|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
12/2009 | Recent | 13: Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: support December patent applications/inventions, industry category 12/09Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 12/31/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090327676 - Demodulator device and method of operating the same: A demodulator device and a method of operating the demodulator device where the demodulator device runs a loaded operating system and operates a communication protocol enabling a host application to control the demodulator device. The demodulator device is configured to respond to receipt of an abort command of the communication... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20090327675 - System and method for os boot image provisioning based on user identity to enable mobile users: A method for provisioning a boot image includes receiving authentication information from an information handling system (IHS) over a network. The authentication information is associated with a user. The authentication information is sent to network services. Boot image information is received from the network services. The boot image information is... Agent: Haynes And Boone, LLPIPSection
20090327677 - System and method for surely but conveniently causing reset of a computerized device: Enhanced reset logic is included in a user's computerized device so that the device owner (e.g., the user's employer) can assure prompt reset (e.g., to insure device use of newly downloaded software versions or other control or security data) while still allowing user convenience (e.g., some limited continued normal use... Agent: Ridout & Maybee LLP
20090327684 - Apparatus and method for secure boot environment: In some embodiments, a processor-based system may include at least one processor, at least one memory coupled to the at least one processor, a boot block stored at a first memory location, a capsule update stored at a second memory location, a startup authenticated code module to ensure the integrity... Agent: Intel Corporation C/o Cpa Global
20090327685 - Efficient root booting with solid state drives and redirection write snapshots: A system and method for root booting includes a plurality of computing devices that each boot from a read-only base volume of an attached storage device that includes data common to the computing devices. The attached storage device also includes a plurality of volumes, each dedicated to one of the... Agent: Lsi Corporation C/o Suiter Swantz PC Llo
20090327678 - Enhancing security of a system via access by an embedded controller to a secure storage device: System and method for performing pre-boot security verification in a system that includes a host processor and memory, an embedded microcontroller with an auxiliary memory, e.g., an on-chip ROM, or memory controlled to prohibit user-tampering with the contents of the memory, and one or more pre-boot security components coupled to... Agent: Jeffrey C. Hood Meyertons Hood Kivlin Kowert & Goetzel PC
20090327679 - Os-mediated launch of os-independent application: A system, method, and computer readable medium for an operating system (OS) mediated launch of an OS dependent application is disclosed. An application running within an OS may operate outside an OS environment by constructing for example a capsule file, passing the capsule file to firmware interface, and restarting the... Agent: Pearl Cohen Zedek Latzer, LLP
20090327680 - Selecting a random processor to boot on a multiprocessor system: Pervasive logic is provided that includes a random event generator. The random event generator randomly selects which processor of a plurality of processors in the multiprocessor system is to be a boot processor for the multiprocessor system. A corresponding configuration bit for the randomly selected processor is set to identify... Agent: Ibm Corp. (wip) C/o Walder Intellectual Property Law, P.C.
20090327681 - Self test initialization: A system to perform an information handling system (IHS) initialization includes one or more subsystems to receive a command to power on the IHS, initialize a processor cache memory to emulate a random access memory (RAM), determine whether a manufacturing self test is being performed on the IHS, and in... Agent: Haynes And Boone, LLPIPSection
20090327682 - System and method for transferring configuration information to an embedded device using a command line interface: A system and method is disclosed for transferring configuration information to an embedded device associated with an option ROM during those periods in which the option ROM is disabled. The method of the present invention involves the enumeration of PCI devices within the system and the determination of whether the... Agent: Baker Botts, LLP
20090327683 - System and method to accelerate access to network data using a networking unit accessible non-volatile storage: In some embodiments, the invention involves a network controller having a pattern matching unit to identify whether boot file requested from a network accessible storage device for booting are stored locally in non-volatile memory accessible to the network controller. When required boot files are stored locally, the locally stored files... Agent: Joni D. Stutman-horn Intel Corporation
20090327687 - Arrangements for establishing management engine default settings: The employment of a process of applying user-defined defaults to a management engine or analogous arrangement, wherein a system BIOS calls or recalls such defaults, as needed, from NVRAM responsive to the need for a reset of defaults.... Agent: Ference & Associates LLC
20090327688 - Method and system for detecting a malicious code: Embodiments of the present invention provide a method and a system for detecting a malicious code. The method includes obtaining first system information and second system information, and detecting the malicious code by identifying difference between the first system information and the second system information, which thus can detect an... Agent: Huawei Technologies Co., Ltd. C/o Darby & Darby P.C.
20090327689 - Systems and methods for tuning an operating system, application, or network component: A method, system, apparatus, and media are directed to tuning a device. Values are stored for each of a plurality of device parameters based on device metrics. The device parameters are constraint-matched over changes to settings of the device parameters to identify at least one point within each range of... Agent: Winston & Strawn LLP Patent Department
20090327686 - Updating a basic input/output system ('bios') boot block security module in compute nodes of a multinode computer: Updating a BIOS boot block security module in a plurality of compute nodes of a multinode computer including, for each compute node in the multinode computer, upon powering on the compute node: determining whether a new image of security module is available; if a new image of the security module... Agent: Ibm (rps-blf) C/o Biggers & Ohanian, LLP
20090327691 - Method and apparatus of encrypting content delivery: The invention relates to a method and apparatus for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data stream includes a plurality of data packets and a data stream identifier associated with at... Agent: Osha Liang L.L.P./sun
20090327692 - Method and device for distributing secure digital audiovisual contents by interoperable solutions: A method for distributing a nominal audiovisual stream to a recipient device including modifying, in the nominal audiovisual stream, at least one nominal coefficient among the nominal coefficients to generate a modified main stream; generating complementary information such that the nominal audio-visual stream may be implemented based from the complementary... Agent: Ip Group Of Dla Piper LLP (us)
20090327694 - Methods and apparatus for providing integrity protection for management and control traffic of wireless communication networks: Embodiments of the present invention provide a method comprising transmitting, by a communication node, an information element (IE), the IE including a feature field indicating whether the communication node operates in accordance with an integrity protection protocol specifically for management frames, and the IE further including an enforcement field that... Agent: Intel Corporation C/o Cpa Global
20090327690 - Methods and systems for facilitaing secure communication: A method of facilitating secure communication, the method comprising the steps of obtaining a cryptographic key, identifying at least one trusted computing device and sending the cryptographic key to the trusted computing device.... Agent: Townsend And Townsend And Crew, LLP
20090327693 - Network task offload apparatus and method thereof: A network task offload apparatus includes an offload circuit and a buffer scheduler. The offload circuit performs corresponding network task processing on a plurality of packets in parallel according to an offload command. The buffer scheduler includes a buffer control unit and a plurality of buffer units. The plurality of... Agent: North America Intellectual Property Corporation
20090327696 - Authentication with an untrusted root: Techniques and systems for authentication with an untrusted root between a client and a server are disclosed. In some aspects, a client may connect to a server. The server and client may initiate a secure connection by exchanging certificates. The server may accept a client certificate having an untrusted root... Agent: Lee & Hayes, PLLC
20090327697 - Network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information: In a network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information, the method includes the following steps: subjecting a plurality of packets of a multimedia session to signaling processing so as to obtain multimedia session information contained in... Agent: Greenblum & Bernstein, P.L.C
20090327695 - Systems and methods for applying encryption to network traffic on the basis of policy: An information handling system including a receiver for inbound data destined for delivery to a network node, an encryption recognition engine operable to identify whether the inbound data received by the receiver is encrypted and an encryption policy application engine operable to apply encryption policy to the inbound data on... Agent: Andrea E. Tran Pramudji Wendt & Tran, LLP
20090327698 - Process and streaming server for encrypting a data stream with bandwidth based variation: There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for protecting streaming multimedia, entertainment and communications in an Internet-type transmission. There is further disclosed a streaming server... Agent: Darby & Darby P.C.
20090327699 - System and method for bend-in-the-wire adjacency management: A method for translating network data transmissions begins with a data transmission received at a router. An interface identifier is prepended before a first field of the data transmission, forming a prepended field. The data transmission is transmitted to a translation device. The data transmission is translated without altering the... Agent: Hayes Soloway P.C.
20090327701 - Id card encryption: An ID card is authenticated. Encrypted data is read from a first security feature on the ID card. A value is computed based on the encrypted data. Unencrypted data is read from a second security feature on the ID card. The value and the unencrypted data is transmitted to an... Agent: Charles Maney Ncr Corporation, Law Dept.
