|FREE patent keyword monitoring and additional FREE benefits. REGISTER now for FREE|
USPTO Class 713 | Browse by Industry: Previous - Next | All
01/2008 | Recent | 08: Dec | Nov | Oct | Sp | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 07: D | N | O | S | A | J | J | M | A | M | F | J | | 06: 12 | 11 | 10 | 09 | 8 | 7 | 6 | 5 | 4 | Dec | Nov | | 2010 | 2009 |
Electrical computers and digital processing systems: support January USPTO class listing 01/08Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 01/31/2008 > patent applications in patent subcategories. USPTO class listing
20080028198 - Capacity upgrade on-demand for i/o adapters: A system and method are provided for performing capacity upgrade on-demand operations for input/output (I/O) adapters of a data processing device. The system and method involve providing a data processing device with additional I/O adapters in excess of current I/O capacity requirements of an owner/user of the data processing device.... Agent: Ibm Corp. (wip) C/o Walder Intellectual Property Law, P.C.
20080028200 - Database for storing device handle data in an extensible firmware interface environment: Methods, apparatus, and computer-readable media for providing a device handle database in an EFI environment are disclosed. According to one method, a device handle database is created for storing data identifying the protocols that have been installed on one or more device handles. The database includes a sorted array of... Agent: Hope Baldauff Hartman, LLC
20080028199 - Method for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions: Methods, systems, and media for timed power-on in a logically partitioned environment are disclosed. Embodiments may disclose determining a time period based upon a time to launch a partition and a time of day associated with the next partition to launch. After determining the time period, a timer is set... Agent: Ibm Corporation, Intellectual Property Law Dept 917, Bldg. 006-1
20080028201 - Multi-tiered boot list: An aggregated server blade system includes a plurality of individual server blades and a management module which can be designated as a bootable device. A boot list maintained and executed in each server blade includes a management module entry in its list of bootable devices. In response to the management... Agent: Ibm (rps-blf) C/o Biggers & Ohanian, LLP
20080028202 - Method and apparatus for communicating with an embedded controller within a computing device: A system that communicates with an embedded controller within a computing device. During operation, the system queries the embedded controller to obtain information describing an interface for interacting with a functionality provided by the embedded controller. The system then receives a response from the computing device which includes a reference... Agent: Apple Computer, Inc. C/o Park, Vaughan & Fleming LLP
20080028203 - Information processing apparatus and system and data communication method pertaining to the information processing system: A first information processing apparatus encrypts data that it receives from a second information processing apparatus, and transmits the data thus encrypted to an external device. The second information processing apparatus transmits the data to the first information processing apparatus according to a data size that results after a data... Agent: Rossi, Kimms & Mcdowell LLP.
20080028204 - Client server distributed system, client apparatus, server apparatus, and message encryption method used therefor: When encryption information including an encryption rule, an encryption range, and an encryption key is input to a server apparatus from a local maintenance console in advance, the server apparatus stores the encryption information in an encryption information setting unit, creates an SIP request message including the encryption information, and... Agent: Sughrue Mion, PLLC
20080028207 - Method & system for selectively granting access to digital content: The present invention relates to a system and method for granting access to digital content delivered via a computer network wherein a suitable digital certificate provides a means for providing authorization to access the requested digital content.... Agent: Jackson, Demarco, Tidus & Packenpaugh
20080028205 - Method and apparatus for authenticating a user: A system that authenticates a user on a computer system. During operation, the system receives an authentication request from the user. Next, the system receives a first multimedia data item from the user. The system then performs a transformation on the first multimedia data item. Next, the system determines if... Agent: Intuit, Inc. C/o Park, Vaughan & Fleming LLP
20080028208 - System & method for selectively granting access to digital content: The present invention relates to a system and method for granting access to digital content delivered via a computer network wherein a suitable digital certificate provides a means for providing authorization to access the requested digital content.... Agent: Jackson, Demarco, Tidus & Packenpaugh
20080028206 - Session-based public key infrastructure: A method and system for issuing anonymous, or user-independent, certificates for secure communication over a network, such as the Internet, to provide authentication and automated login to electronic services. A pool of user-independent certificates is generated. Once the user is identified, a user-independent roaming certificate is automatically transferred to the... Agent: Borden Ladner Gervais LLP Anne Kinsman
20080028209 - Method and system for key certification: A method and system for key certification in a public key infrastructure. The infrastructure has a network formed of a plurality of nodes. Each node has a private and public key pair. The nodes are either or both a certifying node and a certified node. A certifying node provides a... Agent: Schmeiser, Olsen & Watts
20080028210 - Packet cipher processor and method: A packet cipher processor and method for realizing fast packet cipher processing. A packet identification unit analyzes a received target packet to identify an applicable policy to the target packet. Then the packet identification unit creates and gives policy information of the identified policy together with the target packet to... Agent: Staas & Halsey LLP
20080028211 - Server apparatus, terminal device, and method for performing ip multicast communication: A presence table stores therein presence information. A storage unit stores therein in associated manner a terminal identifier unique each of a plurality of terminals and an encryption key to be used for multicast communication within a multicast group. A receiving unit receives a subscription request message from a first... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20080028212 - Methods for providing security for ad hoc networked computerized devices: Methods for providing communication security between computerized devices in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted network, and the method includes providing network security apparatus adapted to create security associations between devices on the network, including mutual authentication. The method... Agent: Knobbe Martens Olson & Bear LLP
20080028213 - Apparatus and system for improving computer system security: An apparatus and system for improving computer system security. In one embodiment, an apparatus for improving security includes a housing with a surface for use with a cursor positioning device for a computer system. The apparatus also includes a first member for placing a second object thereon, where the first... Agent: Wagner, Murabito & Hao LLP
20080028214 - Secure flash media for medical records: The invention relates to a secure mobile device for storing data in a secure manner. The secure mobile device has a microarchitecture connected via an interface to flash memory on the device. The microarchitecture is able to authenticate the access of information stored on the secure mobile device using a... Agent: Darby & Darby P.C.
20080028216 - Information processing system, information processing apparatus, information processing method and computer readable medium: An information processing system is provided and includes first and second information processing apparatuses. The first information processing apparatuses includes a license issuing unit that issues a license permitting a utilization of information, and a registration requesting unit that gives a registration request to an information processing apparatus so as... Agent: Sughrue-265550
20080028215 - Portable personal identity information: A user interacts with a client containing personal identity information operable to identify the user to a relying party when the relying party is presented with claims comprising a portion of the personal identity information. The personal identity information includes one or more claims, metadata associated with the one or... Agent: Merchant & Gould (microsoft)
20080028217 - Projector projecting password: A projector system of the present invention includes a projector 10 and a personal computer PC as an information terminal, which communicate with each other via a network connection. The projector 10 generates a password required for establishment of the network connection and projects the password on a screen SC.... Agent: Oliff & Berridge, PLC
20080028218 - Software & license and physical/virtual machine asset management library application with check-out/check-in, front-end asset load, tracking, reporting, reconciliation and associated methods: A method for providing software/license and physical/virtual machine management is disclosed for a specialized asset management system. The specialized asset management system aggregates physical and online software assets and their corresponding license(s), as well as physical and virtual machines into a unified library system wherein assets can be managed, used,... Agent: Jonathon B. Simon
20080028219 - Provisioning privacy on communication networks: An arrangement is disclosed for provisioning privacy settings on a terminal, such as a set top box (“STB), that resides on a shared infrastructure like a coaxial cable network so that conflicts with existing installed terminals are avoided through the use of privacy key that comprises a reserved field and... Agent: Motorola, Inc. Law Department
20080028221 - Additional information processing apparatus, additional information processing system, and additional information processing method: Disclosed is an additional information processing apparatus (10) capable of easily limiting the allowable number of times a content file such as a confidential document can be copied, or capable of easily enabling to check a record of copy events to trace back the copy events. The additional information processing... Agent: Rabin & Berdo, PC
20080028220 - Method and system for verifying documents: A method and system for verifying the authenticity documents using an international computer network. Documents are processed by a central repository (100) and verification information supporting their authenticity generated. Paper documents are scanned into electronic image data and uploaded to a server (101) together with verification information where they can... Agent: Howrey LLP
20080028222 - Security based on subliminal and supraliminal channels for data objects: This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly... Agent: Scott A. Moskowitz
20080028223 - Visual content-based internet search methods and sub-combinations: A camera-equipped portable device captures visual information (e.g., from a movie), ascertains a corresponding identifier, and uses the identifier to enable one or more further functions. One of these can be internet search. Such functionality can also be based on digital data—without requiring a camera capability.... Agent: Digimarc Corporation
20080028224 - Methods and systems for providing integrity and trust in data management and data distribution processes: A method, a system, and computer-readable media having instruction for controlling client devices and server are provided for managing digital data According to one aspect, a method comprises associating digital data with predefined sets of digital data, computing a leaf hash values over some or all of the digital data... Agent: Seed Intellectual Property Law Group PLLC
20080028225 - Authorizing physical access-links for secure network connections: A method of authenticating a network link of a first device to a second device is described. The method includes communicating a challenge request including a challenge value from the first device to the second device, wherein challenge value is unique to the challenge request. The method further includes receiving... Agent: Schwegman, Lundberg & Woessner, P.A.
20080028227 - Information processing system, information processing apparatus, mobile terminal and access control method: An information processing system including a computer and a mobile terminal that can communicate with the computer in a predetermined area is disclosed. In the information processing system, the computer sends code to the mobile terminal, the mobile terminal encrypts user information using the code sent from the computer, and... Agent: Staas & Halsey LLP
20080028226 - System-on-a-chip and method for securely transferring data on a system-on-a-chip: A system-on-a-chip and method for securely transferring data can include a trusted master; a first trusted slave; an untrusted component; and a common bus coupling the trusted master, the first trusted slave, and the untrusted component, In response to an initiation by a host, the trusted master provides a first... Agent: Ingrassia Fisher & Lorenz, P.C. (fs)
20080028228 - Method and system for access authentication: A method and a system for access authentication. A shared services resource includes a second factor authentication module. At least one network resource each include a first factor authentication module. A trusted computing base communicates with the shared services and the at least one network resource through a pipe. An... Agent: Schwegman, Lundberg & Woessner, P.A.
20080028229 - Authenticated remote pin unblock: This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases are hashed and stored inside the security token for future comparison. A local... Agent: Stevens, Davis, Miller & Mosher, L.L.P.
20080028230 - Biometric authentication proximity card: A biometric proximity card and an access system cooperating with such card are disclosed. The card has a biometric sensor, and a memory storing a reference biometric datum, for example, a fingerprint, for an authorized user. Only when a biometric datum of an actual user matches the stored biometric datum,... Agent: Drinker Biddle & Reath Attn: Intellectual Property Group
20080028232 - Key sequence recognition and password hardening system and method: A user recognition and identification system and method to identify keyboard users. Key text is evaluated against previously recorded keystrokes by the user for the presence of repeatable patterns that are unique to an individual. Rhythms associated with passwords are screened compared to a database of banned rhythms.... Agent: Duane Morris LLP
20080028231 - Key sequence trustable activation recognition system and method: A user recognition and identification system and method to identify keyboard users. Key text is evaluated against previously recorded keystrokes by the user for the presence of repeatable patterns that are unique to an individual. User profiles are updated as their repeatable patterns slowly change over time.... Agent: Duane Morris LLP
20080028233 - Lsi design method and verification method: An encryption process is employed in the LSI design so as to improve confidentiality of the circuit design data over conventional examples. In the encryption process, confidential circuit design data is encrypted to produce encrypted design data and a cipher key. The encrypted design data is provided to the user... Agent: Mcdermott Will & Emery LLP
20080028234 - Method and system for secure content distribution: A system on a chip (SOC) device is disclosed comprising external outputs, and external inputs. A first secure storage location is operably decoupled from all of the external outputs of the SOC device during a normal mode of operation. By being decoupled from all external outputs, representations of the data... Agent: Larson Newman Abel Polansky & White, LLP
20080028235 - System and method for authenticating a gaming device: A method and system are provided for authenticating and securing an embedded device using a secure boot procedure and a full non-volatile memory encryption process that implements Elliptic Curve Pinstov-Vanstone Signature (ECPV) scheme with message recovery on a personalized BIOS and master boot record. The signature includes code that is... Agent: Blake, Cassels & Graydon LLP
20080028236 - Method and apparatus for controlling heat generation in a multi-core processor: The disclosed methodology and apparatus may reduce heat generation in a multi-core processor. In one embodiment, a multi-core processor cycles selected processor cores off in a predetermined pattern across the processor die over time to reduce the average heat generation by the processor. The disclosed multi-core processor may reduce or... Agent: Mark P. Kahler
20080028237 - Power management using integrated data and power interfaces: A single data and power interface, or combination of several such integral data and power interfaces, are used to manage power across one or more batteries and external input power sources. In one embodiment, an interface may be capable of sinking power in order to charge a battery, and then... Agent: Krajec Patent Offices, LLC
20080028238 - Selective power-on of hard disk drives within and across multiple drive enclosures and power supply domains: To prevent current inrush from exceeding power limitations of a power supply or a power domain in a multiple disk drive system the drives are powered-on in a controlled sequence. In a multi-drive blade storage subsystem, a subsystem control module inventories the locations of the hard drives in one or... Agent: Law Office Of Dan Shifrin, PC - Ibm
20080028240 - System and method for controlling processor low power states: A next idle state for a processor in a system may be determined based on a previous idle period and a previous idle state. The next idle state for the processor may also be determined based on times when interrupts are generated by devices in the system.... Agent: Intel Corporation C/o Intellevate, LLC
20080028239 - System for managing the power source life between multiple individually powered devices in a wired system and method of using same: A power management system (100) includes a group of individually powered electronic devices (101-107) connected with a power management controller (109). The power management controller (109) operates to determine the operation and charge of each power source of the electronic devices (101-107) for managing the power source life of at... Agent: Motorola, Inc Intellectual Property Section
20080028241 - Power source control method of image forming apparatus, power source control system of image forming apparatus, power source control apparatus, image forming apparatus and computer program product: A control unit 51 obtains a user ID of a user who enters a room from card reading information read by card readers so as to judge existence or nonexistence of an available image forming apparatus which has been judged in advance in accordance with the obtained user ID. The... Agent: Edwards Angell Palmer & Dodge LLP
20080028242 - Method of remotely controlling the power consumption of one or more servers: An embodiment of a method for remotely controlling power consumption of at least one server, including providing remote control to an administrator over a power state of at least one server, building an instruction command and encoding it into a suitable format for transport over a data network from an... Agent: Hewlett Packard Company
20080028243 - Information processing apparatus and a controlling method for an information processing apparatus: According to one embodiment, an information processing apparatus including a CPU, a volatile memory device, a nonvolatile memory device, a first control unit which changes a system to a suspended state whereby the operation of the CPU is stopped while continuing power supply to the volatile memory device which stores... Agent: Knobbe Martens Olson & Bear LLP
20080028244 - Method and apparatus for monitoring and controlling heat generation in a multi-core processor: The disclosed methodology and apparatus may control heat generation in a multi-core processor. In one embodiment, each processor core includes a temperature sensor that reports temperature information to a processor controller. If a particular processor core exceeds a predetermined temperature, the processor core disables that processor core to allow it... Agent: Mark P. Kahler
20080028245 - Portable computing platform having multiple operating modes and heterogeneous processors: A portable computer system such as a laptop computer, for example, includes a first processor that may execute instructions corresponding to application software during a first mode of operation. The portable computer system also includes a second processor that may execute the instructions during a second mode of operation. The... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel (amd)
20080028246 - Self-monitoring and self-adjusting power consumption computer control system: Methods and apparatus are described for self-monitoring and self-adjusting power consumption computer control system. A method includes measuring power consumption of a variable power requirement load by a power monitor; and controlling power requirement of the variable power requirement load by sending from the power monitor i) a down_power interrupt... Agent: John Bruckner, P.C.
20080028247 - Data storage apparatus, power control, method, and communication apparatus: A data storage apparatus includes a memory, a monitoring unit for monitoring an unauthorized action on data stored in the memory, a first power supply for supplying power to the monitoring unit, and a power storage unit which supplies power to the monitoring unit when supply of the power from... Agent: Bell, Boyd & Lloyd, LLP
20080028248 - Integrated circuit having frequency dependent noise avoidance: An integrated circuit includes first, second and third circuits, a clock module and a rate adapting module. The first circuit causes frequency dependent noise and is clocked based on a clock signal. The second circuit is rate dependent and is clocked based on an operation dependent clock signal. The third... Agent: Garlick Harrison & Markison
20080028250 - Method, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency: A method, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency. Independent clock signals are generated at predetermined clock frequency targets in response to control signals that are based on a determined bus clock frequency.... Agent: David W. Lynch Chambliss, Bahner & Stophel
20080028249 - System and method for adaptive frequency scaling: A system and method provide adaptive frequency scaling for predicting the load on a processing unit and dynamically changing its clock frequency while keeping the synchronization with other processing units. The amount of data in an input memory waiting to be processed is a good indicator of the current load... Agent: Graybeal, Jackson, Haley LLP
20080028251 - Communication system, communication method, action execution apparatus, and program in action execution apparatus: The present invention relates to a communication system/method including a message export section/step of exporting a message to a user terminal through a communication network on the basis of a preset export condition, a reply confirming section/step of receiving from the user terminal through the communication network a reply to... Agent: Mcginn Intellectual Property Law Group, PLLC
20080028253 - Bus having a dynamic timing bridge: A data processing system may comprise an initiator device having an output whose timing is referenced by a clock input alone corresponding to a first delay along a signaling path. The exemplary data processing system further may further comprise a target device having an input whose timing is referenced by... Agent: Freescale Semiconductor, Inc. Law Department
20080028252 - Clustered variations-aware architecture: Methods and apparatus to provide a clustered variations-aware architecture are described. In one embodiment, one or more variations within a clock domain are detected and utilized to adjust a clock signal of the clock domain.... Agent: Caven & Aghevli C/o Intellevate
20080028254 - Directly obtaining by application programs information usable in determining clock accuracy: Information usable in determining the quality of time produced by a clock of a processing environment is obtained. The information is obtained directly by an application program absent use of a supervisor service, such as an operating system or operating system service. The application program invokes an instruction that returns... Agent: Heslin Rothenberg Farley & Mesiti P.C.
20080028257 - Clock control circuit and integrated circuit: A clock management control circuit of the present invention is a clock control circuit for supplying a valid clock signal to a target circuit in accordance with a system clock signal. When a valid input instruction signal indicating timings of data input to the target circuit changes from a disabled... Agent: Robert J. Depke Lewis T. Steadman
20080028255 - Clock control method and apparatus for a memory array: A clock control method and apparatus are provided employing a clock control circuit which generates an array clock for a memory array from a system clock and a reset control signal. The reset control signal is one of a plurality of input control signals to the clock control circuit. When... Agent: Heslin Rothenberg Farley & Mesiti P.C.
20080028256 - Structure for dynamically adjusting pipelined data paths for improved power management: A design structure embodied in a machine readable medium used in a design process, the design structure including a system for dynamically varying the pipeline depth of a computing device, depending upon at least one of computing function and workload, the system further comprising a state machine configured to determine... Agent: Cantor Colburn LLP-ibm Burlington01/24/2008 > patent applications in patent subcategories. USPTO class listing
20080022083 - Electronic device having improved security: An electronic device comprising an embedded computer system is provided. The device comprises a processor supporting a real-time operating system (RTOS). The processor further supports user and supervisor modes. The computer system is programmed such that only code portions directly controlling essential hardware in the device are run in supervisor... Agent: Silverbrook Research Pty Ltd
20080022084 - System and method for securing a network: A secure network is disclosed. The secure network includes a residential gateway to communicate with a remote network and a local network. At least one trusted local device is configured to send communications including data packets with authentication information to the residential gateway to request access to resources of the... Agent: Toler Schaffer, LLP
20080022086 - Methods and system for a key recovery plan: Methods, systems and computer readable mediums are provided for recovering subject keys and/or certificates for a token. A unique identifier associated with the token is obtained. The token is associated with subject keys and with a first status of statuses, the statuses including a lost status state and an other... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20080022087 - Multifunction device, method of controlling multifunction device, multifunction device control system, program, and recording medium: A multifunction device includes: a control command receiving section for receiving a control command from a control device; a criterion storage section for storing criterion in which command type information indicating control command types is associated with information indicating whether an authentication process is necessary or not; a command type... Agent: Edwards Angell Palmer & Dodge LLP
20080022085 - Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system: In a server-client computer network system, for carrying out cryptographic operations via a network between a client computer workstation and a cryptography server computer system, in the client computer workstation and in the cryptography server computer system, computer software programs which are set up to communicate with each other are... Agent: Paul, Hastings, Janofsky & Walker LLP
20080022090 - Information processing apparatus capable of communicating with external authentication device: Authentication information necessary for authentication processing at an external authentication device is restricted to be transmitted from a user terminal to an information processing apparatus without being encrypted. The information processing apparatus restricts transmission of information that allows a user to select authentication processing at an external authentication device in... Agent: Canon U.s.a. Inc. Intellectual Property Division
20080022088 - Methods and systems for key escrow: An embodiment pertains generally to a method of storing keys. The method includes receiving a request for generating a subject private key at a token processing system and generating a subject key pair, where the subject key pair includes a subject public and the subject private key. The method also... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20080022089 - Security system for handheld wireless devices using-time variable encryption keys: In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as PDA, smartphone, cellular... Agent: Rothwell, Figg, Ernst & Manbeck, P.C.
