Nothing Special   »   [go: up one dir, main page]

Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

144 results about "Action Code" patented technology

A one-character code which defines the type of action to be taken in a particular patient based on her cervical smear results in the UK. The action code may define the recall type, the type of notification required and the period of time between recalls. Action codes. A Normal (routine) recall interval for the responsible Health Authority.

System and method for knowledge retrieval, management, delivery and presentation

The present invention is directed to an integrated implementation framework and resulting medium for knowledge retrieval, management, delivery and presentation. The system includes a first server component that is responsible for adding and maintaining domain-specific semantic information and a second server component that hosts semantic and other knowledge for use by the first server component that work together to provide context and time-sensitive semantic information retrieval services to clients operating a presentation platform via a communication medium. Within the system, all objects or events in a given hierarchy are active Agents semantically related to each other and representing queries (comprised of underlying action code) that return data objects for presentation to the client according to a predetermined and customizable theme or “Skin.” This system provides various means for the client to customize and “blend” Agents and the underlying related queries to optimize the presentation of the resulting information.
Owner:OMOIGUI NOSA

System and method for knowledge retrieval, management, delivery and presentation

The present invention is directed to an integrated implementation framework and resulting medium for knowledge retrieval, management, delivery and presentation. The system includes a first server component that is responsible for adding and maintaining domain-specific semantic information and a second server component that hosts semantic and other knowledge for use by the first server component that work together to provide context and time-sensitive semantic information retrieval services to clients operating a presentation platform via a communication medium. Within the system, all objects or events in a given hierarchy are active Agents semantically related to each other and representing queries (comprised of underlying action code) that return data objects for presentation to the client according to a predetermined and customizable theme or “Skin.” This system provides various means for the client to customize and “blend” Agents and the underlying related queries to optimize the presentation of the resulting information.
Owner:OMOIGUI NOSA

Method for performing carrier management procedure in a multi-carrier supported wideband wireless communication system and apparatus for the same

A method and apparatus for performing a carrier management in a broadband wireless communication system supporting multi-carriers are disclosed. A method for a mobile station to perform a carrier management procedure with a base station supporting multiple carriers includes receiving a carrier management command message including an action code indicating a primary carrier change and an action time, on a serving primary carrier, transmitting an acknowledgement message indicating that the carrier management command message is successfully received in the mobile station, on the serving primary carrier, and switching the primary carrier to a target carrier indicated by the carrier management command message at the action time, wherein the action time is set to a value more than a retransmission timer, the retransmission timer is set to a time during which the base station waits for receiving the acknowledgement message in response to the carrier management command message.
Owner:LG ELECTRONICS INC

Verifying availability of idle-mode mobile subscriber station in wireless access system

A method of verifying of a mobile subscriber station that is in an idle-mode includes requesting to a base station by the mobile subscriber station to enter an idle-mode, wherein the base station is associated with a paging group comprising a plurality of base stations, and receiving from the base station an idle-mode response command to enter the idle-mode. The method also includes receiving from the base station a paging command comprising an action code associated with performing ranging while the mobile subscriber station is in the idle-mode to verify availability of the mobile subscriber station with respect to the base station, wherein if the ranging is not successfully preformed with the base station during a predetermined period, the base station continues to transmit the paging command until a paging retrial count reaches a predetermined threshold.
Owner:PANTECH CORP

Method of machine-to-machine communication

In one embodiment, the method includes encrypting, at a device, data with a first key, and forming a message that includes a device identifier and the encrypted data. The device identifier identifies the device. A signaling message is formed that includes a class identifier, the message and an action code. The class identifier identifies a group of devices to which one or more devices belong. The action code indicates the type of data, and may be part of the message. The signaling message is sent to a network, for example, a wireless network. The wireless network identifies and routes the message portion of the signaling message based on the class identifier. And, using the class identifier and perhaps a device identifier, the wireless network may signal the device to change an operating parameter.
Owner:GEMPLU

Method for performing carrier management procedure in a multi-carrier supported wideband wireless communication system and apparatus for the same

A method and apparatus performing carrier management in a broadband wireless communication system supporting multi-carrier (MC) are disclosed. A method for a single-carrier supported mobile station (MS) to perform a carrier change with a MC supported base station (BS) includes transmitting a message indicating a support of a basic MC mode in which the MS is aware of a MC operation of the BS, receiving a carrier management command message including an action code and an action time on a serving carrier, transmitting, in response to the carrier management command message, a confirmation message indicating readiness of signal transmission / reception through a target carrier on a target carrier, and receiving a control signal and data from the BS on the target carrier, wherein the serving carrier and the target carrier are controlled by a common Medium Access Control (MAC) of the BS.
Owner:LG ELECTRONICS INC

