Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

198 results about "Component object" patented technology

Component Object Model (COM) is a binary-interface standard for software components introduced by Microsoft in 1993. It is used to enable inter-process communication object creation in a large range of programming languages .

System and method for annotating web-based documents

The present invention allows computer users to integrate any annotation, including ink, highlighter, text-based notes and audio, directly into a Web-based document (WBD) displayed by a Web browser. This integration enables others to view the personalized annotated WBD, which retains its original active links and properties, over the Internet without the need for specialized software. Annotations are integrated into WBDs by freezing the WBD, overlaying an image file containing the annotations onto the WBD, and enabling browser events to pass through the image layer. Annotations may also be integrated into WBDs by using component object technology. The present invention collects and organizes annotated WBDs, and provides users with an intuitive Web-based interface for accessing, viewing and searching the annotated WBDs. Users may annotate blank WBDs, effectively converting their Web browsers into online notebooks / scrapbooks. The present invention also provides users with many novel interface techniques, such as dog-ears and its associated navigation tools, splitting pages, turning pages, selecting and copying various portions of a WBD (including shaking out a copy), and marking menus suited for right-handed or left-handed users.
Owner:MICROSOFT CORP

Data file migration from a mirrored RAID to a non-mirrored XOR-based RAID without rewriting the data

A data storage methodology wherein a data file is initially stored in a format consistent with RAID-1 and RAID-X and then migrated to a format consistent with RAID-X and inconsistent with RAID-1 when the data file grows in size beyond a certain threshold. Here, RAID-X refers to any non-mirrored storage scheme employing XOR-based error correction coding (e.g., a RAID-5 configuration). Each component object (including the data objects and the parity object) for the data file is configured to be stored in a different stripe unit per object-based secure disk. Each stripe unit may store, for example, 64 KB of data. So long as the data file does not grow beyond the size threshold of a stripe unit (e.g., 64 KB), the parity stripe unit contains a mirrored copy of the data stored in one of the data stripe units because of the exclusive-ORing of the input data with “all zeros” assumed to be contained in empty or partially-filled stripe units. When the file grows beyond the size threshold, the parity stripe unit starts storing parity information instead of a mirrored copy of the file data. Thus, the data file can be automatically migrated from a format consistent with RAID-1 and RAID-X to a format consistent with RAID-X and inconsistent with RAID-1 without the necessity to duplicate or rewrite the stored data.
Owner:PANASAS INC

Customizable system for creating supervisory process control and manufacturing information applications

An extensible base process control and manufacturing information application development and execution software suite is disclosed that facilitates streamlined third party (e.g., OEM) development of derivative applications for particular vertical markets. The suite includes an object design toolkit that provides object template derivation tools for accessing and editing a set of base object templates. The objects derivable from the base templates include at least application objects deployed upon lower level hosting component objects of a supervisory process control and manufacturing information application. The toolkit also includes development tools for creating new base object templates that are added as extensions of the set of base object templates.In addition to the toolkit, the suite includes a set of marketing package customization tools facilitating seamlessly integrating changes by developers to the extensible base development and execution software suite. The marketing package customization tools include electronically editable base user documentation.
Owner:SCHNEIDER ELECTRIC SOFTWARE LLC

System and methods for tag library generation

Conventional tag libraries facilitate web page development by referencing external code from within an HTML page via a mnemonic tag, however such conventional tag libraries typically rely on a manually generated set of supporting code. Such supporting code typically requires a thorough knowledge of the underlying code language, such as Java, C++ and Java Server Pages (JSP). A tag library generator for generating the supporting code corresponding to a tag library mitigates the shortcomings of manually generated support code by parsing a metadata file defining the operations and functions provided by the supporting code. The parser extracts components and renderers corresponding to the supporting code. Each of the components may have corresponding properties, and each of the renderers may have corresponding attributes, which the parser also extracts. The tag library generator receives the parsed items, and processes each of the components with corresponding renderers to generate the applicable support code. The support code includes a tag library descriptor defining the tags whose attributes are a combination of component properties and renderer attributes, a tag handler class definition, in which each tag handler class corresponds to a “tag” entry in the TLD file, and component objects for maintaining the state of web output pages.
Owner:ORACLE INT CORP

Distributed object-based storage system that stores virtualization maps in object attributes

A distributed object-based storage system and method includes a plurality of object storage devices for storing object components, a metadata server coupled to each of the object storage devices, and one or more clients that access distributed, object-based files on the object storage devices. A file object having multiple components on different object storage devices is accessed by issuing a file access request from a client to an object storage device for a file object. In response to the file access request, a map is located that includes a list of object storage devices where components of the requested file object reside. The map is stored as at least one component object attribute on an object storage device. The map is sent to the client which retrieves the components of the requested file object by issuing access requests to each of the object storage devices on the list.
Owner:PANASAS INC

Voice and data encryption method using a cryptographic key split combiner

A cryptographic key split combiner, which includes a number of key split generators (42, 48, and 56) for generating cryptographic key splits (32, 34, 36, 38, and 64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and encryption date/time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on biometric data (58). All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The label data may be associated with label categories and subcategories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a software component object may use key splits (32, 34, 36, 38, and 64) which determine which methods and properties are allowed and control access to the memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
Owner:TECSEC

Systems and methods for object-based modeling using composite model object having independently updatable component objects

Embodiments relate to systems and methods for object-based modeling using a composite model object having independently updatable component objects. A modeling client can host modeling logic and an application programming interface (API) to create, access, manipulate, and import / export modeling objects used in modeling applications, such as engineering, medical, financial, and other modeling platforms. In aspects, the source data accepted into the modeling client can include consumer or business-level applications, whose spreadsheet, database or other content can be extracted and encapsulated in extensible markup language (XML) or other object-oriented format. Various model objects can be extracted from source data, and aggregated into a composite model object encapsulating the underlying set of component model objects. In aspects, each of the component model objects can be accessed, updated, and stored independently of the other constituent objects. The modeling client can exchange composite or other modeling objects with external platforms on a programmatic basis.
Owner:RED HAT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products