20080022091 - Secure communications: There are disclosed processes and systems for establishing secure, communication channels between computing devices. The computing devices include respective agents which verify the relative identity of one another and thereby authenticate the communication channel. The agents continue to play a role in the communications to ensure that the communication channel... Agent: SocalIPLaw Group LLP
20080022092 - Communication system and network control apparatus with encryption processing function, and communication control method: A communication system, which performs communication using a transmission packet encrypted by an IP-SEC encrypting method, includes a first encrypting circuit that encrypts a transmission packet by an IP-SEC encrypting method, a second encrypting circuit that encrypt header data to be used to decode the transmission packet encrypted by the... Agent: Sughrue Mion, PLLC
20080022095 - Information access control method and device and write-once medium: According to one embodiment, an access management system such as an AACS is used to protect highly confidential information recorded in a write-once medium. To first prepare a title key file for encryption by the AACS, title keys are prepared as many as the number of rules of a usage... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20080022094 - Method, apparatus and system for offloading encryption on partitioned platforms: A method, apparatus and system enable offloading of encryption on partitioned platforms. More specifically, a partitioned platform may include a user partition for user applications, including a Virtual Private Network (“VPN”) application capable to creating a VPN connection for secure packet transmission. The partitioned platform may additionally comprise a dedicated... Agent: Intel Corporation C/o Intellevate, LLC
20080022096 - Information access control method and apparatus: According to one embodiment, an access control system such as an AACS is used to protect highly confidential data. At the time of powered-on after powered-off due to a power suspension, when a backup file of Read Write MKB exists, the generation of three key files is inspected. According to... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20080022098 - Authentication process: A process for authenticating products from a remote location using existing communication devices and communication networks is described. The process may comprise authentication information, a group identifier, and/or response code associated with a product. The process may provide for easy authentication of product from a remote location in a cost... Agent: John S. Pratt - 38949 Kilpatrick Stockton LLP
20080022097 - Extensible email: A computer-implemented method and system for obtaining data is provided. In the method, to obtain data pertaining to another party, a request for an authentication key is made. Upon receiving the requested authentication key in an email, the method and system automatically send the authentication key as part of a... Agent: Westman Champlin (microsoft Corporation)
20080022099 - Information transfer: Methods and apparatus are provided for securely inputting highly confidential information, exchanging the information via a network, and securely reflecting the information in a computer, without the information being stolen by malicious software. Upon a transfer of encrypted information from a server to a computer, the transferred information is stored... Agent: Ference & Associates LLC
20080022100 - Trusted and secure techniques for item delivery and execution: Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20080022101 - Data transmission method and apparatus: A method and apparatus for data transmission are provided. The method includes receiving, at a first device, information used for security of data transmission from a second device using Radio Frequency Identification (RFID); and transmitting data from the first device to the second device based on the received information. The... Agent: Sughrue Mion, PLLC
20080022102 - Software protection using data structures: Software protection using data structures is described. In one implementation, an engine between the processor and the memory of a computing device encrypts and stores data and program variables in blocks of memory that correspond to nodes of a tree-like data structure. When accessed, the nodes of this search tree... Agent: Lee & Hayes PLLC
20080022104 - Method and system for managing network: A network management method and system is provided that issues a digital certificate easily and safely. A digital certificate is issued to a personal computer that is to newly join a network by the following method. A provisional authentication server issues a first digital certificate that is a provisional certificate... Agent: Sidley Austin LLP
20080022103 - System and method for provisioning device certificates: A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The communication network includes a mobile data server. An activation request is initiated to the mobile data server for activating the... Agent: Gowling Lafleur Henderson LLP
20080022106 - Detection of frequent and dispersed invariants: A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection... Agent: Amin, Turocy & Calvin, LLP
20080022107 - Document automation systems: The present invention relates to document automation/assembly systems, and more particularly to document automation systems distributed over a network such as the Internet, and/or other communication networks. In addition, the present invention relates to methods, especially computer-implemented methods, to computer programs, and to recording media storing such programs for use... Agent: Patrick G. Burns Greer, Burns & Crain, Ltd.
20080022109 - Electronic data disclosure method and system: An electronic data disclosure system including a submitter device, an electronic disclosure device, and a reader device is provided. The submitter device is configured to execute the steps of, creating submission data and transmitting the submission data to the electronic disclosure device. The electronic disclosure device is configured to execute... Agent: Mcdermott Will & Emery LLP
20080022110 - Message authentication system and message authentication method: A message authentication system includes a sender for sending a content message having a content and a signature, and a receiver for receiving the content message. The sender includes a first one-way hash function calculator for calculating a hash value of the content, and a decryption function calculator for decrypting... Agent: Rabin & Berdo, PC
20080022108 - Method and apparatus for verifying authenticity of initial boot code: A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.... Agent: Blakely Sokoloff Taylor & Zafman
20080022112 - Coded data associated with an object and encoding a distributed signature: An object associated with a surface that has coded data disposed thereon or therein. The coded data includes a number of coded data portions, each of which encodes an identity of the object. In addition, each coded data portion encodes at least part of a signature that is a digital... Agent: Silverbrook Research Pty Ltd
20080022111 - Electronic signatures: Methods, apparatus, including computer program products, and systems implement and use techniques relating to electronic signatures. In one implementation, a one-way hash is calculated for an electronic document and a digital watermark representing the one-way hash is embedded in a signature document. Based on a user input, the signature document... Agent: Fish & Richardson, P.C.
20080022105 - Method and apparatus for generating and verifying digital signature: Disclosed are a method and apparatus capable of reducing the number of computations required to generate a digital signature by a digital signature generator. A digital signature generator generates a code word for a received message by a function F for generating a code word having a set weight value... Agent: Sughrue Mion, PLLC
20080022113 - Optimization methods for the insertion, protection and detection of digital of digital watermarks in digital data: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in... Agent: Scott A. Moskowitz
20080022114 - Optimization methods for the insertion, protection, and detection of digital watermarks in digital data: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in... Agent: Scott A. Moskowitz
20080022115 - Method and system for electronic graffiti: A system (100) and method (800) for electronic graffiti includes a plurality of graffiti nodes serving as a plurality of wireless access points 102, a server 103 coupled to the plurality of wireless access points, a mobile wireless device (101 or 700) having at least a local area transceiver (706)... Agent: Akerman Senterfitt
20080022116 - Time stamp apparatus, time correcting method, and time correcting program: A time stamp apparatus that carries out e-signature including local time based on the local time output from an internal clock, includes an authentication time requesting unit that requests a time publishing apparatus for publishing an authentication time synchronous with standard time to publish the authentication time, an authentication time... Agent: Greer, Burns & Crain
20080022117 - Enabling access to more than one encrypted data segment of a segmentable data stream: A system and method for enabling access to more than one encrypted data segment of a segmentable data stream wherein the data stream includes a plurality of the encrypted data segments is disclosed. A relationship between at least two encrypted data segments to be accessed is determined. A key is... Agent: Hewlett Packard Company
20080022118 - Information processing apparatus and control method thereof: According to one embodiment, there is provided an information processing apparatus including: a status determining unit that determines whether or not the information processing apparatus is in a password input status under which allowing a user to input a password by a keyboard; a sound generating unit that generates an... Agent: Knobbe Martens Olson & Bear LLP
20080022119 - Method and apparatus for preventing illegal access in electronic device: An apparatus and a method for preventing illegal access of a system in an electronic device are provided. The method includes when an event for accessing a system occurs, requesting a visitor to input a password; determining whether a prohibition key, set in advance, is contained in the password input... Agent: The Farrell Law Firm, P.C.