Application management

This invention relates to management of a computer application. In particular it relates to the optimization of an application which is written for more than one platform. There is disclosed apparatus, program code and a method for resolving a program code module (such as a DLL) in a computer platform, said method comprising: loading a module into memory; locating specified operation code within the module; selecting a DLL patch for the operation code; and modifying the operation code with the patch according to DLL methods. The operating system uses the dynamic module loader to patch operational code into an application to optimise the application for that operating system and platform. It reduces the need to create a different application for each platform and operating system combination. The operation code is pointed to by a module header fix up location pointer. The above solution causes the code to be patched at load time and advantageously by the operating system itself. All the application program has to do is to ensure that the appropriate DLL exporting the right instruction sequence is installed. Additional benefits are that the code remains non-writable and cannot be corrupted, there is no call-return overhead. Furthermore there is faster execution, in the single processor example, the only overhead is one nop instruction.
Owner:IBM CORP

Detection of polymorphic virus code using dataflow analysis

A method and apparatus for detecting polymorphic viral code in a computer program is provided. The apparatus comprises an emulator, an operational code analyzer and an heuristic analyzer. The emulator emulates a selected number of instructions of the computer program. The operational code analyzer collects and stores information corresponding to operands and operators used in the instructions and the state of registers / flags after each emulated instruction execution. The heuristic analyzer determines a probability that the computer program contains viral code based on an heuristic analysis of register / flag state information supplied by the operational code analyzer.
Owner:COMP ASSOC THINK INC

Methods and apparatus for extending mac control messages in epon

One embodiment provides a media access control (MAC) module facilitating operations of an Ethernet passive optical network (EPON). The MAC module includes a frame formatter configured to generate a MAC control frame. The generated MAC control frame includes at least one of: an organizationally unique identifier (OUI) field, an OUI-specific operation code (opcode) field, and a number of fields associated with the OUI-specific opcode. Transmission of the MAC control frame facilitates realization of an EPON function based on the fields associated with the OUI-specific opcode.
Owner:AVAGO TECH INT SALES PTE LTD

Intrusion detection using a network processor and a parallel pattern detection engine

An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures.
Owner:TREND MICRO INC

Electronic device diagnostic methods and systems

Diagnostic methods and systems for electronic devices are disclosed. Separate dedicated diagnostic software code and operating code are respectively executed in a diagnostic mode and an operating mode of an electronic device. A determination may be made as to whether the electronic device is to be operated in the diagnostic mode or the operating mode when the electronic device is started, for example. A transition to the diagnostic mode from the operating mode may also be made in response to errors detected by online diagnostic tests performed in the operating mode. Results of diagnostic tests are preferably stored in a non-volatile memory for subsequent access, independent of the operating software code.
Owner:CIENA

HTTP trigger for out-of-protocol action

A hypertext transfer protocol (HTTP) request is used to actuate a secondary communications protocol (e.g., Short Message Service). A server receiving the request may be configured to take actions not specified by the URL associated with the request in response to the characters encoded in the request, such as accessing a secondary communications protocol. The server parses the request to identify action codes and / or content in the request itself, and takes action based on the code or content value. A token code representing a value or fixed number of uses may be utilized in connection with the techniques disclosed herein.
Owner:SHUSTER GARY STEPHEN

Automatic firmware image recovery

An embodiment of the present invention is a system and method relating to automatic firmware image recovery. When a server equipped with a baseboard management controller (BMC) and operational code detects that its operational code image is corrupted or out of date, it broadcasts a request for an image update over an out-of-band network. One or more donor systems on the network may respond to the request and send the requestor a new image. The recipient system use management policies to determine from which donor system to accept an update.
Owner:INTEL CORP

Predicate matching library for complex program analysis

A matching library of a code analysis system defines a number of predicates applicable to an abstract syntax tree (AST) corresponding to program code being analyzed. The predicates represent whether or not nodes of the program code's AST have corresponding properties, such as representing a class that inherits from another given class. The code analysis system obtains an AST to analyze, a predicate expression query that includes predicates of the matching library, and action code. The code analysis system identifies nodes of the AST that match the predicate expression query by executing code of the matching library and executes the action code against the identified nodes.
Owner:GOOGLE LLC

Scalable memory system

InactiveUS8407395B2Preventing accidental program and erase operationEnergy efficient ICTMemory adressing/allocation/relocationAction CodeComputer hardware
A memory system architecture has serially connected memory devices. The memory system is scalable to include any number of memory devices without any performance degradation or complex redesign. Each memory device has a serial input / output interface for communicating between other memory devices and a memory controller. The memory controller issues commands in at least one bitstream, where the bitstream follows a modular command protocol. The command includes an operation code with optional address information and a device address, so that only the addressed memory device acts upon the command. Separate data output strobe and command input strobe signals are provided in parallel with each output data stream and input command data stream, respectively, for identifying the type of data and the length of the data. The modular command protocol is used for executing concurrent operations in each memory device to further improve performance.
Owner:CONVERSANT INTPROP MANAGEMENT INC

