Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

119 results about "Application software" patented technology

Application software (app for short) is software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, an email client, a media player, a file viewer, an aeronautical flight simulator, a console game or a photo editor. The collective noun application software refers to all applications collectively. This contrasts with system software, which is mainly involved with running the computer.

Interactive multi media user interface using affinity based categorization

InactiveUS7284202B1High communication latencyTelevision system detailsDigital data information retrievalThe InternetE-commerce
Computing devices capable of internetworking and receiving, storing and viewing programmed (scheduled) television and multimedia content provide a platform for access to a combination of Internet and Television content and services. On this platform, a mix of pre-scripted and live interactive dialog (chat with offered responses) are broadcast by a connected server or servers to provide supplemental entertainment, information regarding programmed content, enhancements to scheduled television advertising, a community experience, and an interface to Internet applications and services. The dialog provides a “Social Interface” allowing fictional and non-fictional characters to interact with viewers. The fictional and non-fictional characters are each emblematic of a specific affinity group categorization, which a user personally identifies with and is drawn to. Selection of an affinity character also provides a filter for selecting internet and broadcast content associated with that character. Second level content is also associated with and mediated by each character. This provides e-commerce opportunities whereby sponsors can direct advertising content based upon factors such as the relative popularity of each character or the demographic group associated with each character.
Owner:MICROSOFT TECH LICENSING LLC

Method and apparatus for implementing deployment descriptors in an enterprise environment

Methods and apparatus for implementing deployment descriptors which are used to deploy modules in an enterprise environment are disclosed. According to one aspect of the present invention, a method for deploying an application using a deployment tool for use on a platform server includes creating the application, creating an application deployment descriptor for the application, packaging the application in an archive, and deploying the application packaged in the archive. Creating the application includes obtaining an application component which has an associated application component deployment descriptor that has information relating to the deployment of the application component. The application deployment descriptor for the application includes information arranged to identify the application component, and packaging the application in an archive includes packaging the application component, the application component deployment descriptor, and the application deployment descriptor. The application packaged in the archive is deployed using the application component deployment descriptor.
Owner:ORACLE INT CORP

System and method for switching between conversations in instant messaging applications

A system and method are provided for switching between conversations in instant messaging applications. The instant messaging application is configured for displaying a list of conversations upon detecting selection of the option within a menu or link within the conversation screen and permit navigation to another conversation. The conversations may be prioritized based first on whether the conversation has any unread messages and within the grouping of those conversations having unread messages, may be prioritized based on when the last activity occurred. In this way, the user has easiest access to conversations with the most recent activity with the ability to scroll down the list of conversations to continue an older conversation if desired.
Owner:MALIKIE INNOVATIONS LTD

Strong authentication token usable with a plurality of independent application providers

ActiveUS20110099384A1Low costCost can be dividedMultiple keys/algorithms usageDigital data processing detailsPersonalizationUnique identifier
The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.
The present invention defines furthermore a method to manage the secret keys of strong authentication tokens that can generate dynamic credentials for more than one supported application provider or application provider group using different secret keys for each supported application provider or application provider group comprising generating for each of a batch of strong authentication tokens a token specific master key; personalising each token of said batch with the token specific master key associated with said token; generating for each of a plurality of supported application providers or application provider groups a set of application provider specific token keys, one application provider specific token key for each token of said batch, whereby each application provider specific token key of each of said sets is derived from that token's token specific master key and a unique identifier or indicator of that application provider or application provider group; providing to each application provider or an entity that is responsible for the verification on behalf of said application provider of the dynamic credentials that are generated for said application provider, the corresponding set of application provider specific token keys.
Owner:ONESPAN NORTH AMERICA INC

Installation of application software through a network from a source computer system on to a target computer system

A technique for the remote installation of application software from a source computer system to one or more target computer systems (workstation) coupled to a Local Area Network (LAN). The present invention allows a LAN Administrator to install application software on a user's workstation automatically at any time without user's intervention. The state of (i.e. a snapshot of) the LAN Administrator's system before and after the installation of the application software is captured and an installation package is built. Installation on the user workstations is then scheduled. For installation, the installation package is transmitted to the user workstation where an install program carries out commands in the installation package for installing the application software.
Owner:INTEL CORP

Application program control method based on two-time signature verification technology

An application program control method based on a two-time signature verification technology is achieved by performing two times of signing and two times of signature verification on application programs on an android terminal. Security detection is performed on the application programs through a reliable third-party security detection mechanism, the application programs passing the detection will be signed by the third-party security detection mechanism, and then the signed applications are returned to developers. When the application programs are installed on the intelligent android terminal, security detection is performed on the application programs first to see whether the application programs are signed by the third-party security detection mechanism or not, and signatures are verified; if signatures of the third-party detection mechanism do not exist or the signatures cannot pass verification, installation of the application programs is refused. Through the technical scheme, the application program control method based on the two-time signature verification technology has the advantages that signature information is fixed through introduction of the third-party detection signatures and a security control module of the android terminal so that secure application programs can be downloaded and installed in an android system through multiple channels, and while security of the android terminal is guaranteed, a flexible and efficient application program verification scheme is provided.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI +1

System and Method for Utilizing Available Best Effort Hardware Mechanisms for Supporting Transactional Memory

Systems and methods for managing divergence of best effort transactional support mechanisms in various transactional memory implementations using a portable transaction interface are described. This interface may be implemented by various combinations of best effort hardware features, including none at all. Because the features offered by this interface may be best effort, a default (e.g., software) implementation may always be possible without the need for special hardware support. Software may be written to the interface, and may be executable on a variety of platforms, taking advantage of best effort hardware features included on each one, while not depending on any particular mechanism. Multiple implementations of each operation defined by the interface may be included in one or more portable transaction interface libraries. Systems and / or application software may be written as platform-independent and / or portable, and may call functions of these libraries to implement the operations for a targeted execution environment.
Owner:ORACLE INT CORP

Method for reducing power consumption of device, mobile terminal and system

ActiveCN105159816AReduce power consumptionImprove battery lifeHardware monitoringCurrent supply arrangementsTerminal equipmentComputer terminal
The invention discloses a method for reducing power consumption of a device, a mobile terminal and a system. The method comprises the following steps of: when the mobile terminal enters a standby mode, capturing a behavior of an application program in a background of the mobile terminal and collecting power consumption data of the behavior of the application program; sending the power consumption data of the behavior of the application program to an application program power consumption analysis database stored in a cloud server for analysis and comparison; receiving and storing an application list limited to be started and fed back and pushed by the application program power consumption analysis database; and forbidding the corresponding application program, in the application list limited to be started, to be started in the background of the mobile terminal when the mobile terminal enters the standby mode. According to the method for reducing the power consumption of the device, the background applications in the system are effectively managed and the applications unnecessary to run in the background are limited, so that the purposes of reducing the power consumption of the device of the mobile terminal and prolonging the service time of the device are achieved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products