20090327702 - Key escrow service: A key escrow service is described. In embodiment(s), the key escrow service maintains an escrow license that includes an escrow content key that is associated with protected media content which is distributed from a content distributor to a media device. A content key that is associated with the protected media... Agent: Microsoft Corporation
20090327700 - Method and system for virtualization of trusted platform modules: A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data processing system using a platform... Agent: Ibm Corporation (jvm)
20090327706 - Account management system, root-account management apparatus, derived-account management apparatus, and program: A root-account management apparatus generates an electronic signature based on a survival condition and a secret key when an authentication result of a user of a client apparatus is proper, and transmits derived-account credence element information including the survival condition, the electronic signature and a public key certificate to a... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20090327705 - Attested content protection: The present invention extends to methods, systems, and computer program products for protecting content. Embodiments of the invention permit a local machine increased participation in authorizing access to protected content. An operating system attests to a computing environment at a corresponding computer system. If the computing environment is one permitted... Agent: Workman Nydegger/microsoft
20090327703 - Method for payload encryption of digital voice or data communications: A security platform or network for transmitting end-to-end encrypted voice or data communications between at least a first digital device and a second device is disclosed. The network includes a network portal for registering the first digital device and the second device. The portal provides the first digital device and... Agent: Greenblum & Bernstein, P.L.C
20090327704 - Strong authentication to a network: Embodiments for providing strong authentication to a network from a networked device are disclosed. In accordance with one embodiment, a method for authentication to a server includes sharing a session key between the networked device and the server. The method further includes sending an encrypted secret key that is encoded... Agent: Lee & Hayes, PLLC
20090327707 - Process for creating and managing at least one cryptographic key, and system for its implementation: A process for creating and managing pairs of asymmetrical cryptographic keys and/or certificates associated with the pairs of keys, each pair of keys and associated certificates being intended for an object managed by a computer system. The process includes creating an individual request for creating and/or certifying at least one... Agent: Miles & Stockbridge PC
20090327708 - Certificate distribution using secure handshake: A method, system, and computer usable program product for certificate distribution using a secure handshake are provided in the illustrative embodiments. A client sends an indication in a request, the request being a part of a secure data communication with a server. The indication indicates an ability of the client... Agent: Ibm Corp. (gig)
20090327710 - Content recording/reproducing apparatus and content recording/reproducing method: According to one embodiment, a content recording apparatus is connected with a permission server that permits recording of content through a network. The content recording apparatus reads content encrypted based on a first encryption scheme and binding information from a disposed second recording medium, and uses the binding information to... Agent: Office Of Corporate Liaison & Technology Transfer
20090327709 - Memory address obfuscation: Apparatus, systems, and methods may operate to provide, to a memory device, an obfuscated clear-page address derived from a clear-page address that is not the same as a key-page address and/or providing, to the memory device, an obfuscated key-page address derived from the key-page address when the obfuscated clear-page address... Agent: Schwegman, Lundberg & Woessner / Atmel
20090327711 - Authentication of binaries in memory with proxy code execution: Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual machine) the protected code on behalf of the binary in kernel mode upon successful completion of an integrity check.... Agent: Lee & Hayes, PLLC
20090327712 - System and method for variable encryption: A method for variable encryption of a plurality of files. The method serves a plurality of subscribers. The method includes receiving a request from one of the plurality of subscribers to download at least one of the plurality of files and receiving authorization to download the at least one of... Agent: Naomi Assia Law Offices C/o LandonIPInc.
20090327719 - Communication authentication: Systems and methods that establish trust between a receiver (e.g., a user) and a sender of a message by authenticating such sender through demonstration of knowledge for a shared secret—yet without revealing such secret. A messaging component can convey messages as directed by the shared secret to communication systems that... Agent: Lee & Hayes, PLLC
20090327718 - Content data mangement system and method: Embodiments of the present invention allow encrypted data to restrict unlimited output of content data recorded in an area where reading can be performed by standard commands. According to one embodiment, a data storage area of a storage device is provided with an accessible area which can be accessed from... Agent: Townsend And Townsend And Crew LLP
20090327721 - Method and apparatuses for securing communications between a user terminal and a sip proxy using ipsec security association: A method and user terminal for securing communications between the user terminal and a SIP proxy. The user terminal performs a full authentication procedure with a first SIP proxy to generate an IPSec Security Association, wherein signaling is exchanged between the user terminal and a home network. In response to... Agent: Ericsson Inc.
20090327720 - Secure access to encrypted information: A method of using a mini filter driver to secure access to encrypted information stored on a removable storage device. The method comprises receiving a request to read information from the removable storage device. The mini filter driver ascertains if the request originated from an authorized client. The mini filter... Agent: Michael Chan Ncr Corporation
20090327723 - Secure transfer of digital objects: Transferring a digital object, comprising: receiving a digital object; validating the received digital object according to predefined rules; building a description of the validated digital object; providing access to the description to select the validated, described digital object for transfer; and transferring the validated, described digital object.... Agent: Procopio, Cory, Hargreaves & Savitch LLP
20090327715 - System and method for cryptographic identification of interchangeable parts: An anti-counterfeiting identification system for a medical tubing system, including a tubing assembly having upstream and downstream tubing portions removably connected to one another in a mechanically coupled state and a mechanically uncoupled state. The mechanically coupled state is a reliable fluid tight connection of the upstream and downstream portions... Agent: Mayback & Hoffman, P.A.
20090327714 - System and method for end-to-end electronic mail-encryption: The present disclosure provides a system and method for end-to-end electronic mail encryption. In one embodiment, the sender contacts a payload-encryption-packet creation server which receives the message the sender would like to encrypt, generates an encrypted message and a payload-encryption-packet, and returns both to the sender. The sender then uses... Agent: Jacobson Holman PLLC
20090327713 - System and method for establishing bearer-independent and secure connections: A system and method for efficiently enabling local security connectivity between electronic devices over multiple bearers. Electronic devices are configured to advertise, over each bearer, their respective configuration parameters for each bearer. After a connection has been established between the electronic devices over a first bearer, the two electronic devices... Agent: Foley & Lardner LLP
20090327717 - System, method, and service for tracing traitors from content protection circumvention devices: A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of... Agent: Ibm - Arc Shimokaji & Associates, P.C.
20090327722 - Transient protection key derivation in a computing device: A computing device is arranged to use any possible permutation of methods available to it to authenticate a user, without needing to persistently store any unencrypted data that can be used in authentication, such data only ever being held in transient memory. A user of the device is provided with... Agent: Saul Ewing LLP (philadelphia)
20090327716 - Verifying a cipher-based message authentication code: A system for verifying a cipher-based message authentication code (CMAC), including a reception (RX) module logically residing between a physical layer controller (PHY) and a media access controller (MAC) processor, such that the RX module is configured to receive one or more portions of the CMAC with one or more... Agent: Baker Botts L.L.P.
20090327725 - Content object management method, right object providing method, content object revocation method based thereon, and device using the same: A device for managing a rights object and revoking a content object. The device includes a content/rights object storage unit for storing at least one content object, and a rights object corresponding to each content object. An authentication module performs mutual authentication between devices giving and taking a rights object,... Agent: Docket Clerk
20090327726 - Information recording/reproduction apparatus and system: According to one embodiment, a data transmission control section ends transmission of a title without copyright protection at time t2. When transmission time of the title exceeds prescribed time, interruption of the transmission is posted to a reception-side device, and a key discard/creation section creates a new encryption key. A... Agent: Knobbe Martens Olson & Bear LLP
20090327724 - Two-way authentication between two communication endpoints using a one-way out-of-band (oob) channel: Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to... Agent: Intel Corporation C/o Cpa Global
20090327728 - Methods for supplying cryptographic algorithm constants to a storage-constrained target: The present invention provides for authenticating a message. A security function is performed upon the message. The message is sent to a target. The output of the security function is sent to the target. At least one publicly known constant is sent to the target. The received message is authenticated... Agent: Ibm Corp. (wip) C/o Walder Intellectual Property Law, P.C.
20090327727 - System and method for upgrading the functionality of a controlling device via a secure portable adapter device: Secure access to a database of upgrade data is provided by storing an encryption key value in an adapter device used to interconnect a first device to be upgraded and a second device that is associated with the database of upgrade data. The second device allows access to the database... Agent: Greenberg Traurig, LLP
20090327730 - Apparatus and method for encrypted communication processing: To provide an apparatus and a method for encrypted communication processing having a high communication speed in inter-node communication on a network capable of performing effective encrypted communication with improved security without losing the high speed. In the inter-node communication on the network, a plurality of shared encryption keys are... Agent: Sidley Austin LLP
20090327729 - Secure pre-caching through local superdistribution and key exchange: A distributed peer-to-peer document archival system provides the version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems.... Agent: Townsend And Townsend And Crew, LLP
20090327731 - Security device for cryptographic communications: Cryptographic systems and methods are provided in which authentication operations, digital signature operations, and encryption operations may be performed. Authentication operations may be performed using authentication information. The authentication information may be constructed using a symmetric authentication key or a public/private pair of authentication keys. Users may digitally sign data... Agent: Treyz Law Group
20090327733 - Data security method and system: A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital file. The received digital file has an appended signature label that includes one or both of a first hash value and a digital signature. Validating... Agent: Baker Botts L.L.P.
20090327732 - Long-term secure digital signatures: The present invention relates to digitally signing of electronic documents which are to be kept secure for a very long time, thereby taking into account future cryptographic developments which could render current cryptographic key-lengths insufficient. In accordance with the invention a double signature is issued for each document. A first... Agent: Michael Buchenhorner, P.A.
20090327734 - Matching a watermark to a host sampling rate: The invention deals with matching of a watermark to a host sampling rate of a multimedia signal. A watermark sampled at a first sampling rate is matched to multimedia host signal sampled at a second sampling rate, in a process where the watermark sampled at the first sampling rate is... Agent: Philips Intellectual Property & Standards
20090327735 - Unidirectional multi-use proxy re-signature process: A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described.... Agent: Microsoft Corporation
20090327736 - Insider attack defense for network client validation of network management frames: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link... Agent: Tucker Ellis & West LLP
20090327738 - Reducing memory requirements of firmware: A mechanism for making increased amounts of firmware available to a computer pre-boot is discussed. To increase the amount of firmware available pre-boot, a design decision is made during the build process as to which segments of the firmware need to be placed on the ROM part and which segments... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20090327737 - Techniques for ensuring authentication and integrity of communications: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a... Agent: Microsoft Corporation
20090327739 - Key-based content management and access systems and methods: An exemplary method includes receiving data representative of a content instance over a network from an access device associated with a user, storing the content instance, encrypting the content instance in response to a command initiated by the user, providing a key configured to facilitate decryption of the encrypted content... Agent: Verizon Patent Management Group
20090327742 - Method for managing multiuser digital photo frame: A method for managing multiple users on a digital photo frame is disclosed. The method includes: adding a user account on the digital photo by a user inputting a username and a password, associating files with the username, prompting users to enter the username and password associated with the files... Agent: PCe Industry, Inc. Att. Steven Reiss
20090327740 - Securing a password database: An apparatus and a method for storing an encrypted username and password. In one embodiment, a username is encrypted. A password associated with the username is encrypted. A user identifier associated with the username is encrypted. The encrypted username, the encrypted password, and the user identifier are stored in one... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20090327741 - System and method to secure boot uefi firmware and uefi-aware operating systems on a mobile internet device (mid): In some embodiments, the invention involves adding a capability for a platform owner or administrator to ensure that the firmware is only executed in an owner-authorized fashion, such as with signed components managed by a security processor. Embodiments may extend the Core Root of Trust for Measurement (CRTM), via use... Agent: Joni D. Stutman-horn Intel Corporation
20090327744 - Information processing apparatus and security protection method: According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication control module which sets and holds identification information to be stored in the storage unit of... Agent: Knobbe Martens Olson & Bear LLP
20090327743 - Secure portable data transport & storage system: A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and transporting data. The portable data transport device includes a first processor and a biometric identification system. Upon successful biometric identification of an enrolled user, the... Agent: Fulwider Patton LLP
20090327745 - Secure apparatus and method for protecting integrity of software system and system thereof: Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent template; a template generator for randomly selecting one template from said template repository and generating a new agent template... Agent: Anne Vachon Dougherty
20090327754 - Communications terminal, storage medium storing communication terminal controlling program, communication terminal controlling method, storage medium storing communication controlling program and authentication system: A communication terminal 10 includes a RAM 32, and the RAM 32 stores common key data (340). When an arbitrary file is attached to e-mail to which an e-mail address is set, a CPU 20 performs a process to create an encryption key from the data of the e-mail address... Agent: Procopio, Cory, Hargreaves & Savitch LLP
20090327749 - Indexing encrypted files by impersonating users: Methods and computer-readable media for indexing an encrypted file by impersonating a user is provided. A set of keys may be associated with a particular encrypted file. Once these keys are identified, the users who own these keys may then be identified by consulting an association of keys to users,... Agent: Shook, Hardy & Bacon L.L.P. (c/o Microsoft Corporation)
20090327755 - Information-processing device and information management program: [Means for Solving Problems] It is judged whether or not read control information stored in a predetermined read control information storage area of an external storage is proper. If the judgment result shows that it is invalid, virtualized data stored in the external storage is decrypted, and genuine read control... Agent: Hayes Soloway P.C.
20090327746 - Key encryption and decryption: Provided is a data storage drive for encrypting data, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a session key, wherein a result is a data key that is capable of... Agent: Konrad Raynes & Victor, LLP. Attn: Ibm37
20090327752 - Method and apparatus for selectively enabling a microprocessor-based system: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and... Agent: Iv - Suiter Swantz PC Llo
20090327753 - Method and apparatus for selectively enabling a microprocessor-based system: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and... Agent: Iv - Suiter Swantz PC Llo
20090327751 - Method and system for transformation of logical data objects for storage: A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a... Agent: Occhiuti Rohlicek & Tsao, LLP
20090327750 - Security system for code dump protection and method thereof: A security system for code dump protection includes a storage device, a processor, and a decryption unit. The storage device has a protected storage area storing at least an encrypted code segment. The processor is utilized for issuing at least one address pattern to the storage device for obtaining at... Agent: North America Intellectual Property Corporation
20090327748 - System and method for fast querying of encrypted databases: A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first decrypting the operands. The encryption scheme of the invention allows equality and range queries as well as the aggregation operations of MAX, MIN, and COUNT. The GROUPBY... Agent: Fleit, Gibbons, Gutman, Bongini & Bianco P.l
20090327747 - Template renewal in helper data systems: The invention provides a method for authenticating a physical object (OBJ) using a first helper data (W1) and a first control value (V1) associated with a reference object. The method comprises a step to generate a first property set (S1) using a noise compensating mapping (NCM) on information derived from... Agent: Philips Intellectual Property & Standards
20090327756 - Secure digital content storage device: A secure digital content storage device comprising a memory for storing digital data, a decoder, coupled to the memory, for generating analog output based on the digital data, and a secure enclosure, or a secure connection between the memory and the decoder, or a single monolithic integrated circuit structure for... Agent: Amster, Rothstein & Ebenstein LLP
20090327757 - Computer system for managing storage area state of a storage system: There is provided a computer system, having a host and at least one storage system. The at least one storage system provides storage area includes at least one of an encrypted storage area and a plaintext storage area The at least one storage system is configured to: receive an instruction... Agent: Juan Carlos A. Marquez C/o Stites & Harbison PLLC
20090327759 - Encrypting data on a non-volatile memory: A non-volatile memory, such as a NAND memory, may be encrypted by reading source blocks, writing to destination blocks, and then erasing the source blocks. As part of the encryption sequence, a power fail recovery procedure, using sequence numbers, is used to reestablish a logical-to-physical translation table for the destination... Agent: Trop, Pruner & Hu, P.C.
20090327761 - Recording medium, attaching kit for attaching encryption key sticker to the recording medium, and recording apparatus and reproducing apparatus for the recording medium: A sticker (42) having at least an encryption key (424) previously recorded in an electromagnetically and optically readable state is attached at a prescribed position of a recording medium (100). The recording medium is provided with a recording area (43) for recording data, which includes encryption data encrypted based on... Agent: Young & Thompson
20090327758 - Storage apparatus and data processing method for storage apparatus: A storage apparatus is provided, which allows a user to properly use an encrypted text and a plain text even when the storage apparatus has an encrypting function. An adaptor controlling transmission and reception of data to and from a memory device is provided with an encrypting function. Data requiring... Agent: Brundidge & Stanger, P.C.
20090327760 - Tachograph: A tachograph includes at least one chip card reading unit and, at least one chip card with secure memory. Secured data transmission can be fed to the at least one chip card reading unit. On the at least one chip card, at least one user-defined piece of identification information is... Agent: Cohen, Pontani, Lieberman & Pavane LLP
20090327763 - Method for using a compact disk as a smart key device: A data processing method accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which the removable storage media and the hardware security unit mutually authenticate themselves. The removable storage media stores a private key of a first asymmetric cryptographic key... Agent: Greg Goshorn, P.C.