Code generation method and code generation device

The invention provides a code generation method and a code generation device. The code generation method comprises the following steps of determining a database to be visited and a database operation type; selecting an operation code which is corresponding to the database operation type from a pre-constructed code template; determining parameters of the database to be visited according to the database operation type; converting the parameters of the database to variables of an operation object, and utilizing the variables of the operation object to replace the corresponding variables in the operation code so as to obtain an executable software code under a software framework. By applying the technical scheme, different operations can be carried out on different databases so as to automatically generate the executable software codes which are corresponding to the operations, and the problem of complicated code modification caused by manual code modification of a software developer in the prior art is solved.
Owner:BEIJING CHINA POWER INFORMATION TECH +1

Memory access control apparatus

In a region switching table, address regions covering a memory space are defined, and operations which can access the regions in domains corresponding to components of a program are listed. A domain number which indicates a domain corresponding to a component of the program under execution, and a region number which indicates a region including an address which is accessed immediately before are held in respective registers. The apparatus includes an access check unit which issues a first interruption, if the processor request address (VA) falls outside a region boundary. The access check unit also issues a second interruption, if the processor request operation code (OP) is not permitted according to a permission attribute corresponding to the domain number of the region including the processor request address (VA). The access check unit writes interrupt factors in a register, if the first interruption or the second interruption has been occurred.
Owner:KK TOSHIBA

Method and apparatus for scalable transport processing fulfillment system

A scalable fulfillment system is presented that supports business processes, manages the transport and processing of business-related messages or documents between a business entity and clients, such as customers, vendors, and business partners, and generally supports business document processing. The system intelligently manages the transportation of files from clients, through processing of files, to generating responses that return to the clients. To accommodate a heterogeneous interfacing and processing with different clients in a central system, a file normalization technique is used that captures a common meta-data format from the numerous heterogeneous file types used by numerous clients. The meta-data files, also referred to as messages, contain links to their associated data files and are processed separately. Once the messages are entered into the system, an intelligent queue scheduler (IQS) is used to schedule the processing of messages across a scalable resource of processing engines based on normalized file meta-data parameters. The IQS supports serial processing file requirements in a parallel processing environment. The IQS in conjunction with processing daemons implement a dynamic queue that supports initial message entry and prioritization of messages within the IQS queue during the life cycle processing of a message. The processing daemons dynamically provide processing status, timestamps, message type information, client information and other similar information that can be used by the IQS in prioritizing processing steps. Message and file processing is partitioned in a series of separate action code modules that can be programmatically selected and sequenced in a desired processing pipelined order. By using a multi-pass action interfacing method, new actions can be defined and allowed to be pluggable in the system for processing new message types and adding new clients with possibly unique file types and interfaces. The ability to define new actions and define a programmable sequence of actions allows new capabilities of message processing as the system evolves.
Owner:WALMART APOLLO LLC

Device and method for remotely operating keyless entry systems

A mobile communication device for remotely operating a keyless entry system includes a processor for generating at least one coded signal based on a predetermined code and a predetermined frequency entered by a user and a transmitter coupled to the processor for transmitting the generated coded signal. The at least one coded signal carries a code which is substantially identical to an operating code stored within the keyless entry system, whereby operation of the keyless entry system is responsive to a receipt of the at least one coded signal. To generate and transmit such at least one coded signal a dedicated switch may be provided within the mobile communication device and manually operable by the user or the user may utilize the key pad and functional keys.
Owner:MARTIN ROBERT C +1

Individually programmable most significant bits of VLAN ID

A network switch that includes an address resolution table and a VLAN table. The address resolution table comprises a VLAN identifier (ARL VID) in less significant bits, a MAC address, and an action code, wherein each VLAN identifier in the address resolution table is unique. The VLAN table is used for storing information related to frame forwarding. The VLAN table includes a VLAN identifier (VLAN VID) in more significant bits, a forward map and an un-tag map. The ARL VID is used to access an associated entry in the VLAN table.
Owner:AVAGO TECH WIRELESS IP SINGAPORE PTE

Video game apparatus and method with enhanced player object action control

A video game apparatus includes a CPU. The CPU detects an action code of a land object existing in front of a hole. If detecting "jump" set as an action code, a height (or depth) of the hole is calculated. When the hole height is greater than a predetermined height, a jump distance is calculated for the player object. The player object is caused to jump in accordance with that distance.
Owner:MOTOROLA INC +1

