Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38results about "Program control using record carriers with instructions" patented technology

Apparatus and method for developing secure software

A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
Owner:MICRO FOCUS LLC

Context-aware auxiliary display platform and applications

Described is a mechanism by which application programs (or plug-ins) and an auxiliary service adjust the output and / or data available for output on an auxiliary device based on changes detected in the current context of the auxiliary display. Context sensors detect and report changes in context, whereby some action is taken with respect to what information is displayed or can be displayed on the auxiliary display device. Examples of context data that can change include the physical location of the display, detected movement or motion data, presence of a particular user or others, power state, network connectivity status, privacy status and so forth. The auxiliary device can have context as to its position relative to the main display. Information sensitivity levels may be used to specify whether an application program's data can be displayed, based on the perceived sensitivity of the information and the user's current context.
Owner:MICROSOFT TECH LICENSING LLC

Comment information issuing method and device

The embodiment of the invention discloses a comment information issuing method and device. The comment information issuing method is applied to a multimedia file playing terminal. The comment information issuing method comprises the following steps that the comment triggering operation is detected in real time in the multimedia file playing process; after the comment triggering operation is detected, the feature of the comment triggering operation is determined; a comment entry corresponding to the feature of the comment triggering operation is determined in a preset entry library according to a preset corresponding relation; comment information to be issued is generated according to the determined comment entry; the comment information to be issued is issued. By means of the technical scheme, better interaction experience and watching experience can be brought to a user.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Method and system for limiting software updates

A method of detecting pirated software includes receiving a request for a software update by a client computer and providing to the client computer a test to be performed. The test is performed on the client computer against the client software application. The client computer may be denied a software update as a result of the test finding an illegitimate copy of the client software. The invention may be practiced in a network environment where a server transfers a test program for a client to execute upon request of a software update. The test performs an integrity check and denies the request for a software update if the client software is found to be illegitimate.
Owner:MICROSOFT TECH LICENSING LLC

Method and system for limiting software updates

A method of detecting pirated software includes receiving a request for a software update by a client computer and providing to the client computer a test to be performed. The test is performed on the client computer against the client software application. The client computer may be denied a software update as a result of the test finding an illegitimate copy of the client software. The invention may be practiced in a network environment where a server transfers a test program for a client to execute upon request of a software update. The test performs an integrity check and denies the request for a software update if the client software is found to be illegitimate.
Owner:MICROSOFT TECH LICENSING LLC

Actuation of projector by system stored in mobile memory

A projector including a computer has: an internal storage device that stores therein a basic system, which is executed first by the computer on actuation of the projector, and a first control system that is activated through processing of the basic system to control operations of the projector; and a memory controller that reads information stored in a mobile memory. On actuation of the projector, the basic system reads information stored in a specific area of the mobile memory attached to the memory controller prior to activation of the first control system, identifies whether or not the information in the specific area is a specific piece of information, and, when the information in the specific area is identified as the specific piece of information, activates a second control system stored in the mobile memory, in place of the first control system. This arrangement enables the projector to utilize a new operating system.
Owner:SEIKO EPSON CORP

System and method for generating embedded resource updates for output device

A system and related techniques generate an update to control programming, such as firmware, to embed in an electronic document and transmit to a printer, facsimile or other output device. Compatible printers or other output devices according to embodiments of the invention may contain an intermediate language interpreter which receives, interprets and executes the embedded update in the electronic document. That update may include for example an update to the printer's firmware, downloaded forms, fonts or other updates or enhancements which may for instance stored into EPROM or other memory in the output device. Because the resource update is encapsulated in an intermediate language object which may be universally interpreted by compatible printers, facsimile machines and other devices, updates may be delivered with a need to generate specialized code or follow specialized procedures for specific manufacturer's products.
Owner:MICROSOFT TECH LICENSING LLC

Media foundation media processor

A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology. The system includes a control layer including a topology generating element to generate a topology describing a set of input multimedia streams, one or more sources for the input multimedia streams, a sequence of operations to perform on the multimedia data, and a set of output multimedia streams, and a media processor to govern the passing of the multimedia data as described in the topology and govern the performance of the sequence of multimedia operations on the multimedia data to create the set of output multimedia streams. The core layer includes the input media streams, the sources for the input multimedia streams, one or more transforms to operate on the multimedia data, stream sinks, and media sinks to provide the set of output multimedia streams.
Owner:MICROSOFT TECH LICENSING LLC

Host computer system emulating target system legacy software and providing for incorporating more powerful application program elements into the flow of the legacy software

