RussianPatents.com
|
Priority binding. RU patent 2405190. |
|
FIELD: information technology. SUBSTANCE: system comprises a computer which stores multiple binding declarations used to determine content to be displayed in a user interface during execution of user interface software by the computer, a binding mechanism which establishes the priority order in which multiple binding declarations are subject to execution by the computer so as to bind a target with a source, the binding mechanism evaluates multiple binding declarations to determine content to be displayed in the user interface during execution of user interface software by the computer, wherein execution of binding declarations based on the priority order starts up user interface generation. EFFECT: cutting on user interface processing time for application programs. 36 cl, 9 dwg
|
Method of booting host device from mmc/sd device, host device bootable from mmc/sd device and mmc/sd device from which host device may be booted / 2402804 One version of the booting a host device from a peripheral device through an MMC/SD interface, with power terminals, a data bus with data bus terminals, a clock line with a clock terminal and a command line with a command terminal involves: transmitting power to the power terminals, and setting to low the command terminal of the said MMC/SD interface during power-up and monitoring the data bus for a start bit of data transmission. |
Upgradable preliminary visualiser of object in browser-shell / 2400801 Browser-shell provides for mechanism of expansion so that detached developers could upgrade functional capabilities of previewing facility specified as default for certain types of files. Graphic user interface includes control facility, which makes it possible for the user to select previewing facility for displayed files from multiple available previewing facilities. Alternatively, browser-shell may automatically select previewing facility from multiple available previewing facility. |
Application of data binding mechanism to perform command binding / 2398266 System for binding commands between a source and a target object includes: a computing device having a data binding mechanism which: receives a binding statement mapping a command to an element of a target object, binds an object representing the target object with an underlying model object of an underlying application logic representing a collection of underlying state through a source object and a query path, evaluates the binding statement and updates the target object by a value associated with the command, and stateless commands which are realised by providing a model method for a model and binding to the model method instead of a command object. |
Preview method, system and device / 2398263 According to the method, a preview handler provides an interface for one or more preview tools. The preview tools are software components which enable preview generation for one or more types of documents. In response to a request from the main application program for document preview generation, the preview handler identifies the corresponding preview tool designed for document preview generation. The preview hander may then call the preview tool and order the preview tool to load the document and show a preview in a subwindow provided by the called main application program. |
User configurable software libraries / 2395836 User input to specify target settings for at least one configurable settings of a base software library is received The base software library is designed to be configurable. At least one code segment to be added to or removed from the base software library is identified based on the target settings. A modified software library is created by altering the base software library in accordance with the target settings in an automated manner using a computer program. Systems for performing the foregoing method are also disclosed. The base and modified software libraries may be in a human-readable or computer-readable (binary) format. |
Method and system for security policy embodiment using virtual security machine / 2390837 Method and system are provided for embodying a security policy encoded in a set of instructions of a virtual security machine. The security system provides a virtual security machine which executes security programs expressed in the set of instructions of the virtual security machine. The security system stores the security program in the virtual security machine instruction storage. When a security embodiment event occurs, the virtual security machine executes instructions from its instruction storage using data of the security embodiment event to embody the security policy. |
Compact storage of program code on mobile terminals / 2390823 Electronic wireless communication equipment has first non-volatile data storage apparatus, where program code data are stored in the first storage apparatus, and second storage apparatus which enables execution of the program data copy being executed. Program data stored in the first storage apparatus contain first program data in compressed form and additional code data in uncompressed form. The additional code data contain second program code data which can convert first program data into their executed copy and transferring the said executed copy to the second storage apparatus. |
Method and device for creating user interfaces based on automation with possibility of complete setup / 2390822 Method involves selection of a type to be used from various logical types of forms so as to create a form-like user interface for application model presentation. The method also involves provision for a first display. A logical form which is independent of the screen target object is created using the application model, the selected form type and the first display. Disclosed also is a readable carrier on which a program for realising the method is recorded. |
Wireless communication device / 2385532 When an interface occurs between two interested parties, which makes it possible to make adjustments at the last stage of production or actually after distribution of wireless communication device, a terminal of mobile communication is proposed, in which user interface is built by means of construction of a range of software objects, which represent logical substances; requesting each of objects for reception of data related to represented substances; application of transition substance and representation substance to received data for creation of display data set and sending of display data set to visualiser, which may provide for display of user interface on display device. |
System and method of control over programs execution with help of binary applications tracing / 2385485 According to the present invention, on developer side in compiled software module they replace text lines of tracing by according identifiers. Software module is sent to user side. After tracing file has been formed on user side, this file is sent to developer side, where text lines are restored by identifiers contained in this file. As a result, a text file is produced, which may be easily analysed by developer. |
Network-based presentation of software extensions / 2250490 In one variant software and platform are constantly at client position. Extensions of software are configured for them to be enabled to software platform of client. Descriptions of extensions are delivered to client via network, while these descriptions are configured for possible use during loading of software extensions via network. Extensions of software are presented to user for download via network in such a way, that client user is able to interact with extension before it is fully downloaded. |
Device and method for connection between modem and memory of mobile station / 2251796 Device for connection between AND-NOT flash memory for storing data and modem for processing data recorded in AND-NOT flash memory contains memory controller for controlling data, received from modem, and code with error correction, recorded in memory AND-NOT, when enabled are signal for selection of micro-board and recording command, constant memory device of mask, activated by modem, for outputting main programs, necessary for initialization, after receiving reading command from modem during initial power engagement, and code generator with error correction, activated by memory controller, for generating code with error correction for data, received from modem, and outputting code with error correction to modem via memory controller. |
System and method for checking authenticity of dynamically loaded executable images / 2258252 System has means for confirming authenticity in real time scale, which detects standard digital signature for executable, using content of digital signature, excluding portions of executable, for which address linking is performed by program loader. Means for confirming authenticity in real time scale after loading of executable image determines integrity of digital signature for checking whether executable was modified in an unsanctioned way, and also guarantees that each pointer in executable image is not readdressed in an unsanctioned way. |
Method and device for reproduction of program and carrier with recorded program for reproduction of program / 2260206 Method includes selecting element from existing program, determining input/output environment of computer. For selected element multiple software components are created for operation of cyclic structure. Commands, operators and data fields of existing software are matched with appropriate software components of cyclic structure. |
Method for installing and configuring software / 2260839 One or more operations in each installation set are combined, according to functioning logic, to a phase, which is assigned to with one or more attributes, each phase of installation set is selected, identified and marked; if next phase is marked as processed one, transfer to next phase is performed, and in opposite case next phase is called in each taken up installation set; and if current phase is found in one of installation sets, then in it serially selected, analyzed and identified are all phases, positioned before found one, and also detected phase itself, each of which after processing is marked as processed one. |
Method for unblocking and blocking software signs / 2284569 In accordance to method, marker, formed of identification information and information, connected to signs, is dispatched to authorization device. Authorization device creates a key from this information and sends key and information relatively to authorized set of signs back into device. Device generates its own version of key and compares its version to received version. If two keys match, authorized set of signs is realized. |
Method for realization of computer multi-task system through virtual organization of thread processing / 2286595 During operation of computer a set of commands of byte-code or pseudo-code is stored in computer memory. For each one of a set of tasks or problems executed by computer, generated automatically is an aperture virtual thread of executed context data, which includes: position in memory of next one of pseudo-code commands, which should be executed during execution of appropriate task or problem and values of any required local variables. Each task or problem is processed in appropriate sequence of time quanta or processing time intervals under control of appropriate virtual thread. |
Method and device for configuration of software of playing device / 2286601 In method and device, a set of files is identified, which are subject to distribution, installation or provision in form of update. A set of files for inclusion in file image is determined, file image point for mounting on carrier is determined and image is mounted to produce a set of files for use on game machine. During distribution of software files, first amount of files is composed as second number of compiled files and these are dispatched to game system carrier, compiled files are unpacked and first number of software files is created on playing system carrier. |
Method and system for distributed program development for programmable portable information medium / 2289157 Initial program text is created on user's computer, transferred to information medium issuer's computer, where initial text is compiled and assembled; executable program code is created, which is enciphered and converted to transport code, which is downloaded to information medium through user's computer. At the same time during preliminary assembly information medium is equipped with instrumental program means for restoring executable program code from transport code, which is presented in intermediate format. Also system for distributed development of executed program for portable information medium, and information medium are disclosed. |
Method for controlling synchronization of software updates / 2295752 Method for controlling synchronization of updates of software includes recording into system memory of computer device of user of one software application, updating of this application in form of its full version or a set of separate elements of application, comparison of software shipped as update and software present on user side in its current condition to detect differences, combination of elements of user software and elements of software shipped as update in overwriting mode. |
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |