information of the native application.
07/24/14
20140208215
Methods and systems for providing filtered report visualizations
Methods and systems are provided for providing report visualizations in an on-demand system providing instances of a virtual application over a network. One exemplary method involves identifying a filter associated with a user of a client device on the network and automatically providing one or more filtered report visualizations within an instance of the virtual application on the client device in response to identifying the filter associated with the user.
07/24/14
20140208214
Systems and methods for monitoring, visualizing, and managing physical devices and physical device locations
In accordance with the present disclosure, systems and methods for monitoring and managing physical devices and physical device locations in a network are described herein. An example method may include generating at a processor of an information handling system a first graphical representation of a first network structure.
07/24/14
20140208213
Synchronization of contextual templates in a customized web conference presentation
In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a conference presentation. The computer system receives a request to access presentation templates based on parameters of a presenter, wherein the presentation templates including parameters identifying one or more of template texture, template font, template name of the presenter or template photo of the presenter of the conference presentation.
07/24/14
20140208208
Video navigation through object location
The present invention relates to a method for navigating in a sequence of images. An image is displayed on a screen.
07/24/14
20140208202
System for conversion of website content
A system and method for converting website content is presented. Design elements in a graphical representation of a web page are identified.
07/24/14
20140208200
Method and apparatus for intelligent capture of document object model events
A monitoring system intelligently captures document object model (dom) events. The dom events may provide state information that may not usually be captured during a web session.
07/24/14
20140208198
Representation of an element in a page via an identifier
Embodiments are directed to computing, by an apparatus comprising a processing device, an identifier (id) for an element in a page using an algorithm responsive to encountering the element a first time, causing, by the apparatus, the id to be stored in a storage device, encountering, by the apparatus, the element a second time, determining, by the apparatus, that the element is encountered the second time, and responsive to determining that the element is encountered the second time, representing, by the apparatus, the element by the id at the time of the second encounter by retrieving the id from the storage device.. .
07/24/14
20140208197
Method for conversion of website content
A system and method for converting website content is presented. Design elements in a graphical representation of a web page are identified.
07/24/14
20140208195
Representation of an element in a page via an identifier
Embodiments are directed to computing, by an apparatus comprising a processing device, an identifier (id) for an element in a page using an algorithm responsive to encountering the element a first time, causing, by the apparatus, the id to be stored in a storage device, encountering, by the apparatus, the element a second time, determining, by the apparatus, that the element is encountered the second time, and responsive to determining that the element is encountered the second time, representing, by the apparatus, the element by the id at the time of the second encounter by retrieving the id from the storage device.. .
07/24/14
20140208185
Rate adaptive irregular qc-ldpc codes from pairwise balanced designs for ultra-high-speed optical transports
Systems and methods for data transport include encoding one or more streams of input data using one or more quasi-cyclic low density parity check (qc-ldpc) encoders; controlling irregularity of the qc-ldpc encoded data while preserving the quasi-cyclic nature of the ldpc encoded data and eliminating the error floor phenomenon. A parity-check matrix may be partially reconfigured to adapt one or more code rates; and one or more signals are generated using a mapper, wherein the output of the mapper is modulated onto a transmission medium.
07/24/14
20140208172
Monitoring of computer events
A data processing system (1) is programmed with an interface (2) for capturing events which arise, and a process engine (3) for automatically monitoring captured events to identify completion of steps, each comprising a plurality of events linked by dependency relationships; and to identify completion of processes, each comprising a plurality of steps linked by dependency relationships. Software functions (5) execute in response to output of the process engine (3).
07/24/14
20140208167
Method and system for single point of failure analysis and remediation
Embodiments of the present invention disclose a method and system for single point of failure analysis (spof) and remediation. According to one embodiment, a spof analysis is performed based on component configuration information associated with a plurality of system components.
07/24/14
20140208155
Rebuilding drive data
A method that includes identifying an inaccessible portion of a first disk drive. The method also includes regenerating data corresponding to the inaccessible portion of the first disk drive and storing the regenerated data to a second disk drive.