20090327762 - Methods and systems for secure encryption of data: d
20090327769 - Information processing apparatus and wake-up control method: According to one embodiment, an information processing apparatus includes devices including functions of generating wake-up signals, a controller which returns the apparatus to the power-on status in response to wake-up signals, and a first nonvolatile memory which stores information indicating whether the functions are enabled. The devices initializes such that... Agent: Knobbe Martens Olson & Bear LLP
20090327764 - Managing power consumption of a computer: Methods, computers, and products for managing power consumption of a computer, the computer including a computer processor and managing power consumption of a computer includes: dynamically during operation of the computer, setting, by an in-band power manager in dependence upon performance metrics of the computer processor, a current performance state... Agent: Ibm (rps-blf) C/o Biggers & Ohanian, LLP
20090327765 - Managing power consumption of a computer: Methods and products for managing power consumption of a computer and computers for which power consumption is managed. The computer includes the computer including a computer processor and embodiments of the present invention include providing, by an in-band power manger to an out-of-band power manager, a proposed performance state (‘p-state’)... Agent: Ibm (rps-blf) C/o Biggers & Ohanian, LLP
20090327772 - Power management system of terminal: A power management system optimizing the power consumption management of a terminal that uses limited power is disclosed. In more detail, a power management system of a terminal, which defines levels of power to be supplied in accordance with the operation state of the system or an application that is... Agent: Mcdermott Will & Emery LLP
20090327766 - Power over ethernet reclassification: A power over Ethernet (PoE) system has a reclassification functionality. The illustrative PoE system comprises a powered device (PD) and a power sourcing equipment (PSE) communicatively coupled to the PD. A classification identification component coupled to the PD encodes a classification value. A classification identification component can typically be implemented... Agent: Koestner Bertani LLP
20090327768 - Power supply apparatus and modular power connection interface thereof: A power supply apparatus includes a power converting circuit and a modular power connection interface. By the power converting circuit, an input voltage is converted into several output voltages required for powering corresponding electronic devices. The modular power connection interface includes an output member and a connecting member. The output... Agent: Kirton And Mcconkie
20090327770 - Power supply system and power supplying control method: A power supply system adopting two power supplies connected in parallel includes a first power supply comprising a first voltage-output terminal; a second power supply comprising a second voltage-output terminal; a first switch circuit comprising an input terminal connected to the first voltage-output terminal; a second switch circuit comprising an... Agent: Kirton And Mcconkie
20090327771 - Power supply system and power supplying control method: A power supplying control method of a computer system for use with a first power supply and a second power supply both providing a first specific voltage to a motherboard, including steps of: detecting whether the first power supply and the second power supply, outputting the first specific voltage, are... Agent: Kirton And Mcconkie
20090327767 - Techniques for distributed management of wireless devices with shared resources between wireless components: An embodiment of the present invention provides an apparatus, comprising a network adapter configured for wireless communication using more than one technology using distributed management and wherein the network adapter is configured to share a plurality of shared hardware components by automatically turning all other comms to OFF when one... Agent: Pillsbury Winthrop Shaw Pittman LLP
20090327774 - Coordinated link power management: A method, apparatus, and system for coordinated link power management. Some embodiments of a method include receiving an exit latency for each of a group of link states for a link, with a device being coupled to an interconnect via the first link. A latency tolerance value is determined and... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20090327778 - Information processing system and power-save control method for use in the system: A technique for determining task allocation for reducing power consumption of an entire system is disclosed. This system includes physical computers, a cooling apparatus for cooling the physical computers, and a power-saving control server for controlling the physical computers and cooling apparatus. The power-saving control server includes a virtual server... Agent: Brundidge & Stanger, P.C.
20090327776 - Multiple load line voltage regulators: Methods and apparatus relating to a multiple load line voltage regulators are described. In one embodiment, a voltage regulator may adjust an input voltage level based on information received from a load and current supplied to the load. Other embodiments are also disclosed and claimed.... Agent: Caven & Aghevli LLC C/o Cpa Global
20090327777 - Power efficient high frequency display with motion blur mitigation: Some embodiments describe techniques that relate to power efficient, high frequency displays with motion blur mitigation. In one embodiment, the refresh rate of a display device may be dynamically modified, e.g., to reduce power consumption and/or reduce motion blur. Other embodiments are also described.... Agent: Caven & Aghevli LLC C/o Cpa Global
20090327773 - Serial ata (sata) power optimization through automatic deeper power state transition: A host device and a storage device with a Serial ATA (SATA) architecture to independently transition to a deeper low power state after first entering an initial low power state without first transitioning to the Active state. The transition from the Partial state to the Slumber state is direct and... Agent: Caven & Aghevli LLC C/o Cpa Global
20090327775 - User imposed power constraints on web server based on user preferences: Web application users are able to specify power constraints for remote web servers. These may be based on individual performance needs and energy-conservation desires. They enable the user to exercise control over the amount of energy that the web server expends in serving the needs of the user. The invention... Agent: Driggs, Hogg, Daugherty & Del Zoppo Co., L.p.a.
20090327779 - Energy conservation in multipath data communications: A method, system, and computer usable program product for energy conservation in multipath data communications are provided in the illustrative embodiments. A current utilization of each of several of I/O devices is determined. A violation determination is made whether an I/O device from the several I/O devices can be powered... Agent: Ibm - Aus Shimokaji & Associates, P.C.
20090327780 - Systems, methods and media for reducing power consumption in multiple controller information handling systems: An information handling system (IHS) provides a method for conserving power. The method includes monitoring at least one performance characteristic of the IHS and determining if the at least one performance characteristic is below a low performance threshold. If the at least one performance characteristic is below the low performance... Agent: Andrea E. Tran Pramudji Wendt & Tran, LLP
20090327781 - Method and system for power management in a virtual machine environment without disrupting network connectivity: A method for power management. The method includes gathering resource usage data for a first blade and a second blade on a blade chassis, migrating each virtual machine (VM) executing on the first blade to the second blade based on the resource usage data and a first migration policy, wherein... Agent: Osha Liang L.L.P./sun
20090327782 - Device power management using network connections: Embodiments provide a process and system for automatic management of networked devices based on the state of the network connection. The process automatically manages the power state of a networked computerized device according to a trigger event that corresponds to the state of an attached network connection. The network connection... Agent: Microsoft Corporation
20090327784 - Energy measurement techniques for computing systems: An energy measurement system (“EMS”) and techniques for correlating energy consumption to computing system activity. The EMS includes a data acquisition module, a processing module, and optionally a visualization module. The data acquisition module receives and transmits to the processing unit a number of sampled data streams, referred to as... Agent: Microsoft Corporation
20090327783 - Modified pulse width modulator and hybrid power supply: A power supply system allowing remote adjustments of the power output of the power supply unit without having to physically access the power supply unit itself is disclosed. A power supply system in accordance with the present invention utilizes a central processing unit (CPU) to provide a command that adjusts... Agent: Honeywell/shimokaji Patent Services
20090327785 - Power management device and method thereof for managing power consumption of electronic device: A power management device and method thereof for managing power consumption of an electronic device are disclosed. The electronic device has at least one adjustable unit and each adjustable unit has a plurality of power statuses. The method includes the following steps: generating a collection table having a plurality of... Agent: Juan Carlos A. Marquez C/o Stites & Harbison PLLC
20090327787 - Power monitoring device: A power monitoring device is disclosed. In at least one embodiment, the power monitoring device includes a power parameter measurement unit for calculating the measurement results of basic power parameters according to acquired digital signals of a voltage and/or a current; and a power quality analysis unit including a field... Agent: Harness, Dickey & Pierce, P.L.C
20090327786 - Power supply circuit and multi-phase control: According to one configuration, a multi-phase power supply adjusts a number of active phases based at least in part on a peak current supplied to a dynamic load. For example, a controller associated with the multi-phase power supply can monitor or receive a value indicative of a peak magnitude of... Agent: Barry W. Chapin, Esq. Chapin Intellectual Property Law, LLC
20090327788 - Clock and data recovery (cdr) method and apparatus: Embodiments of methods and apparatus for clock and data recovery are disclosed. In some embodiments, a method for recovering data from an input data stream of a device is disclosed, the method comprising synchronizing, during an initialization phase, a data clock (DCK) with an input data stream; synchronizing, during the... Agent: Schwabe, Williamson & Wyatt, P.C.
20090327789 - Memory system with calibrated data communication: A system includes a first integrated circuit device and a second integrated circuit device. The first device transmits a data sequence to the second integrated circuit device, and the second device samples the data sequence to produce receiver data. The second device then transmits the receiver data back to the... Agent: Morgan Lewis & Bockius LLP/rambus Inc.