20080022120 - System, method and computer program product for secure access control to a storage device: A method for accessing a storage device, the method includes: receiving, by storage device, a block based storage access command and cryptographically secured access control information; wherein the block based storage access command and the cryptographically secured access control information are associated with at least one fixed size block of... Agent: Ibm Corporation, T.j. Watson Research Center
20080022122 - Methods and systems for entropy collection for server-side key generation: Embodiments of the present invention provide a multiple source entropy feed for a PRNG that is used to generate server-side encryption keys. In particular, embodiments of the present invention provide a data recovery manager that collects additional entropy sources that feed into the PRNG between each key generation. The entropy... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20080022121 - Methods and systems for server-side key generation: An embodiment pertains generally to a method of generating credentials for a token. The method includes detecting the token and the server determining that the token is to be enrolled and generating a subject key pair within the server, where the subject key pair includes a subject public key and... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20080022123 - Information processing terminal and program for use therewith: An information processing terminal includes: a first IC card chip constituted by a first control unit, a first storage unit configured to store applications to be processed by the first control unit, a first encryption unit configured to encrypt data created by any of the applications in the first storage... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20080022125 - Copy protection of optical discs: To copy protect an optical disc, such as a DVD, program chains additional to the main program chain are provided. These program chains may lead to the genuine data but in an incomplete or incorrect order or to false data. Sufficient additional program chains are provided to make it difficult... Agent: Patent Department Macrovision Corporation
20080022124 - Methods and apparatus to offload cryptographic processes: Methods and apparatus to off-load cryptographic processes are disclosed. An example method includes receiving a request to perform a cryptographic process at a first component of a processor system, transmitting the request over a data bus to a second component of a processor system, receiving the request at the second... Agent: Hanley, Flight & Zimmerman, LLC
20080022126 - Method to protect a cryptographic assembly by homographic masking: the function f operating on masked variables, characterised in that, for any k, if x is an input and y=f(x+k) an output of the function f, to pass directly from a masked value x+m_i (additive masking of type XOR) to a masked value y+m_j, the method consists in performing this... Agent: The Jansson Firm
20080022129 - Secure platform voucher service for software components within an execution environment: Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically... Agent: Molly A. Mccall Intel Corporation
20080022127 - Security module: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The... Agent: Lieberman & Brandsdorfer, LLC
20080022128 - System for providing a trustworthy user interface: The preferred embodiment of the invention comprises a computer system which employs a trusted display processor (260), which has a trusted processor (300) and trusted memory (305, 315, 335, 345) physically and functionally distinct from the processor and memory of the computer system. The trusted display processor (260) is immune... Agent: Hewlett-packard Company Intellectual Property Administration
20080022130 - Device and method for a secure execution of a program: A device according to the present invention is configured for a secure execution of a program including a sequence of program commands, wherein the program commands include commands of use and checking commands. The device includes a means for executing the program commands. The means for executing the program commands... Agent: Dickstein Shapiro LLP
20080022134 - Secure data storage for protecting digital content: A non-copyable data storage disk (NCDisk) that may be used in a secure data storage system. Stored data items on the NCDisk may only be used through the data storage system, and cannot be copied to and used by any other devices. Digital data written to the NCDisk is automatically... Agent: Synnestvedt Lechner & Woodbridge LLP
20080022132 - Storage device controlled access: Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key... Agent: Woodcock Washburn LLP (microsoft Corporation)
20080022133 - System and method for securing information by obscuring contents of a persistent image: Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file system when accessing the persistent image. The data set indicates a visibility status of the files or directories in the persistent image.... Agent: Weingarten, Schurgin, Gagnebin & Lebovici LLP
20080022131 - Information processing apparatus, information recording medium manufacturing method, and computer program: An information recording medium manufacturing method includes the steps of: determining an encryption mode of each sector, which serves as an encrypt processing unit; generating encrypted data having different variations by using a plurality of cryptographic keys for a segment portion; generating encrypted data by using a single cryptographic key... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080022135 - Method and apparatus for uploading mass-distributed content to a server: One embodiment of the present invention provides a system that facilitates uploading content from a client to a server. Upon receiving content, the client divides the content into smaller data-blocks of a predetermined size. Once the content has been divided, the client computes a codeword for each data-bock. Next, the... Agent: Apple Computer, Inc. C/o Park, Vaughan & Fleming LLP
20080022136 - Encryption load balancing and distributed policy enforcement: To achieve encryption load balancing, a dispatcher, in communication with one or more engines, delegates one or more requests to the one or more engines. The engines execute cryptographic operations on data. The dispatcher may implement one or more load balancing algorithms to delegate requests to engines in accordance with... Agent: Edwards Angell Palmer & Dodge LLP
20080022137 - Systems and methods for secure transaction management and electronic rights protection: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information.... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20080022138 - Computer security system: A computer security system includes a motherboard, a power supply, and a lock. The power supply supplies power to the motherboard via a power supply circuit. The lock includes a key, and the lock is electrically connected between the motherboard and the power supply. The key controls open and closed... Agent: PCe Industry, Inc. Att. Cheng-ju Chiang Jeffrey T. Knapp
20080022139 - Power supply apparatus and operation-mode determining unit and method thereof: A power supply apparatus and an operation-mode determining unit and a method thereof are provided. The power supply apparatus includes first and second control units, a switching unit, a power output unit, and an operation-mode determining unit. The first and second control units provide first and second control signals respectively.... Agent: Jianq Chyun Intellectual Property Office
20080022140 - Soc power management ensuring real-time processing: A chip (1) includes: a resource manager (2); various kinds of functional blocks (3-6); a thermal sensor (13); and a performance counter (15). The resource manager manages tasks that the functional blocks execute, and determines a task progress (38) for each task from an activated ratio (α) provided from the... Agent: Miles & Stockbridge PC
20080022141 - Queued locks using monitor-memory wait: A method, apparatus, and system are provided for monitoring locks using monitor-memory wait. In one embodiment, a memory to store instructions to perform functions of a monitoring mechanism is provided. The monitoring mechanism having a first logic to cause a processor to exit a sleep state in response to an... Agent: Intel/blakely
20080022142 - Multiprocessor system, synchronization control apparatus and synchronization control method: The object of the present invention is to provide a multiprocessor system that is capable of performing hierarchical parallel processing. The multiprocessor system includes a plurality of element processors and a plurality of synchronization control units respectively corresponding thereto. The synchronization control units are connected together for receiving and transmitting... Agent: Wenderoth, Lind & Ponack L.L.P.
20080022143 - Linear burst mode synchronizer for passive optical networks: The present invention discloses a host receiver synchronizer for passive optical networks, and in particular a burst clock data recovery circuit in a host receiver in a bursty asynchronous communication system having a non-data preamble of less than 250 ns, for recovering a clock signal from a subscriber data burst.... Agent: Nath & Associates, PLLC
20080022144 - Data transfer control device and electronic instrument: A data transfer control device includes an OUT-transfer transmitter circuit which transmits OUT data by driving a serial signal line, a clock-transfer transmitter circuit which transmits a clock signal CLK by driving a serial signal line, a PLL circuit which generates the clock signal CLK, and a power-down setting circuit... Agent: Oliff & Berridge, PLC
20080022145 - Dram interface circuits that support fast deskew calibration and methods of operating same: A DRAM interface circuit includes a clock generation circuit configured to generate a plurality of internal clock signals and skew data in response to a plurality of data strobe signals (DQS) received at an interface of the integrated circuit device. A data capture circuit is also provided. The data capture... Agent: Myers Bigel Sibley & Sajovec
20080022146 - Differential power analysis: Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target... Agent: Sonnenschein Nath & Rosenthal LLP
20080022147 - Electronic apparatus capable of outputting data in predetermined timing regardless of contents of input data: Simply constituted electronic apparatus that can definitely output an outputted data after predetermined length of time from a time when an inputted data processing is started, even if data processing time of the inputted data varies with the contents of the data.... Agent: Harness, Dickey & Pierce, P.L.C01/17/2008 > patent applications in patent subcategories. USPTO class listing
20080016331 - System and method for monitoring configuration changes in a document processing device: The subject application is directed to a method and system for notifying an administrator when a user of a document processing device requests a change in the configuration of the device. A user accesses the device via a user interface, requesting alteration of the device configuration. The user then provides... Agent: Tucker Ellis & West LLP
20080016332 - System for providing security in a network comprising communications devices: A system for providing communications security and authentication to a plurality of computerized devices is disclosed. In one embodiment, the system is useful with an untrusted network, and comprises security apparatus adapted to create associations with a plurality of security devices on the network. Traffic between the associated devices may... Agent: Knobbe Martens Olson & Bear LLP
20080016333 - Method and system for remote password based authentication using smart cards for accessing a communications network: The present invention discloses a method and system for remote password based authentication using smart cards for accessing a communications network. The disclosed method does not require a remote authentication sever to maintain a table of passwords for all users. The disclosed method and system also support mutual authentication. It... Agent: Howard Chen, Esq., Kirkpatrick & Lockhart Preston Gates Ellis LLP
20080016334 - System, method and apparatus for securely exchanging security keys and monitoring links in a ip communications network: The present invention provides a system, method and apparatus for securely exchanging security keys and monitoring links in an IP communications network. The apparatus is disposed between the local device and the remote device and receives a security key associated with the secure communication(s) for the local device. The apparatus... Agent: Chalker Flores, LLP
20080016335 - Attribute certificate verification method and system: Upon issuance of an attribute certificate, an attribute authority apparatus makes a determination policy available. The determination policy includes information designating at least one item to be checked by a service provider apparatus for determination to be made to verify the attribute certificate, and a criterion for the determination. The... Agent: Antonelli, Terry, Stout & Kraus, LLP
20080016336 - Generic public key infrastructure architecture: Methods, apparatuses and modules for creation of a generic public key infrastructure by use of established trust, wherein trust between a client and a registration authority is established, and an enrolled certificate is furnished in a secure manner to the client by use of the established trust. The present invention... Agent: Foley & Lardner LLP
20080016337 - Client apparatus and method with key manager: In some embodiments, an apparatus comprises a certificate store to store a current certificate associated with a key pair including a current public key and a current private key; a policy decision point (PDP) module to monitor the certificate store and to ascertain whether the current certificate has expired or... Agent: Schwabe, Williamson & Wyatt, P.C.