07/24/14
20140208123
Privileged cryptographic services in a virtualized environment
A privileged cryptographic service is described, such as a service running in system management mode (smm). The privileged service is operable to store and manage cryptographic keys and/or other security resources in a multitenant remote program execution environment.
07/24/14
20140208122
Secure content distribution
In an example, a method of securing content is described. The method may include instantiating a content server on a client device.
07/24/14
20140208119
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
07/24/14
20140208118
System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
Disclosed is a method and system for transmitting data. The system includes at least one first stationary and/or mobile communication terminal at least one further second communication terminal and a switching unit reachable by all communication terminals via a data network.
07/24/14
20140208109
Method and system for protecting memory information in a platform
A method and system to provide an effective, scalable and yet low-cost solution for confidentiality, integrity and replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via xts-tweak mode of encryption where the tweak is derived based on “global and local counters”.
07/24/14
20140208107
Systems and methods for implementing application control security
Systems and methods for implementing application control security are disclosed. In one embodiment, a system includes a first device, a decrypted white-list, and an executable program.
07/24/14
20140208104
Id-based encryption and signature method and terminal
Provided are an identity (id)-based encryption and signature method and a terminal that use an id of a transmitter or a receiver as a part of the filename or the extension of a file transmitted to the receiver by the transmitter. Accordingly, it is possible to enable a user to visually recognize that the file has been provided with security.
07/24/14
20140208102
Method of protecting digital information
The technical result is widening the field of use, improved reliability and security of the digital and analog information.. .
07/24/14
20140208101
Confidential computation system, confidential computation method, and confidential computation program
A client executes processing for data encryption by adding an error vector to plaintext, the error vector being not larger than a predetermined criterion and processing for sending limitation information to a server, the limitation information being formed from a sublattice basis of a lattice generated by a secret key. The server executes processing for receiving the limitation information and storing it in a storage device and in the homomorphic computation processing on the encrypted data received from the client, processing for, when a bit length of ciphertext which is a result of the homomorphic computation processing is equal to or larger than a predetermined value, reducing the bit length of the ciphertext to a value not larger than a predetermined threshold by translating a vector of the ciphertext to an inside of a region formed from the sublattice basis corresponding to the stored limitation information..
07/24/14
20140208090
Systems and methods for command-based entry into basic input/output system setup from operating system
In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (bios) setup program for configuring a bios, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing bios credentials to the bios based on the user-provided credentials.
07/24/14
20140208085
Instruction and logic to efficiently monitor loop trip count
Logic and instruction to efficiently monitor loop trip count. Loop trip count information of a loop may be stored in a dedicated hardware buffer.
07/24/14
20140208081
Flowchart compiler for a compound complex instruction set computer (ccisc) processor architecture
Systems and methods herein provide for a compiler to create executable programs for a compound instruction based processor directly from flowcharts. In one embodiment, a system receives one or more flowchart diagram files that represent a computer program for a compound cisc (ccisc) processor.
07/24/14
20140208063
Polymorph table with shared columns
For managing a database in a data-processing system, a polymorph table and a mapping structure are provided. The polymorph table includes a discrimination column and a total number of columns of each type equal to a maximum of the virtual columns of the type.
07/24/14
20140208059
Highly configurable memory architecture for partitioned global address space memory systems
A system and method for identifying from an address an appropriate target node and a location in that node that holds desired data related to that address is provided. The system and method includes a logical address generator that generates a logical address.
07/24/14
20140208050
Metadata storage in unused portions of a virtual disk file
Embodiments disclosed herein provide systems and method for storing metadata to unused portions of a virtual disk file. In a particular embodiment, a method provides selecting a virtual disk file stored on a data storage volume and identifying unused portions of the virtual disk file.
07/24/14
20140208039
Methods and apparatus to reduce cache pollution casued by data prefetching
Efficient techniques are described for reducing cache pollution by use of a prefetch logic that recognizes exits from software loops or function returns to cancel any pending prefetch request operations. The prefetch logic includes a loop data address monitor to determine a data access stride based on repeated execution of a memory access instruction in a program loop.