20090327790 - Method for synchronizing a plurality of drives, and a drive operated with the method: In a machine with a supervisory unit and several drives, contour discrepancies can be eliminated and synchronization simplified by using a line which is commonly employed for actuating a drive, e.g. the Enable line, also for synchronously sending a clock pulse to the various coordinated drives operating as “slaves”. The... Agent: Henry M Feiereisen, LLC Henry M Feiereisen
20090327791 - Method of providing a clock frequency for a processor: A method of providing a clock frequency to a processor is described. The method in accordance with the invention comprises the step of providing at least one reference signal and the step of determining a control value which relates to a desired first frequency. A second signal that relates to... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20090327792 - Bus frequency adjustment circuitry for use in a dynamic random access memory device: The present disclosure relates to clock divider circuitry for use in a dynamic random access memory device. In accordance with at least one embodiment the disclosure includes a method having a number of operations. Some operations may include receiving a clock input signal having a first frequency from a clock... Agent: Grossman, Tucker, Perreault & Pfleger, PLLC C/o Cpa Global
20090327793 - Finite impulse response (fir) filter without decimation: Provided is a discrete signal finite impulse response (FIR) filter and a filter set in which a plurality of FIR filter units are connected in a cascade structure to remove down-sampling by decimation, in order to improve the attenuation characteristics of a FIR filter, such as, for example, a switched... Agent: Dla Piper LLP Us
20090327795 - Method for protecting a secured real time clock module and a device having protection capabilities: A method for protecting a secured real time clock module, the method includes: locking multiple input ports of the secured real time clock module if the multiple input ports of the secured real time clock module are idle during at least a first duration; unlocking the multiple input ports of... Agent: Freescale Semiconductor, Inc. Law Department
20090327794 - Single interface access to multiple bandwidth and power memory zones: In an embodiment, a system comprises a first memory module interface unit (MMIU) configured to couple to a first one or more memory modules, and a second MMIU configured to couple to a second one or more memory modules. The first MMIU is configured to operate the first one or... Agent: Mhkkg/sun12/24/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090319765 - Managing and changing device settings: A system facilitates the configuring of a set of devices. The system stores templates, where each template includes configuration data that applies to one or more of the devices. The system configures the devices based on the configuration data in the templates.... Agent: Harrity & Harrity, LLP
20090319763 - Non-blocking uefi i/o channel enhancements: A method and apparatus for providing platform initialization enhancements is discussed herein. In one embodiment, buses, activities, devices, and/or nodes to be processed during boot, are processed in a non-blocking fashion, which potentially results in faster boot times. Moreover, some devices/nodes, such as root nodes, may be boot in an... Agent: Intel Corporation C/o Cpa Global
20090319764 - Power-on detection circuit and microcontroller: There is provided a power-on detection circuit including: a flip-flop circuit storing an indefinite value at the time of power-on and outputting plural-bit data; and a comparator comparing the plural-bit data output from the flip-flop circuit and a plural-bit fixed value and outputting a power-on detect flag depending on a... Agent: Arent Fox LLP
20090319768 - Computer, remote activation method, and remote activation program: To activate respective OSs separately through a network even in a virtual machine in which a plurality of OSs are installed, an M-packet acquiring unit acquires a received magic packet. An address detecting unit detects a MAC address that is stored in the magic packet. A control-list storage unit records... Agent: Greer, Burns & Crain
20090319767 - Data processing apparatus: The present invention provides a data processing apparatus realizing reduced load on a host CPU and improved performance. An arithmetic unit includes an SIMD processor for processing a plurality of pieces of data by a single instruction, and a second CPU coupled to the SIMD processor via an arithmetic unit... Agent: Mcdermott Will & Emery LLP
20090319766 - Provisioning an unknown computer system: A method of provisioning an unknown computer system is disclosed. The method includes detecting a computer system to be provisioned, determining that the computer system is unknown to a configuration management system, and identifying a global identifier and a digital certificate to be used to provision the computer system. The... Agent: Microsoft Corporation
20090319769 - Discrete key generation method and apparatus: A computer enabled secure method and apparatus for generating a cryptographic key, to be used in a subsequent cryptographic process, where the key is to be valid only for example during a specified time period. The method uses a polynomial function which is a function of an input variable such... Agent: Apple C/o Mofo Palo Alto
20090319770 - Method, devices and computer program product for encoding and decoding media data: The invention relates to methods for encoding and decoding media data (MD, CMD). One of the methods comprises the following steps: A request is transmitted by a subscriber terminal (1) over a control network (2) to a control server (3) to establish a set of encoding parameters (K) for control... Agent: K&l Gates LLP
20090319771 - Context aware security: Layered semantic security provides a high degree of security for a mobile device based upon contextual awareness that dynamically changes based upon interaction between a user and a near communication device, which in turn interacts with a network, which ultimately interacts to a far communication device. Generating a shared secret... Agent: Qualcomm Incorporated
20090319775 - Data path security processing: Methods and associated systems provide secured data transmission over a data network. A security device provides security processing in the data path of a packet network. The device may include at least one network interface to send packets to and receive packets from a data network and at least one... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090319773 - Encryption-based control of network traffic: A computer-implemented method for protecting a computer network (22) includes receiving at a gateway (24) data transmitted from a source address for delivery to a destination on the computer network. The data are encrypted at the gateway using an encryption key selected from a set of one or more keys... Agent: D. Kligler I.p. Services Ltd
20090319774 - Identification information protection method in wlan inter-working: By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20090319772 - In-line content based security for data at rest in a network storage system: A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using... Agent: Perkins Coie LLP
20090319777 - Distributed subscriber management system: A distributed subscriber management system and method that controls access to a network preventing unauthorized traffic through the access network and providing centralized access control between user networks are disclosed. The controlled access is provided through the use of one of several technologies including user authentication, using PAP, CHAP, RADIUS,... Agent: Victoria Donnelly
20090319776 - Techniques for secure network communication: Techniques for secure network communication are provided. Credentials for a user along with a transparently generated secret are sent to a resource that the user desires to establish a secure communication session with. After successful authentication of the user, an initial sequence number for a first transaction of the session... Agent: Schwegman, Lundberg & Woessner/novell
20090319778 - User authentication system and method without password: A Verified unit (VU) communicates with an Authenticating Unit (AU). The VU only provides the AU with the user's public key via RSA technology known in the art. The AU sends a character string to the VU requiring the VU to generate a digital signature which is sent to an... Agent: Richard B. Klar Law Office Of Richard B. Klar
20090319780 - Establishing secure data transmission using unsecured e-mail: In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an external guest entity using a proof of possession of a trusted token for the external guest entity. The host entity may transmit the encrypted... Agent: Microsoft Corporation
20090319782 - Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments: Disclosed are interconnectable personal computer architectures comprising secure, portable and persistent computing environments that provide secure computing sessions with persistence. The computing environments are implemented using a secure non-computing client device, such as a USB device, that interfaces with a host computer and, optionally, a trusted server. The secure non-computing... Agent: Leland L. Chan
20090319779 - Method and device for ensuring information integrity and non-repudiation over time: The present invention relates to a method and a device for ensuring information integrity and non-repudiation over time. A basic idea of the present invention is to provide a mechanism for secure distribution of information, which information relates to an instance in time when usage of cryptographic key pairs associated... Agent: Harness, Dickey & Pierce, P.L.C
20090319783 - Method of aggregating multiple certificate authority services: The disclosure relates to the management of PKI digital certificates, including certificate discovery, installation, verification and replacement for endpoints over an insecure network. A database of certificates may be maintained through discovery, replacement and other activities. Certificate discovery identifies certificates and associated information including network locations, methods of access, applications... Agent: Everett D. Robinson Echelon Ip, LLC
20090319781 - Secure message delivery using a trust broker: An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When... Agent: Microsoft Corporation
20090319784 - Dynamic verification value system and method: A method for forming a dynamic verification value. The method includes altering a first data string to form a second data string, and forming a first dynamic verification value using at least a portion of the second data string. The first dynamic verification value is used to authenticate a portable... Agent: Townsend And Townsend Crew LLP
20090319786 - Electronic data security system and method: A security system capable of providing seamless access to, and encryption of, electronic data. The security system integrates into an operating environment and intercepts calls between the operating environment and one or more Productivity Applications within the operating environment, thereby ensuring security policies are properly applied to all sensitive data... Agent: Dr. D. Graeser Ltd.
20090319785 - Method and system of accessing copy-prevented encrypted data resources over a network: A system of accessing a copy-prevented encrypted data file transmitted over a network includes a server apparatus having data files; and a client apparatus comprising a read apparatus and a temporary storage. A data file in a server apparatus is accessed through the network from the client apparatus and cached... Agent: Ladas & Parry LLP
20090319787 - Multiple independent levels of security containing multi-level security interface: Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an external stack via a network interface card, the frame contains a security classification, which is compared to the security classifications assigned to a... Agent: John S. Beulick (24691) Armstrong Teasdale LLP
20090319789 - Encrypted portable medical history system: The invention consists of a system of integrated components comprised of at least one portable data storage device, a secure server based system to warehouse data within a database and an image of the computer readable media on the portable data storage device, and a user interface to the secure... Agent: James M. Francis
20090319788 - Enhanced shared secret provisioning protocol: An Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched at two network devices together within a predetermined time interval. These two devices then automatically register with each other. When two devices... Agent: Wolf Greenfield (microsoft Corporation) C/o Wolf, Greenfield & Sacks, P.C.
20090319790 - Masked digital signatures: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a... Agent: Eckert Seamans Cherin & Mellott, LLC
20090319791 - Electronic apparatus and copyright-protected chip: According to one embodiment, a copyright-protected chip includes a selector which connects a host controller to a circuit in the copyright-protected chip, a second register in which a encrypted content key, decryption key generation information, and shared classified information stored in a storage device are stored, and a communication circuit... Agent: Knobbe Martens Olson & Bear LLP
20090319792 - Resynchronization for push message security using secret keys: A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the access terminal with a secret key that is only known to the access terminal and the server. The access terminal... Agent: Qualcomm Incorporated
20090319793 - Portable device for use in establishing trust: A portable device for use in establishing trust including a communications module for communicating with a host machine; embedded trusted data; a virtual machine module for instantiating a virtual machine on the host machine; and a security module for including a secure application in the virtual machine to perform an... Agent: Brinks Hofer Gilson & Lione
20090319795 - Digitally signing documents using identity context information: Creating a token for use by an entity when digitally signing documents. In a computing environment, a digital identity representation for an entity is accessed. The digital identity representation includes information identifying identity attributes about the entity and capabilities of an identity provider that provides tokens for use by the... Agent: Workman Nydegger/microsoft
20090319796 - Gaming machine certificate creation and management: Methods and systems for creating and managing certificates for gaming machines in a gaming network using a portable memory device are described. A gaming machine creates a certificate signing request which is stored on a portable memory device at the machine by an operator. The memory device is handed over... Agent: Weaver Austin Villeneuve & Sampson LLP
20090319797 - Method and computer system for ensuring authenticity of an electronic transaction: At least one embodiment of the present invention relates to a method for ensuring authenticity of an electronic transaction performed during a transaction session. The method includes receiving, over a first network, a request from a user for the completion of an electronic transaction; receiving, over the first network, an... Agent: Harness, Dickey & Pierce, P.L.C
20090319794 - Semantic digital signatures: A method is provided for adding intended meaning to digital signatures. A message, being base content, is received to be signed. Assertions, ontologies, and description of a reasoner are adjoined to the message. Ontologies are a formal specification of vocabulary and rules used to state the assertions. The reasoner validates... Agent: Cantor Colburn LLP-ibm Europe
20090319798 - Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks: A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is communicatively... Agent: White & Case LLP Patent Department
20090319800 - Cryptographic device having session memory bus: Provided is a cryptographic device performing encryption or decryption on input data, and more particularly, a cryptographic device having a session memory bus for communicating with a session memory. The cryptographic device includes: an external session memory for storing cryptographic information on each session; a cryptographic processor for encrypting or... Agent: Ladas & Parry LLP
20090319799 - Generating unique data from electronic devices: Providing for analysis of artifacts of electronic devices to generate data that is substantially unique to a particular device or to a class of devices is described herein. In some aspects, analyzed artifacts are chosen based on reliable reproducibility of such data over many analyses. The substantially unique data can... Agent: Lee & Hayes, PLLC
20090319803 - Information processing system and information processing method: An information processing system has a power supply section which detects a predetermined potential applied to a USB terminal and supplying the potential as a source potential, an information detection section which detects the predetermined information supplied to the USB terminal, and a processing section which executes, subsequent to the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090319802 - Key genaration in an integrated circuit: A method of manufacturing a series of integrated circuits having related functionality, the method including the steps of: (a) determining an identifier; (b) permanently storing the identifier on one of the integrated circuits; (c) repeating steps (a) and (b) for each integrated circuit in the series; and wherein the identifiers... Agent: Silverbrook Research Pty Ltd
20090319801 - Security-enhanced storage devices using media location factor in encryption of hidden and non-hidden partitions: Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device provides for increased or hardened security of data stored in hidden and non-hidden partitions of a storage medium in the device. An algorithm... Agent: Beyer Law Group LLP
20090319804 - Scalable and extensible architecture for asymmetrical cryptographic acceleration: Systems and methods for providing asymmetrical cryptographic acceleration are provided. The scalable asymmetric cryptographic accelerator engine uses a layered approach based on the collaboration of firmware and hardware to perform a specific cryptographic operation. Upon receipt of a request for a cryptographic function, the system accesses a sequence of operations... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090319805 - Techniques for performing symmetric cryptography: Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by performing a symmetric encryption operation using a symmetric key. The encrypted data portion is decrypted using a key-specific decryption engine which does not... Agent: Microsoft Corporation
20090319806 - Extensible pre-boot authentication: In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a full disk encryption disk in a pre-boot environment, executing the PBA using a chipset to obtain user credential information, authorizing the user based on the user credential information and stored credential information,... Agent: Trop, Pruner & Hu, P.C.
20090319807 - Systems and methods for content playback and recording: A method for content playback and recording may include using a computer to obtain media content from a recorded medium. Concurrently with obtaining the media content, the method may include reencrypting the encrypted media content using a secondary encryption key and storing the reencrypted media content in a storage device.... Agent: Realnetworks, Inc. C/o Stoel Rives LLP
20090319809 - Power supply circuit for central processing unit: A power supply circuit for a CPU includes a first control circuit, a switch circuit, an operational amplifying circuit, and a second control circuit. The first control circuit is connected to a BIOS to receive a CPU identification signal. The switch circuit is connected to the first control circuit, and... Agent: PCe Industry, Inc. Att. Steven Reiss
20090319810 - Receiving apparatus and activation control method for receiving apparatus: A receiving apparatus does not frequently activate a host processor in a sleep mode, so that it is possible to reduce a time overhead when the host processor transitions from a sleep mode to a running mode, also suppress power consumed in the overhead time and improve communication performance. With... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20090319808 - System and method for smoothing power reclamation of blade servers: A modular enclosure including first, second, third, and fourth servers, and a chassis management controller. The first, second, and third servers each have reclaimable power. The fourth server is configured to request a specific amount of power needed to complete a power-on request received at the fourth server. The chassis... Agent: Larson Newman & Abel, LLP
20090319811 - Storage apparatus and disk device control method: In a storage apparatus, an MPU acquires a value of power capable of being used to transition a HDD from a power-saving state to an access-enabled state, receives an access command via a host I/F, determines whether or not it is possible to respond to the access command using one... Agent: Antonelli, Terry, Stout & Kraus, LLP
20090319812 - Configuring processors and loads for power management: Controlling processors and processor hardware components in a computing device based on execution load and a power saving preference. The power saving preference relates to responsiveness of the processors versus power consumption of the processors to manage battery life of the device. The processors and processor hardware components may be... Agent: Microsoft Corporation
20090319813 - Method and system for managing power supply to at least one device: A method of managing power supply to at least one device in a data processing system, the method comprising determining when the at least one device has been associated with no resources for a predetermined period of time; turning off the power supply to the at least one device; determining... Agent: Hewlett-packard Company Intellectual Property Administration
20090319814 - Memory power controller: A memory power controller comprises a clock generation circuitry for generating a first clock signal and a second clock signal responsive to a source clock and a determination that the source clock has a period greater than a predetermined value. The first clock is generated responsive to a determination that... Agent: Howison & Arnott, L.l.p
20090319815 - Synchronizing graphical programs executing on respective computer systems: A first graphical program executing on a first device may execute a first graphical code portion for a plurality of iteration. Various systems and methods for synchronizing the execution of the iterations of the first graphical code portion with graphical code portions executing iteratively in graphical programs on other devices... Agent: Jeffrey C. Hood Meyertons Hood Kivlin Kowert & Goetzel PC
20090319816 - Information processing apparatus and time measurement method: An information processing apparatus includes a versatile Operating System (OS) that performs a time measurement process in response to a request from an application, a storage unit that stores a process load of the versatile OS and a delay time of the time measurement process in combination, a detecting unit... Agent: Greer, Burns & Crain
20090319817 - Clock selection for a communications processor having a sleep mode: A clock selector operative on two clocks operating on different domains and responsive to a SELECT input provides a transition from a first clock to a second clock, and from a second clock to a first clock with a dead zone therebetween. The delay is provided by a doublet register... Agent: Jay Chesavage
20090319818 - Method and apparatus for a robust embedded interface: A method is provided for operating an interface between a first unit and a second unit supplying its data. The method includes switching control between LSSD_B and LSSD_C clocks and system clock (CLK) to provide a test mode of operation and a functional mode of operation to optimize setup and... Agent: Greenblum & Bernstein, P.L.C
20090319819 - Clock synchronization using correlation events: Two clocks may be synchronized by calculating skew and offset values that may be determined from several correlation events. A correlation event may be the passing of messages in both directions between the two devices. The skew and offset values may be used to determine the time of non-correlated events.... Agent: Microsoft Corporation
20090319820 - Clock controlling apparatus of computer system and applications thereof: A clock controlling apparatus of a computer system used to tuning a clock frequency of a specific electronic device disposed on a motherboard and the application thereof are disclosed, wherein the clock controlling apparatus comprises an input control unit used to output a frequency increasing signal or a frequency decreasing... Agent: Wpat, PC Intellectual Property Attorneys
20090319821 - Glitch-free clock suspend and resume circuit: Circuits and methods to provide a digital clock signal, which can be instantly halted without glitches and then resumes under control of an asynchronous suspend signal with whole width clock pulses has been achieved. The circuit suspends the clock output in either a high or a low state, instantaneously with... Agent: Saile Ackerman LLC12/17/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090313463 - Data matching using data clusters: An aspect of the present invention provides a method for matching data records held by a plurality of data custodians that relate to a particular entity. One such method comprises the steps of receiving a plurality of clusters of data records from each of the plurality of data custodians (310),... Agent: Townsend And Townsend And Crew, LLP
20090313464 - Mixed mode security for mesh networks: Mixed mode security is provided for a mesh network comprising a plurality of open mesh points and at least one secure mesh point that is capable of sending and receiving encrypted traffic. Aspects of the exemplary embodiment include configuring the secure mesh point to forward unencrypted traffic received from one... Agent: Strategic Patent Group, P.C.
20090313465 - Methods and apparatus for securing optical burst switching (obs) networks: An optical network, having an optical communication link and first and second routers. The first router receives and classifies data, then forms a data burst based on destination. The first router sends an encrypted header and the data burst via the optical link. The second router, at least one hop... Agent: Dunlap Codding, P.C.
20090313467 - Federated identity brokering: A method, system and apparatus for federated identity brokering. In accordance with the present invention, a credential processing gateway can be disposed between one or more logical services and one or more service requesting clients in a computer communications network. Acting as a proxy and a trusted authority to the... Agent: Carey, Rodriguez, Greenberg & Paul, LLP Steven M. Greenberg
20090313466 - Managing user access in a communications network: A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a... Agent: Rothwell, Figg, Ernst & Manbeck, P.C.
20090313468 - Certificate renewal using secure handshake: A method, system, and computer usable program product for certificate renewal using a secure handshake are provided in the illustrative embodiments. A determination is made, forming an expiration determination, whether a validity period associated with a certificate ends within a predetermined period from a time of receiving the certificate. If... Agent: Ibm Corp. (gig)
20090313469 - Deployable secure communication system: A secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, for a remote user. While capable of secure communications, the disclosed system also provides communication capability (VOIP, video and/or data) in a non-secure manner if desired. Most importantly, bulk encrypted (i.e., secure) data may... Agent: Manelli Denison & Selter PLLC
20090313470 - Using a portable computing device as a smart key device: A first data processing system, which includes a first cryptographic device, is communicatively coupled with a second data processing system, which includes a second cryptographic device. The cryptographic devices then mutually authenticate themselves. The first cryptographic device stores a private key of a first asymmetric cryptographic key pair and a... Agent: Greg Goshorn, P.C.
20090313471 - Extending the drm realm to external devices: Disclosed is a method and a system for rendering content on external devices securely. The method comprises setting up a communication channel between a proxy rendering server of a mobile device and an external rendering server of an external device, authenticating at least the external rendering server and upon successful... Agent: Ericsson Inc.
20090313472 - Secure session key generation: A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key Agreement (AKA) and application level generic bootstrapping architecture (GBA) with UICC-based enhancements (GBA_U) procedures is improved. A secure shared session key... Agent: Volpe And Koenig, P.C. Dept. Icc
20090313473 - Method and apparatus for secure measurement certification: The certification may include a signal receiver to receive timing signals from a satellite or other external source. The external timing signals may be used to generate the time included in the certified measurement, or could be used to determine the location of the measurement certification device for inclusion in... Agent: Walker Digital Management, LLC
20090313474 - Non-transferable anonymous digital receipts: The present invention relates electronic receipts. There is provided a method for generating an electronic receipt in a communication system providing a public key infrastructure, the method comprising the steps of receiving by a second party a request message from a first party, the request message comprising a transaction request... Agent: Scully, Scott, Murphy & Presser, P.C.
20090313475 - Security in computing networks: A system for verifying the security of communications between a set of nodes via a high-bandwidth, insecure communications channel. A number of embodiments are described for enabling authenticated communication between the nodes in an environment wherein there is a high bandwidth Dolev-Yao network amongst the nodes and non-spoofable, low-bandwidth empirical... Agent: Nixon & Vanderhye, PC
20090313477 - Dvr server and method for controlling access to monitoring device in network-based dvr system: The present invention provides a Digital Video Recorder (DVR) server and a method for controlling access to a monitoring device in a network-based DVR system, which only performs a user authentication in the DVR server and allows a direct access to a video providing unit by using an authentication token... Agent: Blank Rome LLP
20090313476 - Method and apparatus for restricting user access to fiber to an optic network terminal: In traditional networks, a user provides an authorization to establish a connection for services with an Optical Network Terminal (ONT) and an Optical Line Terminal (OLT). The ONT becomes vulnerable to unauthorized users because the ONT restricts access at an Internet Protocol level. An embodiment of the present invention includes... Agent: Hamilton, Brook, Smith & Reynolds, P.C.
20090313478 - Arrangments for interfacing with a user access manager: Arrangements which permit the employment of dedicated user-access management architecture with more than text-based access. Particularly contemplated herein are arrangements for accepting user identifiers that are then communicated to an intermediate user-delineating architecture (i.e., architecture configured for permitting access to encrypted data or sections of a computer on a user-specific... Agent: Ference & Associates LLC
20090313479 - Method and system for restricted service access: A method and system for restricted service access is described. To access adult content, the user has to enter an administrator personal identification number into a mobile device. Upon receipt of the administrator personal identification number, an access code is generated, which is provided to a content provider. The content... Agent: Mcdonnell Boehnen Hulbert & Berghoff LLP
20090313480 - Method and system for obfuscating a gryptographic function: A method of proctecting an integrity of a data processing system. The method comprises determining a data string to be protected, an integrity of the data string being an indication of the integrity of the data protecessing system. Computing a set of parameters representing a predetermined data processing function, using... Agent: Philips Intellectual Property & Standards
20090313482 - Apparatus, method and system for generating a unique hardware adaptation inseparable from correspondingly unique content: The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or encrypted, selected content has a unique identifier. In one of the preferred method and system embodiments in which the adaptive circuit has... Agent: Nixon Peabody LLP
20090313481 - Method and system for changing safety-relevant data for a control device: A system and method for changing safety-relevant data for a control device is provided wherein an authorized user inputs new or altered safety-relevant data, which is received on a data processing installation. A first checksum for the safety-relevant data is established and stored along with the safety-relevant data in at... Agent: Darby & Darby P.C.
20090313483 - Single instance storage of encrypted data: Described is a technology by which data is efficiently and securely stored in a single instance store. A hash value is computed from data in its unencrypted form. The hash value is used to reference a single instance of that data when stored in its encrypted form. In this manner,... Agent: Microsoft Corporation
20090313487 - Apparatus and method for forcibly shutting down system: The present invention relates to an apparatus and method for forcibly shutting down a computer system, and more specifically, to an apparatus and method for forcibly shutting down a system when the system is determined to be in an abnormal state. An apparatus for forcibly shutting down a system according... Agent: Birch Stewart Kolasch & Birch
20090313488 - Electronic apparatus serving as usb host and usb device: An electronic apparatus includes a host controller, a device receptacle, a multiplexer, an outside voltage detecting and controlling circuit, an interface converting unit, and a storage unit. The host controller includes a first data terminal and a first power voltage output terminal for outputting a first power voltage. The device... Agent: Wpat, PC Intellectual Property Attorneys
20090313489 - Independent power control of processing cores: Independent power control of two or more processing cores. More particularly, at least one embodiment of the invention pertains to a technique to place at least one processing core in a power state without coordinating with the power state of one or more other processing cores.... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20090313486 - Information processing system, instructing device, processing device, and information processing method: A table information reception unit (201) in an instructing device (200) receives, from processing devices connected to a network, device names of the processing devices, function information indicating functions included in the processing devices, and power information indicating a reliability of power supply to the processing devices, and causes such... Agent: Wenderoth, Lind & Ponack L.L.P.
20090313484 - Method and apparatus for prolonging battery life of a media player: A method of operating a media player is provided. In one embodiment the method includes receiving a plurality of initially configured video settings for viewing a video segment on the media player for a desired playback duration. The method further includes determining power required to play the video segment based... Agent: Apple Inc. C/o Fletcher Yoder, PC
20090313485 - Motherboard with additional voltage regulator module slot area and associated electronic module: A motherboard includes a central processing unit (CPU) slot, a voltage regulator module (VRM), a VRM slot area, and a control unit. The VRM is electrically connected to the CPU slot and used for supplying a CPU installed inside the CPU slot with a first power. When a VRM card... Agent: Raymond Sun
20090313490 - Power controller in information processor: A power controller (100) is for controlling power consumed in an information processor (1000) and includes a power context storing means (ZA105), a power context reference means (ZB101), and a power status changing means (ZA101). The power context storing means (ZA105) stores power control information for individual programs on a... Agent: Mcdermott Will & Emery LLP
20090313491 - Noise reduction apparatus and method of dynamic power management processor: A noise reduction apparatus and method of a processor to which a dynamic power management technique is applied. The noise reduction apparatus includes a mode setting unit for detecting a use state of a processor and setting an operation mode; and a power supply unit for supplying voltage corresponding to... Agent: Birch Stewart Kolasch & Birch
20090313493 - Information processing apparatus and control method therefor: An information processing apparatus which operates in one of a normal power state and a plurality of power saving states, includes a storage unit to store power saving information that designates one of the plurality of power saving states, an acquisition unit to acquire from the connected peripheral device identification... Agent: Canon U.s.a. Inc. Intellectual Property Division
20090313492 - Sleep processor: An apparatus, method, and system are provided for optimizing computer performance while a first processor is in a sleep mode of operation. For example, an embodiment of the apparatus includes a first processor, a second processor (also referred herein as a “sleep” processor), and one or more peripheral devices. The... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090313494 - Voltage detection device: An voltage detection device includes a comparator circuit comprising a first input terminal connected to a system power supply, a second input terminal connected to a standby power supply, an output terminal capable of outputting a control voltage according to comparison result; an indicator circuit; and a switch circuit connected... Agent: PCe Industry, Inc. Att. Steven Reiss
20090313495 - System and method for patient synchronization between independent applications in a distributed environment: A method for synchronizing patient data between at least two independent applications in a distributed environment includes capturing screen information from a display window of a first application client that is displaying a medical image of a patient, analyzing the screen information captured from the first application client display to... Agent: Siemens Corporation Intellectual Property Department12/10/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090307481 - Apparatus and method for booting a system: A method and apparatus for booting a system are provided. The apparatus may comprise a boot block and a baseboard management controller coupled together in the system. The baseboard management controller may be configured to receive a request from the boot block for a basic input/output system image; determine at... Agent: Hewlett-packard Company Intellectual Property Administration
20090307479 - Computer execution system for starting program quickly and method thereof: A computer execution system and a method thereof for starting at least a program quickly after a computer is booted are provided. First, a file list is stored. The file list includes multiple file names of start files which are necessary when the program is started. When the computer is... Agent: Rosenberg, Klein & Lee
20090307480 - Electronic equipment, image forming apparatus, starting method of electronic equipment, and computer program product: Each of a plurality of control units starts the control unit with one of a first start method and a second start. When a first control unit among the control units starts with a second start method, the first control unit instructs a second control unit among the control units... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20090307477 - Installation of software onto a computer: An indication is received from a user to initiate installation of an operating system onto a storage device of a computer. The storage device is partitioned into an original partition and a new partition. Installation software for the operating system is loaded onto the new partition. The computer is booted... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20090307475 - Method and apparatus for performing multiple computer bootups in minimal mode: A computer implemented process performs a plurality of computer bootups in minimal mode. Login authentication is disabled during the computer bootups. All startup programs and services not required to install new software are disabled during the computer bootups. New software is installed during the computer bootups. During the final computer... Agent: Ibm Corp (ya) C/o Yee & Associates PC
20090307478 - Platform boot with bridge support: A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration... Agent: Ericsson Inc.