20080016338 - System and method for secure wireless multi-hop network formation: The present invention provides methods and devices for a security architecture for use in wireless multi-hop networks. A method for implementing pair-wise encryption key establishment, network node authentication and determining tunnel encryption keys is provided in a following manner. In a multi-hop wireless network including a plurality of network nodes,... Agent: Smart & Biggar P.o. Box 2999, Station D
20080016339 - Application sandbox to detect, remove, and prevent malware: The disclosed invention is a new method and apparatus for protecting applications from local and network attacks. This method also detects and removes malware and is based on creating a sandbox at application and kernel layer. By monitoring and controlling the behavior and access privileges of the application and only... Agent: Jayant Shukla
20080016340 - System for providing security for ad hoc networked computerized devices: A system adapted to provide communication security between computerized devices in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted network, and the system includes network security apparatus adapted to create security associations between devices on the network, including mutual authentication. Traffic... Agent: Knobbe Martens Olson & Bear LLP
20080016341 - Method, apparatus, and program product for enabling access to flexibly redacted content: A capability key is generated that provides access to sensitive information within a selectively encrypted data unit created from an unencrypted data unit. A user specifies access rights as a monotone boolean relationship between a selection of a list of attributes related to the unencrypted data unit. This relationship is... Agent: Fay Sharpe / Xerox - Parc
20080016343 - Methods of operating a portable communications device with enhanced security: Methods of operating a portable communications device so as to provide communications security and user identification and authentication. In one embodiment, the method comprises placing the device in communication with an untrusted network, and using its security apparatus for creating associations with one or more security devices on the network.... Agent: Knobbe Martens Olson & Bear LLP
20080016345 - Portable computerized device with network security: A portable computerized device useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the portable device comprises network security apparatus adapted to create associations with other network security devices on the network. Traffic between the associated devices may be... Agent: Knobbe Martens Olson & Bear LLP
20080016342 - Recording medium, content player, content player method, and computer program: To provide a recording medium on which an entire piece of decryption information that is required to be highly secure is recorded while being kept secure even when it is larger in data size than the storage capacity of an area originally intended for recording it. A recording medium in... Agent: Paul, Hastings, Janofsky & Walker LLP
20080016344 - System for providing security in a network comprising computerized devices: A system useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the system includes network security apparatus adapted to create security associations between devices on the network, including mutual authentication. Traffic between the associated devices may be encrypted for... Agent: Knobbe Martens Olson & Bear LLP
20080016349 - Hidden identification: A method, apparatus, and article of manufacture limit unauthorized access to digital services. A hidden non-modifiable identification number is embedded into a nonvolatile memory component. The hidden number uniquely identifies a device containing the nonvolatile memory component and access to digital services is based on rights associated with the hidden... Agent: The Directv Group, Inc. Patent Docket Administration
20080016348 - Method and system for controlled distribution of application code and content data within a computer network: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms... Agent: Cardinal Law Group
20080016347 - Systems and methods of user authentication: Various embodiments of the invention provide enhanced authentication solutions, including without limitation methods, systems and software programs for authenticating an entity and/or for facilitating such authentication. In accordance with certain embodiments, an entity (such as a user, a computer, etc.) attempts to authenticate in order to use a resource (such... Agent: Townsend And Townsend And Crew LLP
20080016346 - Use of bilinear mappings in cryptographic applications: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first... Agent: Hewlett Packard Company
20080016351 - Authentication method for ic cards: An authentication method between a first IC card and a second IC card interconnected through a terminal includes transmitting an identification number from the second IC card to the first IC card for deriving and storing a key in the first IC card. An authentication number is generated and stored... Agent: Allen, Dyer, Doppelt, Milbrath & Gilchrist P.A.
20080016350 - Method and apparatus for providing a key for secure communications: A method and apparatus for providing a key for secure communications is provided herein. During operation a node wishing to join a network, will authenticate with an authentication server and then derive a pairwise key (e.g., a Pair-wise Transient Key (PTK)) used for encryption of unicast traffic. The node will... Agent: Motorola, Inc.
20080016352 - Method and apparatus for maintaining ephemeral keys in limited space: One embodiment of the present invention provides a system that maintains keys using limited storage space on a computing device, such as a smart card. During operation, the system receives a request at the computing device to perform an operation involving a key. While processing the request, the system obtains... Agent: Sun Microsystems Inc. C/o Park, Vaughan & Fleming LLP
20080016353 - Method and system for encoding signatures to authenticate files: Method and system for verifying the authenticity and integrity of files transmitted through a computer network. Authentication information is encoded in the filename of the file. In a preferred embodiment, authentication information is provided by computing a hash value of the file, computing a digital signature of the hash value... Agent: Schmeiser, Olsen & Watts
20080016354 - System and method for secure remote access: A method and apparatus for directing a client to establish a secure connection with a server across a public network. The server and the client exchange a Server Authentication Public Key, a Client Authentication Public Key, and a Remote Service Unique Identifier (RSUID) during a registration process. In one embodiment,... Agent: Edell, Shapiro, & Finnan, LLC
20080016355 - Remote control method enabling a user to control the operation of a receiving unit: The invention relates to a method for an operator to have remote control over the use of reception equipment in a digital data broadcasting network. This method comprises the following steps: a—defining a set of tests that can be remotely activated in said reception equipment and the results of which... Agent: Pearne & Gordon LLP
20080016356 - Facsimile transmission authentication: A facsimile system and method provides authentication of transmitted image information, which authentication may be in the form of a signature page. An authentication device computes authentication information at a sending device, a receiving device, both, or at a remote location during transmission. The signature page may also be transmitted... Agent: Weingarten, Schurgin, Gagnebin & Lebovici LLP
20080016357 - Method of securing a digital signature: A method of securing a digital signature in a networked computer system. A user having a user private key and a user public key obtains a digital certificate from a certificate authority. The user takes an overt action showing the intent to sign an artifact initiating a signing ceremony. The... Agent: Kennedy Covington Lobdell & Hickman, LLP
20080016358 - System and method for authentication of transformed documents: A document verification system and method verifies that a content of two documents match based on comparison of an authentication signature generated from each of the documents. The documents may be electronic text documents and may be transformed representations of each other through imaging, printing or image processing. Authentication signatures... Agent: Weingarten, Schurgin, Gagnebin & Lebovici LLP
20080016364 - Authentication processor using a signature part: A method of authenticating an object using a processor that receives indicating data generated in response to sensing of coded data. The indicating data is indicative of an identity of the object and, at least part of a signature, the signature being a digital signature of at least a part... Agent: Silverbrook Research Pty Ltd
20080016362 - Coded data including a distributed signature: Coded data for disposal on or in a surface that includes a number of coded data portions. Each coded data portion encodes an identity of an object or the like associated with the surface. In addition, each coded data portion encodes at least part of a signature that is a... Agent: Silverbrook Research Pty Ltd
20080016365 - Data protection method and device: An apparatus and method for encoding and decoding additional information into a digital information in an integral manner. More particularly, the invention relates to a method and device for data protection.... Agent: Scott A. Moskowitz
20080016360 - Digital watermarks for checking authenticity of printed objects: The invention provides methods for embedding digital watermarks for authentication of printed objects, and corresponding methods for authenticating these objects. One aspect of the invention is a method of embedding a digital watermark in a digital image to be printed on an object. The method embeds an auxiliary signal in... Agent: Digimarc Corporation
20080016363 - Remote authentication of an object using a signature encoded in a number of data portions: A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data and is indicative of an identity of the object and a plurality of signature fragments, the signature being a digital... Agent: Silverbrook Research Pty Ltd
20080016359 - System and method for compressing secure e-mail for exchange with a mobile data communication device: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message... Agent: Patent Group 2n Jones Day
20080016361 - Trusted and secure techniques for item delivery and execution: Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20080016366 - Multimedia network appliances for security and surveillance applications: Network appliances for use in combination with a network based full service, multi-media surveillance system provide a wide range of monitoring techniques utilizing digital network architecture. The appliances may be connected to the surveillance system for transmitting event data, video and/or image monitoring information, audio signals and other data over... Agent: Moore Landrey
