RussianPatents.com
|
|
Extensibility for web-based diagram visualisation Group of inventions relates to an extensible architecture and data flow which enable a diagram update engine to launch custom code modules. A method to be executed at least in part in a computing device for extensible web-based diagram visualisation services comprises steps where, in response to receiving a request for a diagram including references to external data sources, providing the request to an update engine for determination of supported data sources and custom data modules for retrieving data from non-supported data sources which implement a predefined abstract class. Further, the method includes receiving a custom data module identifier from the update engine. The custom data module indicated by the identifier is also activated through said predefined abstract class and either data or an exception is received from the custom data module. If data are received, said data are redirected to the update engine. |
|
Virtual optional board to be used for performance of measurement operations Group of inventions relates to devices for improvement of functionality of a measurement device. Devices for improvement of functionality of the measurement device are proposed. The measurement device can contain a microcontroller (MC) including individual memory units for storage of different types of data. MC can store the main programme code in the form of a built-in programme in one flash memory unit, as well as it can store a virtual optional board in the form of a built-in programme in an individual flash memory unit. The main programme code can be used by a measurement device to provide a basic level of functionality of the measurement device. The virtual optional board can be used by the measurement device to implement additional functionality. Functionality added by means of the virtual optional board can contain measurement operations for a certain user and/or measurement operations for a certain market. |
|
Method and apparatus for supporting alternative computations in reconfigurable system-on-chip Group of inventions relates to microelectronics and computer engineering and can be used to design high-performance computer systems for processing data streams in real time. The apparatus has pairs of external single-bit inputs and outputs, a setting code register, an input switch, a data processing unit and an output switch, controlled by corresponding setting code fields, wherein the input and output switches and the data processing unit are controlled by pairs of alternative setting code fields, one of which is selected by a corresponding multi-bit multiplexer, controlled by a single-bit condition variable signal. |
|
Disclosed is a method of managing processor cores in a portable computing device (PCD), having at least three processor cores, the method comprising steps of: determining whether the PCD is docked to a PCD docking station when the PCD is powered on; energising a first processor core when the PCD is not docked to the PCD docking station; and energising the first processor core, the second processor core and third processor core when the PCD is docked to the PCD docking station. |
|
Recovery of control of processing resource, which performs external context of execution Planner in a process of a computer system provides for the possibility of execution of an external content of realisation in a processing resource provided to the planner. The planner provides control of processing resource to the external context of execution. The planner is registered for receiving of a notice on a completion event associated with the external context of execution. In response to reception of a notice about a completion event, the planner recovers control of the processing resource and provides for execution of a task associated with the context of execution controlled by the planner with the help of the processing resource. |
|
Adaptive cache organisation for single-chip multiprocessors Method of distributing data block in a single-chip multiprocessor with amorphous cache includes a step for retrieving a data block from a data storage through an initial processing core. Said method also includes a step for storing an initial data block copy in an initial amorphous cache bank adjacent to the initial processing core. Further, the initial data block copy is registered in a home bank directory, while biasing the initial data block copy for earlier eviction from the initial amorphous cache bank by placing the initial data block copy near to at least a previously used end of the initial register for monitoring victimisation. |
|
Security agents and privileged modes One or more real computer processors are virtualised into virtual computer processors, each associated with a corresponding partition, the virtual computer processors comprising: a virtual operating system processor associated with a first partition and having a privilege to alter internal operating system memory and use part of the processing capacity of one or more real computer processors; and a virtual security agent processor associated with a second partition and having a privilege to alter internal security agent memory and use the other part of processing capacity of one or more real computer processors, wherein the security agent memory is not accessible from the virtual operating system processor; and the virtual security agent processor is instructed to run the security agent, permanently stationed in the second partition, in order to determine whether part of said operating system memory changed. |
|
Protection of operating system resources Tools are disclosed, which are made as capable of providing a protection agent with the ability to identify, being in a memory that is inaccessible from the privileged mode of the operating system, whether one or more operating system resources have been modified. In certain cases such tools may make it possible for the protection agent to stay within the limits of a virtual machine dispatcher. In other cases tools may make it possible for the protection agent to stay within the limits of a separate virtual section represented by a virtual machine dispatcher. Operating outside the privileged mode of the operating system, the protection agent may be less exposed to attacks from the side of objects operating in the privileged mode of the operating system. |
|
Messaging method involves writing a user application formed in advance, which enables to form dynamic menu services and subscription for delivery of services to the identification module of a mobile communication network user. In the memory of an activated user identification module, a buffer of a packet information message assembly for said user application is formed, which occupies an invariable memory size which is determined when writing said user application. The user identification module receives packet information messages which include a label which contains a sequence of subfields indicating the possibility of assembling message parts in the allocated buffer, that the message part belongs to packet information, the index number of the message part in the information packet, the number of message parts in the information packet and discarding messages which do not contain said label. |
|
Architecture of data and control on intelligent map terminal side Method for interaction between an intelligent map terminal application and an intelligent map application on an intelligent map comprises steps for obtaining an application program interface (API) written in the architecture of the intelligent map terminal; one or more computer processors obtain information relating to the intelligent map application from the API, which is provided for designing an intelligent map terminal application in accordance with an intelligent map application, and the intelligent map terminal application is generated by introducing said information into the intelligent map terminal application. |
|
Order of programme transactions fixation and conflict management System with a programme transaction memory has a function, which makes it possible to set a certain order of fixation for multiple transactions. The specified order of fixation is used during operation for help in determination of the order to record transactions in a system with a programme transaction memory. The process of conflict management is initiated, when there is a conflict between the first transaction and the second transaction. The specified order of fixation is used in process of conflict management for assistance in determination of the transaction among the first and the second ones that should win in the conflict and be admitted for completion. |
|
Auxiliary display mini-application for distributed content Invention describes a technology through which a specific mini-application program is installed (e.g. created) in a main computer system which receives data (e.g. RSS-channel) from a distribution source, wherein channel data contain information needed for installing the mini-application. After installation, the mini-application is used to receive content from its corresponding data source and provide content for displaying on an auxiliary display. The channel data may include metadata, such as an attachment associated with the mini-application, from which the installer can record information corresponding to the metadata into a register or similar, and associate the mini-application with one or more specific auxiliary displays. By processing these metadata, another application is installed and then run if needed, so as to process content data from the corresponding data source in order to display the content on the auxiliary display. |
|
Protected data loading and storage in data processing device Method involves reception of a payload data element using a processing device; performing cryptographic authentication of the payload data element; storing the authenticated received payload data element in a data processing device, and protecting integrity of the stored payload data element. The cryptographic authentication process involves calculation of a control hash function value of at least the received data element. Protection of integrity also involves calculation the standard value of a message authentication code at least for the control hash function value using a secret key stored in the data processing device as input data. |
|
Delayed allocation method and related system When the client requests attribute requiring server resources, the server receives client request and confirms the reception, but the client is disabled to use required attribute till the next server guide. E.g. during authorisation the server allocates minimum resources only required to maintain session and client authorisation. Thereafter the server allocates resources required to maintain client request, as soon as resources are available. Heretofore the server maintains communication session without ensuring request. Thus the server follows the resources instead of transmitting them respecting client interests. Besides it is not required to reapply client request if the server cannot solve it immediately, instead the server receives request and then starts to ensure it later as soon as related resources are available. |
Another patent 2513437.
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |