RussianPatents.com

Method and system for configuration of user interface. RU patent 2408923.

Method and system for configuration of user interface. RU patent 2408923.

FIELD: information technologies.

SUBSTANCE: devices and methods of user interfaces transfer into mobile device are proposed for digital system of broadcasting data transfer. User interfaces may be reflected on a tool panel of mobile device and may contain updated information. When information related to content of user interfaces changes, condition of information on user interfaces may change accordingly. Information or interface are configured on the basis of request for user interface, corresponding to the event, besides, user interface contains information associated to this event, and sent to mobile device of user.

EFFECT: provision of access to filtered information for data flows in mobile device by displaying of user interfaces in the previously specified area on mobile device display.

28 cl, 13 dwg

 


 

IPC classes for russian patent Method and system for configuration of user interface. RU patent 2408923. (RU 2408923):

G06F9/44 - Arrangements for executing specific programmes
Another patents in same IPC classes:
Systems and methods for providing distributed user interfaces for configuring client devices Systems and methods for providing distributed user interfaces for configuring client devices / 2405191
Client device having at least one user configurable setting is detected by a user interface device. The user interface device and the client device, having at least one user configurable setting, are in electronic communication with each other. Setting signals identifying user configurable settings of the client device are received at the user interface device which, based on said signals, forms the user interface. In response to reception of user input, a control signal is transmitted to the client device to alter at least one user configurable setting of the client device.
Priority binding Priority binding / 2405190
System comprises a computer which stores multiple binding declarations used to determine content to be displayed in a user interface during execution of user interface software by the computer, a binding mechanism which establishes the priority order in which multiple binding declarations are subject to execution by the computer so as to bind a target with a source, the binding mechanism evaluates multiple binding declarations to determine content to be displayed in the user interface during execution of user interface software by the computer, wherein execution of binding declarations based on the priority order starts up user interface generation.
Method of booting host device from mmc/sd device, host device bootable from mmc/sd device and mmc/sd device from which host device may be booted Method of booting host device from mmc/sd device, host device bootable from mmc/sd device and mmc/sd device from which host device may be booted / 2402804
One version of the booting a host device from a peripheral device through an MMC/SD interface, with power terminals, a data bus with data bus terminals, a clock line with a clock terminal and a command line with a command terminal involves: transmitting power to the power terminals, and setting to low the command terminal of the said MMC/SD interface during power-up and monitoring the data bus for a start bit of data transmission.
Upgradable preliminary visualiser of object in browser-shell Upgradable preliminary visualiser of object in browser-shell / 2400801
Browser-shell provides for mechanism of expansion so that detached developers could upgrade functional capabilities of previewing facility specified as default for certain types of files. Graphic user interface includes control facility, which makes it possible for the user to select previewing facility for displayed files from multiple available previewing facilities. Alternatively, browser-shell may automatically select previewing facility from multiple available previewing facility.
Application of data binding mechanism to perform command binding Application of data binding mechanism to perform command binding / 2398266
System for binding commands between a source and a target object includes: a computing device having a data binding mechanism which: receives a binding statement mapping a command to an element of a target object, binds an object representing the target object with an underlying model object of an underlying application logic representing a collection of underlying state through a source object and a query path, evaluates the binding statement and updates the target object by a value associated with the command, and stateless commands which are realised by providing a model method for a model and binding to the model method instead of a command object.
Preview method, system and device Preview method, system and device / 2398263
According to the method, a preview handler provides an interface for one or more preview tools. The preview tools are software components which enable preview generation for one or more types of documents. In response to a request from the main application program for document preview generation, the preview handler identifies the corresponding preview tool designed for document preview generation. The preview hander may then call the preview tool and order the preview tool to load the document and show a preview in a subwindow provided by the called main application program.
User configurable software libraries User configurable software libraries / 2395836
User input to specify target settings for at least one configurable settings of a base software library is received The base software library is designed to be configurable. At least one code segment to be added to or removed from the base software library is identified based on the target settings. A modified software library is created by altering the base software library in accordance with the target settings in an automated manner using a computer program. Systems for performing the foregoing method are also disclosed. The base and modified software libraries may be in a human-readable or computer-readable (binary) format.
Method and system for security policy embodiment using virtual security machine Method and system for security policy embodiment using virtual security machine / 2390837
Method and system are provided for embodying a security policy encoded in a set of instructions of a virtual security machine. The security system provides a virtual security machine which executes security programs expressed in the set of instructions of the virtual security machine. The security system stores the security program in the virtual security machine instruction storage. When a security embodiment event occurs, the virtual security machine executes instructions from its instruction storage using data of the security embodiment event to embody the security policy.
Compact storage of program code on mobile terminals Compact storage of program code on mobile terminals / 2390823
Electronic wireless communication equipment has first non-volatile data storage apparatus, where program code data are stored in the first storage apparatus, and second storage apparatus which enables execution of the program data copy being executed. Program data stored in the first storage apparatus contain first program data in compressed form and additional code data in uncompressed form. The additional code data contain second program code data which can convert first program data into their executed copy and transferring the said executed copy to the second storage apparatus.
Method and device for creating user interfaces based on automation with possibility of complete setup Method and device for creating user interfaces based on automation with possibility of complete setup / 2390822
Method involves selection of a type to be used from various logical types of forms so as to create a form-like user interface for application model presentation. The method also involves provision for a first display. A logical form which is independent of the screen target object is created using the application model, the selected form type and the first display. Disclosed also is a readable carrier on which a program for realising the method is recorded.
Network-based presentation of software extensions Network-based presentation of software extensions / 2250490
In one variant software and platform are constantly at client position. Extensions of software are configured for them to be enabled to software platform of client. Descriptions of extensions are delivered to client via network, while these descriptions are configured for possible use during loading of software extensions via network. Extensions of software are presented to user for download via network in such a way, that client user is able to interact with extension before it is fully downloaded.
Device and method for connection between modem and memory of mobile station Device and method for connection between modem and memory of mobile station / 2251796
Device for connection between AND-NOT flash memory for storing data and modem for processing data recorded in AND-NOT flash memory contains memory controller for controlling data, received from modem, and code with error correction, recorded in memory AND-NOT, when enabled are signal for selection of micro-board and recording command, constant memory device of mask, activated by modem, for outputting main programs, necessary for initialization, after receiving reading command from modem during initial power engagement, and code generator with error correction, activated by memory controller, for generating code with error correction for data, received from modem, and outputting code with error correction to modem via memory controller.
System and method for checking authenticity of dynamically loaded executable images System and method for checking authenticity of dynamically loaded executable images / 2258252
System has means for confirming authenticity in real time scale, which detects standard digital signature for executable, using content of digital signature, excluding portions of executable, for which address linking is performed by program loader. Means for confirming authenticity in real time scale after loading of executable image determines integrity of digital signature for checking whether executable was modified in an unsanctioned way, and also guarantees that each pointer in executable image is not readdressed in an unsanctioned way.
Method and device for reproduction of program and carrier with recorded program for reproduction of program Method and device for reproduction of program and carrier with recorded program for reproduction of program / 2260206
Method includes selecting element from existing program, determining input/output environment of computer. For selected element multiple software components are created for operation of cyclic structure. Commands, operators and data fields of existing software are matched with appropriate software components of cyclic structure.
Method for installing and configuring software / 2260839
One or more operations in each installation set are combined, according to functioning logic, to a phase, which is assigned to with one or more attributes, each phase of installation set is selected, identified and marked; if next phase is marked as processed one, transfer to next phase is performed, and in opposite case next phase is called in each taken up installation set; and if current phase is found in one of installation sets, then in it serially selected, analyzed and identified are all phases, positioned before found one, and also detected phase itself, each of which after processing is marked as processed one.
Method for unblocking and blocking software signs Method for unblocking and blocking software signs / 2284569
In accordance to method, marker, formed of identification information and information, connected to signs, is dispatched to authorization device. Authorization device creates a key from this information and sends key and information relatively to authorized set of signs back into device. Device generates its own version of key and compares its version to received version. If two keys match, authorized set of signs is realized.
Method for realization of computer multi-task system through virtual organization of thread processing Method for realization of computer multi-task system through virtual organization of thread processing / 2286595
During operation of computer a set of commands of byte-code or pseudo-code is stored in computer memory. For each one of a set of tasks or problems executed by computer, generated automatically is an aperture virtual thread of executed context data, which includes: position in memory of next one of pseudo-code commands, which should be executed during execution of appropriate task or problem and values of any required local variables. Each task or problem is processed in appropriate sequence of time quanta or processing time intervals under control of appropriate virtual thread.
Method and device for configuration of software of playing device Method and device for configuration of software of playing device / 2286601
In method and device, a set of files is identified, which are subject to distribution, installation or provision in form of update. A set of files for inclusion in file image is determined, file image point for mounting on carrier is determined and image is mounted to produce a set of files for use on game machine. During distribution of software files, first amount of files is composed as second number of compiled files and these are dispatched to game system carrier, compiled files are unpacked and first number of software files is created on playing system carrier.
Method and system for distributed program development for programmable portable information medium Method and system for distributed program development for programmable portable information medium / 2289157
Initial program text is created on user's computer, transferred to information medium issuer's computer, where initial text is compiled and assembled; executable program code is created, which is enciphered and converted to transport code, which is downloaded to information medium through user's computer. At the same time during preliminary assembly information medium is equipped with instrumental program means for restoring executable program code from transport code, which is presented in intermediate format. Also system for distributed development of executed program for portable information medium, and information medium are disclosed.
Method for controlling synchronization of software updates Method for controlling synchronization of software updates / 2295752
Method for controlling synchronization of updates of software includes recording into system memory of computer device of user of one software application, updating of this application in form of its full version or a set of separate elements of application, comparison of software shipped as update and software present on user side in its current condition to detect differences, combination of elements of user software and elements of software shipped as update in overwriting mode.
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.