Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1375 results about "Error message" patented technology

An error message is information displayed when an unexpected condition occurs, usually on a computer or other device. On modern operating systems with graphical, error messages are often displayed using dialog boxes. Error messages are used when user intervention is required, to indicate that a desired operation has failed, or to relay important warnings (such as warning a computer user that they are almost out of hard disk space). Error messages are seen widely throughout computing, and are part of every operating system or computer hardware device. Proper design of error messages is an important topic in usability and other fields of human–computer interaction.

Web server apparatus and method for virus checking

A web server computer system includes a virus checker and mechanisms for checking e-mails and their attachments, downloaded files, and web sites for possible viruses. When an e-mail message contains a detected virus, the message is discarded, and both the sender and recipient are informed via e-mail that the message contained a virus. When an e-mail attachment contains a detected virus, the attachment is deleted, and the e-mail message without the attachment is sent to the web client, along with a message explaining that the e-mail message had an attachment that was automatically deleted because it had a virus. When a downloaded file contains a virus, the downloaded file is deleted, and an error message is sent to the web client to inform the web client that the requested file had a virus. When a requested web site (i.e., Uniform Resource Locator (or URL)) has been labeled as a source for a known virus, a message is sent to the web client stating that a virus may have been downloaded from that URL. In addition, if the requested URL has not been labeled as a source for a known virus, but it contains links that have been so labeled, the web page is processed before being sent to the user to identify those potentially dangerous links. In this manner a web server can perform virus checking of different types of information real-time as the information is requested by a web client. In addition, a web client may also request that the server perform virus checking on a particular drive on the web client. If this case, the web server may receive information from the web client drive, scan the information for viruses, and inform the web client whether any viruses were found. In the alternative, the web server may download a client virus checker to the web client and cause the client virus checker to be run on the web client. The preferred embodiments thus allow a virus checker on a web server to dynamically scan incoming data, and to scan web clients coupled to the web server, thereby eliminating the need for virus checking software to be installed on each web client.
Owner:FINJAN BLUE INC

Identification system and method for medication management

An identification system and method for medication management comprises a controller, a drug library accessible by the controller, the drug library containing drug library profiles including a data set of drug information, and an identification module configured to read patient identification information from machine-readable identification devices worn by patients and to read drug information from machine-readable identification devices affixed to drugs or containers of drugs. The controller compares the read information to each other and to the drug library profile and provides alerts or error signals in the event of an inconsistency. In one case, identification devices are read by an optical reader fixedly mounted to the identification module. In another case, identification devices are read by an optical reader that is hand-held and mobile and can be moved to the location of the identification device. The hand-held reader communicates with the identification module by wired or wireless means. In another case, a third reader that is non-optical and wireless is fixedly mounted to the identification module. The controller is also configured to provide alerts or error messages in the event that there is an inconsistency between the drug information on the drug or drug container when compared to the drug library profile associated with the controller.
Owner:CAREFUSION 303 INC

Identification system and method for medication management

An identification system and method for medication management comprises a controller, a drug library accessible by the controller, the drug library containing drug library profiles including a data set of drug information, and an identification module configured to read patient identification information from machine-readable identification devices worn by patients and to read drug information from machine-readable identification devices affixed to drugs or containers of drugs. The controller compares the read information to each other and to the drug library profile and provides alerts or error signals in the event of an inconsistency. In one case, identification devices are read by an optical reader fixedly mounted to the identification module. In another case, identification devices are read by an optical reader that is hand-held and mobile and can be moved to the location of the identification device. The hand-held reader communicates with the identification module by wired or wireless means. In another case, a third reader that is non-optical and wireless is fixedly mounted to the identification module. The controller is also configured to provide alerts or error messages in the event that there is an inconsistency between the drug information on the drug or drug container when compared to the drug library profile associated with the controller.
Owner:CAREFUSION 303 INC

Method and apparatus for automatic downloading of URLs and internet addresses

A bookmark transfer mechanism allows a user to transfer bookmark information from a primary computer to an alternate computer to customize a bookmarks menu on a web browser displayed on the alternate computer. The alternate computer prompts the user for a base address which is used by the web browser on the alternate computer to locate the primary computer where bookmark information is stored. The base address should correspond to a primary computer that has been configured for automatic download of bookmark information. Once the primary computer is located, the alternate computer transfers the base address and prompts the user for security information. The alternate computer then delivers the security information to the primary computer. The primary computer then authenticates the security information. If the security information is not valid, the primary computer delivers an error message to the alternate computer indicating that access to the primary computer has been denied. If the security information is valid, the primary computer transfers the bookmark information to the alternate computer. If necessary, the alternate computer translates the received bookmark information to the proper web browser format and updates the bookmarks menu on the web browser to include the transferred bookmark information. The bookmark information may be either temporarily or permanently incorporated into the web browser.
Owner:IBM CORP

Method and apparatus for S.I.P./H.323 interworking

An interworking function (IWF) for a first and second protocol based network, for example, an H.323 protocol based network and an SIP protocol based network comprises an interworking gateway server including a state machine for defining each call processing state and a translation table for use in translating addresses formatted in each protocol. A method of interworking for use in interworking between said first protocol based network and said second protocol based network comprises the steps of receiving at said interworking gateway server serving said first and second protocol based networks a request from an endpoint in the first or second protocol based networks, establishing a state machine in memory whereby, for each state of said state machine, a message associated with that state is categorized as one of a triggering message, a non-triggering message and an error message, establishing a translation table in said memory whereby an address formatted in said first protocol has a one-for-one correspondence with an address formatted in said second protocol, processing said request in accordance with said translation table and said state machine and permitting communication between said first and second endpoints utilizing a realtime transport protocol. In the event media is terminated at said interworking gateway server, the interworking gateway server, in one embodiment, comprises a media switching fabric for switching media terminated at the gateway to an addressed endpoint capable of receiving it.
Owner:AT&T INTPROP II L P

Method and apparatus for verifying the contents of a global configuration file

A method and apparatus are provided for determining the validity of a global configuration file. In order to verify the global configuration file, the configuration file is first “flattened.” To flatten the configuration file, the rules in the first block of the configuration file are identified. A settings file is then created with the rules set as true. The normal configuration process is then performed on the configuration file. The resulting settings file constitute the flattened settings for the block and are associated with the block. A determination is then made as to whether any conflicting settings, inconsistently set related settings, or syntax errors exist within the flattened settings. If any such settings do exist, an error message is generated. This process is then repeated for each block in the configuration file so that flattened settings are created for each block. A testing block may also be utilized to identify problems with the settings file generate by the testing block. Reverse queries may also be performed on the settings file. Changes in the flattened configuration files caused by changes in the global configuration file can also be identified. The flattened files may also be used to simplify the server computer configuration process.
Owner:MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products