System for Adaptive Action Plan Compilation Based on Error Reporting

A database of action plans carried out by a service provider is provided that stores the action plan as a series of action codes as well as the associated information such as error code, error type and whether the action plan resolved the problem. When an error occurs and is reported automatically, the database is searched for the error that occurred. Action plans as well as success rates are collected with most probable solutions being presented first. Each action code in the action plan corresponds to a particular point in maintenance documentation that is stored, e.g., on a management console, at the customer location. After reporting the error, the management console receives action plans for the error based on actual service reports as well as action plans suggested by documentation. When a service representative accesses the management console for information about the error, appropriate documentation is presented for each step in the action plan, allowing the service representative to follow along the suggested action plans and associated maintenance documentation onsite.
Owner:IBM CORP

Path planning method for autonomous vehicle

InactiveCN108931981ASafe and stable autonomous drivingStabilize autonomous driving tasksPosition/course control in two dimensionsVehiclesAction CodePlanning approach
The invention discloses a path planning method for an autonomous vehicle. In the method, a vehicle motion model is placed in a three-dimensional coordinate system, generated path trajectory points contain information of a vehicle position, a vehicle speed, an included angle between the vehicle speed and a vehicle body, and actuator action code, and the problem that the traditional path planning method for the autonomous vehicle considers the motion working condition of the vehicle only from a two-dimensional point of view, vehicle attitude information and an instruction of a planning layer tothe vehicle actuator are ignored, an unmanned vehicle based on the path planning method is caused to have a simple function, and the vehicle can not be effectively controlled under a complex conditioncan be solved. The path planning method for the autonomous vehicle disclosed in the invention considers the motion working condition of the vehicle from a three-dimensional angle, the instruction ofthe planning layer to the vehicle actuator is also considered, and the functions of the unmanned vehicle are enriched.
Owner:FAW VOLKSWAGEN AUTOMOTIVE CO LTD

Method and system for routing and filtering network data packets in fibre channel systems

A fibre channel switch element with an alias cache is provided for routing and filtering frames. The alias cache includes plural entries including a control word having plural fields including an action code for routing frames; an alias word that is compared to incoming frame data using a frame byte compare block; and a bit mask generator for filtering bit combinations from the frame byte compare block; and a depth match block for determining equality between a control word depth field and incoming frame depth field. Frame data comparison is performed on a bit by bit or byte-by-byte basis. An alias cache entry also includes prerequisite data to determine if results of a different entry are to be used to determine an entry match. The action code routes a frame to a processor, discards a frame, sets a status for inspecting a frame or routes a frame based on a standard Fibre Channel addressing scheme.
Owner:MARVELL ASIA PTE LTD

Video game apparatus and method with enhanced player object action control

A video game apparatus includes a CPU. The CPU detects an action code of a land object existing in front of a hole. If "jump" is the action code, a height (or depth) of the hole is calculated. When the hole height is greater than a predetermined height, a jump distance is calculated for the player object, and the CPU causes the payer object to jump in accordance with that distance.
Owner:MOTOROLA INC +1

Mobile positioning operation device of portable electronic equipment and operation method

The invention relates to an operation device of portable electronic equipment. The portable electronic equipment is provided with an operation system, and the operation device comprises a fingerprint sensor, a fingerprint action recognition module and a fingerprint action output module, wherein the fingerprint sensor is used for acquiring fingerprint action of a user, the fingerprint action recognition module is used for receiving the fingerprint actions acquired by the fingerprint sensor and compiling the fingerprint actions into action codes which can be recognized by the operation system of the electronic equipment, and the fingerprint action output module is used for outputting the action codes to the operation system. The invention also provides an operation method comprising the following steps of: providing the fingerprint sensor used for acquiring the fingerprint actions of the user; providing the fingerprint action recognition module used for receiving the fingerprint actions transmitted by the fingerprint sensor and compiling the action codes based on the fingerprint actions; and providing the fingerprint action output module used for receiving the action codes transmitted by the fingerprint action recognition module and transmitting the action codes to the operation system.
Owner:LEADCORE TECH

System and method for Automatic firmware image recovery for server management operational code

An embodiment of the present invention is a system and method relating to automatic firmware image recovery. When a server equipped with a baseboard management controller (BMC) and operational code detects that its operational code image is corrupted or out of date, it broadcasts a request for an image update over an out-of-band network. One or more donor systems on the network may respond to the request and send the requestor a new image. The recipient system use management policies to determine from which donor system to accept an update.
Owner:INTEL CORP

Parallel computation with multiple storage devices

A method and system are disclosed for allowing access to processing resources of one or more idle memory devices to an active memory device is disclosed, where the idle and active memory devices are associated with a common host. The resources shared may be processing power, for example in the form of using a processor of an idle memory to handle some of the logical-to-physical mapping associated with a host command, or may be other resources such as RAM sharing so that a first memory has expanded RAM capacity. The method may include exchanging tokens with resource sharing abilities, operation codes and associated data relevant to the requested resources.
Owner:SANDISK TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products