The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A program is disclosed that generates on one IBM processor complex a unique alphameric key within a 100-year timeframe which is internally in the IBM System/370 architecture representable in 32-bits.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
62% of the total text.
Page 1 of 1
8-Character Alphameric Key for Each Second in Any Century
A program is disclosed that generates on one IBM processor complex a
unique alphameric key within a 100-year timeframe which is internally in the IBM
System/370 architecture representable in 32-bits.
The method generates an identification consisting of the digits 0-9 and the
characters A-F, and guarantees that the same key will not be generated for at
least 100 years.
Up to the year 2000 the generated key starts with the characters C, D, E or F
and therefore complies also with the SAA guidelines for variable names.
The below-described method to create such a key satisfies the above criteria.
The method of operation is shown as a flow diagram.
1. The date and time today is obtained from the Operating System or
2. Most often this can not be achieved in one uninterruptable operation. If
that is the case, the date must be obtained again and compared against the
previously obtained date to make sure that it has not changed. If it has, the loop
must be re-entered at the top. The reason for this check is to avoid that, at times
close to midnight, the date is obtained just before midnight and the time just after
mighnight, resulting in a value which is effectively of yesterday night.
3. The date is transformed to the number of days that have passed since the
beginning of the century considering leap years.
4. The time is transformed to the number of seconds that have passed since