20080016367 - Personal data management system and nonvolatile memory card: It is an object to provide a personal data management system which overcomes a problem of data leakage and a nonvolatile memory card applied to the personal data management system. A personal data management system includes a personal data storage medium including a communication control unit which transmits and receives... Agent: Eric Robinson
20080016368 - Management of multiple connections to a security token access device: A system and method for automatically managing a connection between a user device and a security token access device. The access device is adapted to wirelessly communicate with a plurality of user devices and to be securely paired with at least one of the plurality of user devices, and is... Agent: Dimock Stratton LLP
20080016369 - Click passwords: Methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles. Further, the tiling optionally relies on probability and/or entropy. An exemplary password system includes an image; a grid associated with the image, the... Agent: Lee & Hayes PLLC
20080016370 - Secure id checking: A cost-effective system that provides for the efficient protection of transmitted non-public attribute information may be used, for example, to control access to a secure area. Encryption of the attribute information may be performed using symmetric encryption techniques, such as XOR and/or stream cipher encryption. A centralized database that stores... Agent: Muirhead And Saturnelli, LLC
20080016371 - System and method for registering a fingerprint, for setting a login method of an application, and for logining in the application: Systems and methods for registering fingerprints, setting a login method for an application, and logging into the application are provided. In the registration phase, the system receives a fingerprint signal, which is assigned to one of the many finger related data. In the phase which sets the login method, the... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20080016372 - Method, apparatus, and program product for revealing redacted information: A selectively encrypted data unit includes an encrypted version of sensitive information (capable of being decrypted to reveal the sensitive information), a plurality of auxiliary values, and an attribute vector associated with the encrypted version of the sensitive information. The selectively encrypted data unit and a unique capability key are... Agent: Fay Sharpe / Xerox - Parc
20080016373 - Method and apparatus for secure data mirroring a storage system: A secure data mirroring capability in a storage system includes encrypting data blocks in a primary volume in preparation for a data mirroring operation. The encrypted data blocks are mirrored to a secure secondary volume. Host systems provide keys from which encryption keys are produced for encrypting the data blocks.... Agent: Townsend And Townsend And Crew, LLP
20080016375 - Blade server equipped with hot plug function: A blade server equipped with hot plug function mainly includes a plurality of small servers which have respectively a logic processing main board and a power adapter card to be electrically connected to the logic processing main board in normal conditions. A power integration panel is provided that has a... Agent: Birch Stewart Kolasch & Birch
20080016374 - Systems and methods for asymmetrical performance multi-processors: Systems, methods and media for allocating processing functions between a primary processor and a secondary processor are disclosed. In one embodiment, a primary processor performs routine processing duties, including execution of application program code, while the secondary processor is in a sleep state. When the load on the primary processor... Agent: Ibm Coporation (rtp) C/o Schubert Osterrieder & Nickelson PLLC
20080016378 - Control apparatus, information processing apparatus and computer-readable storage medium: A control apparatus controls a supply of power to a second apparatus that operates independently of a first apparatus, and includes a notifying part to make a notification that notifies a need to control the power supplied to the second apparatus if needed, based on a preset timer time and... Agent: Staas & Halsey LLP
20080016376 - Logic circuit system and method of changing operating voltage of a programmable logic circuit: A logic circuit system with power consumption that is reduced by automatically varying the clock frequency and operating voltage according to processing capability imposed on programmable logic circuits. The programmable logic circuits are capable of achieving plural circuit functions dynamically and can change realized circuit functions during operation. In addition,... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080016377 - Semiconductor integrated circuit: A semiconductor integrated circuit including a first power supply region supplied with a first power supply voltage, and having a first clock distribution network, a second power supply region supplied with a second power supply voltage, and having a second clock distribution network, a first phase synchronizer which provides a... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080016380 - Granular reduction in power consumption: Generally described, embodiments of the present invention are directed at reducing the power consumed by a CPU. In accordance with one embodiment, a method is provided that transitions the CPU into a reduced power state in response to a fetch operation being dispatched to an I/O device. More specifically, the... Agent: Christensen, O'connor, Johnson, Kindness, PLLC
20080016379 - System for retaining power management settings across sleep states: A method for adjusting power management setting of the operating system while the system is in a sleep state. When a user attaches or removes power to the information handling system while the system is in a standby mode of operation, the sleep state system generates a wakeup event. During... Agent: Hamilton & Terrile, LLP
20080016382 - Control method of storage system, storage system, and storage apparatus: When power to a storage device is turned on and the storage device can accept a data input and output request being transmitted from an information processing device, the storage device transmits a power-on request for turning on power to the information processing device. The storage device, when it accepts... Agent: Townsend And Townsend And Crew, LLP
20080016381 - Reduced power consumption signal processing methods and apparatus: This invention is generally concerned with reduced power consumption signal processing methods and apparatus, and in particular with techniques for jointly controlling power supply voltage and clock frequency in a receiver to reduce power consumption. A method of reducing the power consumption of a data receiver is described. The receiver... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080016383 - Semiconductor device: When a leakage current of a circuit block under a non-use state is reduced by means of a power switch, frequent ON/OFF operations of the switch within a short time invite an increase of consumed power, on the contrary. Because a pre-heating time is necessary from turn-on of the switch... Agent: Mattingly, Stanger, Malur & Brundidge, P.C.
20080016384 - System and method for precise absolute time event generation and capture: The present invention is a system and method for precise absolute time event generation and capture. One embodiment of the present invention is a programmable hardware module for TTL pulse generation and capture in absolute time. The nominal accuracy of the programmable hardware module is 25 ns. The time reference... Agent: Morriss Obryant Compagni, P.C.01/10/2008 > patent applications in patent subcategories. USPTO class listing
20080010445 - Initialization after a power interruption: In response to the start of an initialization sequence at a service processor, if power to a main processor was interrupted at a most-recent time that an operating system executed on the main processor, power to the main processor is turned on, the operating system is started executing on the... Agent: Ibm Corporation RochesterIPLaw Dept. 917
20080010447 - Method for modifying the booting screen of a computer system: A method for modifying the booting screen of a computer system is described. A procedure to verify user identification in an operation system before modifying the booting screen is implemented. A personalized booting image file is edited. The personalized booting image file is converted into the format of the BIOS... Agent: Birch Stewart Kolasch & Birch
20080010446 - Portable apparatus supporting multiple operating systems and supporting method therefor: The present invention relates to a portable apparatus supporting multiple operating systems and a supporting method therefor. The portable apparatus of the present invention comprises a plurality of operating systems, and BIOSs corresponding to the operating systems to boot the corresponding operating system. The portable apparatus comprises an operating system... Agent: Birch Stewart Kolasch & Birch
20080010448 - Delegated certificate authority: A digital certificate, used in a computing system, includes a distinguished name (DN) field and a common name (CN) field within the DN field. The CN field contains a resource identifier that contains information identifying each of a plurality of resources in the certification path of the... Agent: Sughrue Mion, PLLC
20080010450 - Content control method using certificate chains: Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010449 - Content control system using certificate chains: Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010451 - Content control method using certificate revocation lists: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010452 - Content control system using certificate revocation lists: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010453 - Method and apparatus for one time password access to portable credential entry and memory storage devices: A method is disclosed wherein a user is provided with a replacement one-time password or secure transfer key for re-establishing secure access to information contained within at least one of peripheral memory storage device, a system to which the peripheral memory storage device is connected, or a system to which... Agent: Freedman & Associates
20080010454 - Computerized access device with network security: A computerized access device useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the access device comprises stand-alone network security apparatus adapted to create associations with other network security devices on the network. Traffic between the associated devices may... Agent: Knobbe Martens Olson & Bear LLP
20080010455 - Control method using identity objects: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010456 - Communication between a smart card and a server: The invention deals with a communication between a smart card (CAR) and a server (SERV) by way of a network (RES). The smart card communicates with this server by way of a communication system such as a mobile phone. The mobile phone (MOB) stores at least one object defining a... Agent: Osha Liang L.L.P.