As manufacturers of very fast and powerful commodity processors continue to improve the capabilities of their products, it has become practical to emulate the proprietary hardware and operating systems of powerful older computers on platforms built using commodity processors such that the manufacturers of the older computers can provide new systems which allow their customers to continue to use their highly-regarded proprietary legacy software on state-of-the-art new computer systems by emulating the older computer in software that runs on the new systems. In an example of the subject invention, a 64-bit Cobol Virtual Machine instruction provides the capability of adding to or improving the performance of legacy 36-bit Cobol code. Legacy Cobol instructions can be selectively diverted, in the host CPU, to a 64 bit Virtual Machine Implementation. The output legacy and new Cobol code is compiled in a dedicated implementation of the Cobol compiler, and the output of the special purpose compiler is emulated in a special purpose software emulator, separate from the main software emulator that handles the normal 36-bit stream of legacy code.
Owner:BULL HN INFORMATION SYST INC

Media foundation media processor

A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology. The system includes a control layer including a topology generating element to generate a topology describing a set of input multimedia streams, one or more sources for the input multimedia streams, a sequence of operations to perform on the multimedia data, and a set of output multimedia streams, and a media processor to govern the passing of the multimedia data as described in the topology and govern the performance of the sequence of multimedia operations on the multimedia data to create the set of output multimedia streams. The core layer includes the input media streams, the sources for the input multimedia streams, one or more transforms to operate on the multimedia data, stream sinks, and media sinks to provide the set of output multimedia streams.
Owner:MICROSOFT TECH LICENSING LLC

Programmable logic controller (PLC) with an additional memory

It is a programmable logic controller with append memory which is to use data bus to connect a append memory and to store a direction order in the memory of the programmable logic controller body. When it reads this section direction order, it will self direct to the address of the append memory and execute its inner stored append program codes. In the situation without changing its inner memory, it can effectively provide a order expansion of the programmable logic controller.
Owner:DELTA ELECTRONICS INC

System and method for generating embedded resource updates for output device

The present invention provides a system and related techniques generate an update to control programming, such as firmware, to embed in an electronic document and transmit to a printer, facsimile or other output device. Compatible printers or other output devices according to embodiments of the invention may contain an intermediate language interpreter which receives, interprets and executes the embedded update in the electronic document. That update may include for example an update to the printer's firmware, downloaded forms, fonts or other updates or enhancements which may for instance stored into EPROM or other memory in the output device. Because the resource update is encapsulated in an intermediate language object which may be universally interpreted by compatible printers, facsimile machines and other devices, updates may be delivered with a need to generate specialized code or follow specialized procedures for specific manufacturer's products.
Owner:MICROSOFT TECH LICENSING LLC

Method and system for controlling encoded image production using image signatures

An automated method for authorizing and controlling the production of optically encoded images is provided. The method comprises receiving from a user data processor a request for authorization to produce an encoded image. The authorization request includes user-supplied data comprising at least one authentication image file. The method further comprises determining whether the user is authorized to produce an encoded image using the user-supplied data. Responsive to a determination that the user is authorized to produce an encoded image using the user-supplied data, an authentication image signature is generated from the at least one authentication image file using an image signature algorithm and a positive authorization response is returned to the user data processor. The positive authorization response includes the authentication image signature.
Owner:GROPHIC SECURITY SYST CORP

Sequencing frequency divider

The invention provides a programmed frequency division apparatus comprising an n digit adder and an n digit type D trigger for switching an input clock into a target clock, and the input clock frequency is the m to the power of 2 times of the destination clock frequency, the adder produces a first output signal based on an adjustment parameter and a feedback signal. The type D trigger is connected with the adder to form a ring form loop for receiving a first output signal and the input clock and producing a second output signal.
Owner:ELAN MICROELECTRONICS CORPORATION

Fusion mapping method of common information model and IEC61850 model

The invention discloses a fusion mapping method of a common information model and an IEC61850 model, and fusion mapping of the common information model and the IEC61850 model is realized by using a rule reasoning method and combining rule description language. According to the fusion mapping method, model mapping is performed on the common information model and the IEC61850 model by using the rule reasoning technique, so that interoperation of the common information model and the IEC61850 model is realized, model fusion of a distribution master station and a transformer substation is realized, the workload of interaction of the common information model and the IEC61850 model is reduced and the work management efficiency of the distribution master station and the transformer substation is improved.
Owner:STATE GRID CORP OF CHINA +2

Control system for calling applications by one-dimensional operation and method for realizing same

The invention refers to a method and the system for calling the application procedure through one dimension operation. The system comprises a hardware one dimension controller one keyboard and the circuit for connecting the controller and the keyboard, the action signal of the controller is transmitted to keyboard driving procedure through I / O circuit. The driving procedure converts the received signal into correspondent window procedure, the keyboard driving procedure judges if the response window of the controller software has message type, when it exists, all the messages are sent to the control procedure which can identify the message and transmit then them to the window procedure, when it doesn't exist, the selected message is sent to the control procedure, the control procedure starts the software response window, the forwards and backwards message are transmitted to the operation system function, the function changes the system state.
Owner:LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products