07/24/14
20140208037
Expiring virtual content from a chache in a virtual universe
Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe..
07/24/14
20140208034
System and method for efficient paravirtualized os process switching
The exemplary embodiments described herein relate to systems and methods for improved process switching of a paravirtualized guest with a software-based memory management unit (“mmu”). One embodiment relates to a non-transitory computer readable storage medium including a set of instructions executable by a processor, the set of instructions, when executed, resulting in a performance of the following: create a plurality of new processes for each of a plurality of virtual environments, each of the virtual environments assigned one of a plurality of address space identifiers (“asids”) stored in a cache memory, perform a process switch to one of the virtual environments thereby designating the one of the virtual environments as the active virtual environment, determine whether the active virtual environment has exhausted each of the asids, and flush a cache memory when it is determined that the active virtual environment has exhausted each of the asids..
07/24/14
20140208032
Use of flash cache to improve tiered migration performance
For data processing in a computing storage environment by a processor device, the computing storage environment incorporating at least high-speed and lower-speed caches, and tiered levels of storage, and at a time in which at least one data segment is to be migrated from one level to another level of the tiered levels of storage, a data migration mechanism is initiated by copying data resident in the lower-speed cache corresponding to the at least one data segment to be migrated to a target on the another level, and reading remaining data, not previously copied from the lower-speed cache, from a source on the one level, and writing the remaining data to the target.. .
07/24/14
20140208030
Information processing apparatus and control method of information processing apparatus
An information processing apparatus including a plurality of mutually connected system boards, wherein each of the system boards includes: a plurality of processors; and a plurality of memories each of which stores data and directory information corresponding to the data, and corresponds to any one of the processors, and wherein each of the plurality of processors, upon receiving a read request for data stored in a memory corresponding to the own processor from another processor, performs an exclusive logical sum operation on identification information included in the read request and identifying the another processor and a check bit included in the directory information and identifying a processor which holds target data of the read request, increments a count value included in the directory information and indicating the number of processors which hold the target data, and sets presence information included in the directory information and indicating a system board which includes the another processor.. .
07/24/14
20140208029
Use of flash cache to improve tiered migration performance
For data processing in a computing storage environment by a processor device, the computing storage environment incorporating at least high-speed and lower-speed caches, and tiered levels of storage, and at a time in which at least one data segment is to be migrated from one level to another level of the tiered levels of storage, a data migration mechanism is initiated by copying data resident in the lower-speed cache corresponding to the at least one data segment to be migrated to a target on the another level, and reading remaining data, not previously copied from the lower-speed cache, from a source on the one level, and writing the remaining data to the target.. .
07/24/14
20140208027
Configurable cache and method to configure same
A method includes receiving an address at a tag state array of a cache, wherein the cache is configurable to have a first size and a second size that is smaller than the first size. The method further includes identifying a first portion of the address as a set index, wherein the first portion has a same number of bits when the cache has the first size as when the cache has the second size.
07/24/14
20140208026
Initialization of a storage device
A storage device including a first storage unit including a first media of a first type, a second storage unit including a second media of a second type, and a controller. The controller initializes the storage device for a host by receiving an initialization query from the host, identifying, to the host, that the storage device comprises the second storage unit but not the first storage unit, receiving an indication from the host indicating that the host is compatible with the first storage unit, and identifying, to the host, that the storage device comprises the first storage unit and the second storage unit.
07/24/14
20140208019
Caching method and caching system using dual disks
A caching method and a caching system using dual disks, adapted to an electronic apparatus having a first storage unit and a second storage unit, are provided, in which an access speed of the second storage unit is higher than that of the first storage unit. In the method, a data access to the first storage unit is monitored, a data category of the data in an access address of the data access is identified and whether the data category belongs to a cache category is determined.
07/24/14
20140208016
System and method for filtering addresses
A method includes determining addresses, determining masks, and storing the masks in a ternary content-addressable-memory for matching a candidate address to the masks to determine matches to the addresses. The addresses include an address width and positions, the address width equal to the number of positions.


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.5409

4245

73 - - 104