20080010457 - Method for sharing rights object in digital rights management and device and system thereof: Disclosed is a method for sharing Rights Object (RO) of a specific DRM content resident in a certain device with different devices (or terminals) in a Digital Rights Management (DRM) system, wherein a first device and a second device can share RO for DRM content by performing a mutual authentication... Agent: Birch Stewart Kolasch & Birch
20080010458 - Control system using identity objects: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by... Agent: Brinks Hofer Gilson & Lione/sandisk
20080010462 - Data authentication method and data authentication system: A storage means which can be accessed by an authentication apparatus stores content data, a first digest table including primary digest values corresponding to a plurality of data portions constituting the content data, a second digest table including secondary digest values corresponding to a plurality of data portions of the... Agent: Nixon & Vanderhye, P.C.
20080010460 - Method for managing a time-limited license on a computer application that can be run on a network component: In a method for managing a time-limited license on a computer application that can be run on a network component, a license data record is created that contains at least information concerning the computer application to be licensed, a license period and a signing time. The license data record is... Agent: Siemens Schweiz Ag I-47, Intellectual Property
20080010461 - Portable communications device with enhanced security: A portable communications device adapted to provide communications security and user identification, and authentication. In one embodiment, the device is useful with an untrusted network, and comprises security apparatus adapted to create associations with one or more security devices on the network. Traffic between the associated devices may be encrypted... Agent: Knobbe Martens Olson & Bear LLP
20080010459 - System and method of securing optical media: The combination of strategic insertion of uniquely generated Digital Watermarks with an on-demand method of manufacturing digital content (Audio CD, Software CD, DVD Video Games, DVD Movies etc.) can be applied in such a way that the content can be forensically tied to the physical media.... Agent: Stephen E. Feldman
20080010463 - Method for producing truncated message digests: A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the... Agent: Motorola, Inc.
20080010465 - Electronic data storage medium with fingerprint verification capability: An electronic data storage medium is adapted to be accessed by a data terminal, and includes a processing unit connected to a memory device that stores a data file and security reference data possessed by a person authorized to access the data file, and an input-output interface circuit activable so... Agent: Blakely Sokoloff Taylor & Zafman
20080010464 - System and method for automated border-crossing checks: System and method for automated border-crossing checks of a personal data recording device, a biometry data recording device, a personal data transmission device, a data storage device, a transit gate (10), an isolation device, a data reading device, an authenticity testing device, a data manipulation testing device, a device for... Agent: Accenture Chicago 28164 Brinks Hofer Gilson & Lione
20080010466 - Digital identifier chaining: This invention provides a means for insuring data security and confidence in a recorded sequence of data that includes video, audio and meta-data through the use of digital signatures. The digital signatures are calculated through the use of publicly available hash algorithms and chained in a new and novel manner... Agent: John L. Sotomayor
20080010467 - Privacy-preserving concatenation of strings: A system for contributing to a concatenation of a first string and a second string may include a communication unit to receive an encrypted representation of a second share of the second string, the second string being identical to the second share of the second string combined with a first... Agent: Schwegman, Lundberg & Woessner/sap
20080010468 - Method and technique for enforcing transience and propagation constraints on data transmitted by one entity to another entity by means of data division and retention: A method for constraining and disabling the redistribution of computer data, specifically such data that are not intended to be disseminated further than their intended recipient (103) (209); for constraining and enforcing the transience of electronic data beyond a given expiration date or number of times accessed (108) (205); for... Agent: R.p. Ruiz
20080010469 - Data authentication with a secure environment: Included are systems and methods for data authentication. At least one embodiment of a system includes a secure processor configured as a physically secure environment, the secure processor further configured to receive a control word from a headend, the secure processor further configured to encrypt the received control word using... Agent: Scientific-atlanta, Inc. Thomas, Kayden, Horstemeyer & Risley
20080010470 - Tamper resistant module having separate control of issuance and content delivery: Methods, apparati, and computer-readable media for securely loading a software module over a communications network from a software provider (SP) (101) onto a tamper resistant module (TRM) (103). A method embodiment of the present invention comprises: the SP (101) encrypting, using at least one transport key, at least one portion... Agent: Sonnenschein Nath & Rosenthal LLP
20080010472 - Circuit interrupter and method modulating configurable processor clock to provide reduced current consumption: A circuit breaker includes separable contacts, an operating mechanism structured to open and close the separable contacts, a current sensor structured to sense current flowing through the separable contacts, a microprocessor cooperating with the sensor and the operating mechanism to trip open the separable contacts, and a power supply structured... Agent: Martin J. Moran, Esq. Eaton Electrical , Inc.,
20080010473 - Power management in a data processing apparatus having a plurality of domains in which devices of the data processing apparatus can operate: A data processing apparatus and method are provided for performing power management. The data processing apparatus has a plurality of domains in which devices of the data processing apparatus can operate, and comprises at least one master device for performing operations and at least one slave device for use by... Agent: Nixon & Vanderhye, PC
20080010471 - System and method for performing computer system maintenance and service: Systems and methods for maintaining and servicing a data processing system or “computer system,” including rack enclosures housing multiple servers, desktop computers, and controllers for industrial automation. According to one aspect, touch-activated circuitry is configured with a computer system to control power and data flow to a component port and... Agent: Ibm Corporation (ss/nc) C/o Streets & Steele
20080010475 - Display drive control device, for which drive method, electronics device and semiconductor integrated circuit: It is aimed at being capable of easily changing a power supply startup procedure and complying with various display devices. A power supply circuit is provided between an instruction register of a liquid crystal driver and a powersupply unit. The power supply unit is not directly supplied with a setting... Agent: Miles & Stockbridge PC
20080010474 - Method and system for optimizing filter compensation coefficients for a digital power control system: A method and system is provided for optimizing the digital filter compensation coefficients of a digitally controlled switched mode power supply within a distributed power system. A power control system comprises at least one point-of-load (POL) regulator having a power conversion circuit adapted to convey power to a load and... Agent: Brian M Berliner, Esq O'melveny & Myers, LLP
20080010476 - Method and system for saving power of central processing unit: For saving power of a central processing unit at a C3 power level upon processing a bus master request from a peripheral device, an arbitrator is disabled from transmitting any request to the central processing unit at the C3 power level. Afterwards, in response to a bus master request, the... Agent: Rosenberg, Klein & Lee
20080010477 - Recording apparatus and method for controlling the recording apparatus: A recording apparatus can shift to power saving modes even when the recording apparatus is connected to the host PC, thus reducing power consumption. The recording apparatus can switch to a first power saving mode to supply power that enables detection of an inquiry from a host device and also... Agent: Canon U.s.a. Inc. Intellectual Property Division
20080010478 - Card device: A card device has a regulator (5), a first internal circuit (6) and a second internal circuit (7), and the regulator supplies, to the second internal circuit, an internal voltage generated by dropping an external voltage (VCC) when the external voltage is high, and exactly supplies the external voltage as... Agent: Miles & Stockbridge PC
20080010479 - Method and system for dynamic temperature compensation for a source-synchronous interface: A method for synchronizing a data signal to a clock signal in a source-synchronous system, the source-synchronous system having first and second systems linked by an interface, the first system providing the clock signal to the second system, the second system providing the data signal and a return clock signal... Agent: Kramer & Amado, P.C.Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.37557 seconds