20090307474 - Storing a device management encryption key in a network interface controller: A device management system for securely storing an encryption key associated with a device management session. The device management system includes an encryption key generator to generate an encryption key, a client device to receive an encrypted bootstrap data file transmitted by a base station, and a network interface controller... Agent: HolmanIPLaw
20090307476 - System and method of delaying power-up of an information handling system: A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller.... Agent: Larson Newman & Abel, LLP
20090307482 - Method and apparatus for encryption and pass-through handling of confidential information in software applications: Methods and apparatus for securely transmitting sensitive information to a remote device at the request of an application program are provided. The application program generates a request to a secure channel provider to make a transmission to a remote device. A first message is passed from the from the application... Agent: Patterson, Thuente, Skaar & Christensen, P.A.
20090307483 - Method and system for providing a mesh key: Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first node in an authentication server, the first node and the authentication server or an authentication... Agent: Staas & Halsey LLP
20090307485 - Method for mitigating denial of service attacks against a home against: The invention relates to a method for mitigating the effects of a DoS attack against a home agent supporting mobility for a plurality of mobile nodes. Furthermore the invention also relates to a home agent, a mobile node and a communication system implementing the method for mitigating the effects of... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20090307484 - Wireless access point security for multi-hop networks: Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information provided to one or more relay stations from a base station or another relay station is encrypted prior to being delivered to the one or... Agent: Withrow & Terranova, P.l.l.c.
20090307487 - Apparatus and method for performing trusted computing integrity measurement reporting: The present application discloses a method and apparatus for using trusted platform modules (TPM) for integrity measurements of multiple subsystems. The state of the platform configuration registers (PCR) after boot up are stored as the base state of the system. Base state in this context is defined as the state... Agent: Volpe And Koenig, P.C. Dept. Icc
20090307486 - System and method for secured network access utilizing a client .net software component: A method for self-service authentication of a client and a server. The method includes the server receiving an initialization command from the client. The initialization command may be transmitted to the server via a client web browser over an unsecured data transfer link. The method continues with requesting authentication information... Agent: Stetina Brunda Garred & Brucker
20090307490 - Electronic data communication system: There is described an electronic data communication system in which encrypted mail messages for a recipient are sent in two parts: message data encrypted by a symmetric encryption algorithm using a session key and session key data encrypted by an asymmetric encryption algorithm using a public key associated with the... Agent: Patent Docket Administrator Lowenstein Sandler PC
20090307488 - Health keyset management: Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided. Effectively, a central keyset manager is provided that generates, manages and distributes key material to client applications and servers deploying the platform. Thus, communications with the platform storing sensitive health-related... Agent: Microsoft Corporation
20090307489 - Mobile communication equipment and method of controlling same: The present invention provides mobile communication equipment (10) having a communicating unit (11) for communicating with a server and interface units (13, 14) removably connected to a storage unit (12) provided with an unique media ID, wherein the mobile communication equipment includes a controlling unit (15) for controlling the communicating... Agent: Hogan & Hartson L.L.P.
20090307491 - Information processing device, information processing method, program and communication system: An information processing device includes: a data storage portion that can store user data used in a particular non-contact communication service and management information to manage the user data in different storage areas corresponding to different encryption methods and that has a first storage area storing management information corresponding to... Agent: K&l Gates LLP
20090307492 - Method,system and network device for bidirectional authentication: A bidirectional authentication method, a system, and a network device, that relates to network information security are provided. The method may include: a network device configured to generate an inspection parameter according to a public key of the peer network device and a private key of the network device, the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090307494 - Methods and device for electronic entities for the exchange and use of rights: A method of transferring an item of data representative of a right between two electronic entities, at least one of the electronic entities including short range wireless communication elements suitable for transmitting the item of data to use the right, the electronic entities being suitable for communicating directly or indirectly... Agent: Young & Thompson
20090307493 - System and method for combining user and platform authentication in negotiated channel security protocols: A network security handshake exchange for combining user and platform authentication. The security handshake exchange performs operations on a pre-master secret to increase identity verification and security. The pre-master secret is augmented and authenticated with platform identity and user identity credentials of one endpoint. A second phase of exchanges may... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20090307495 - Confidential communication method: In SSL encryption communication in which a client and a server share a password, the client generates random number data, encrypts the random number data with a public key and a password, and transmits the encrypted random number data to the server, so that the client and the server safely... Agent: Greenblum & Bernstein, P.L.C
20090307497 - Identity-based-encryption messaging system: A system is provided that uses identity-based encryption to support secure communications between senders and recipients over a communications network. Private key generators are used to provide public parameter information. Senders encrypt messages for recipients using public keys based on recipient identities and using the public parameter information as inputs... Agent: Treyz Law Group
20090307496 - Method of deriving and updating traffic encryption key: A method for efficiently deriving a traffic encryption key for data encryption is disclosed. A method of generating a traffic encryption key (TEK) comprises the steps of receiving, by a mobile station from base station, a first nonce and first security materials for deriving the traffic encryption key (TEK) and... Agent: Lee, Hong, Degerman, Kang & Waimey
20090307498 - User-defined passwords having associated unique version data to assist user recall of the password: An electronic device includes password protected functionality using a password that can be changed by the user. A user-specified password is stored in association with unique version data that is subsequently provided to help user recall of the password associated therewith.... Agent: Ridout & Maybee LLP
20090307499 - Machine, machine management apparatus, system, and method, and recording medium: A machine management method includes installing software in a machine including a security device that holds a secret key unextractable from the security device and a public key extractable from the security device, encrypts input data with the public key, and decrypts the input data with the secret key; storing... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20090307500 - Program obfuscator: A program obfuscator of the present invention divides a target program into a plurality of blocks and determines program instructions allocated according to an input/output relation between the blocks, in order to diffuse and allocate the program instructions for calculating a value of secret information in various places of the... Agent: Wenderoth, Lind & Ponack L.L.P.
20090307501 - Apparatus, system, and method for communication between a driver and an encryption source: An apparatus, system, and method are disclosed for interfacing a driver with an encryption source that uses a communication module that allows the driver and the encryption source to communicate messages to one another, wherein the messages result in the encryption source providing encryption data that the communication module relays... Agent: Kunzler & Mckenzie
20090307503 - Digital content management systems and methods: Digital content management systems and methods are provided for mass production of one or multiple digital contents. During the digital content management, the digital contents are first composed and encrypted to obtain encrypted digital contents. Then, the encrypted digital contents are copied and stored to at least one storage device.... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20090307502 - Method and apparatus for securing digital information on an integrated circuit read only memory during test operating modes: The embodiments protect an IC against Design-For-Test (DFT) or other test mode attack. Secrets in ROM or PROM are secured. One embodiment for securing information on an IC includes receiving a ROM read command, writing data from a plurality of ROM address locations to an encryption logic in response to... Agent: Advanced Micro Devices, Inc. C/o Vedder Price P.C.
20090307504 - Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network: Embodiments of the present invention are directed to a data management system, apparatus and process for uniquely identifying and protecting data. In preferred embodiments, the data management system comprises a data management server, a key generator, a source print generator and a source print detector. In some preferred embodiments, the... Agent: Orrick, Herrington & Sutcliffe, LLPIPProsecution Department
20090307507 - Computer storage components that provide external and internal access: A primary computing device and a secondary computing device couple with an internal storage component of the primary device powered by, and data accessed by either the first or secondary computing device. The internal storage component includes multiple connectors for connecting internal buses and external buses over which data can... Agent: Garlick Harrison & Markison
20090307506 - Mobile portable device: The present invention provides a mobile portable device comprising a network communication module, a power-on circuit, a switching power supply, a system power supply and external battery and a calculation unit, wherein the system power supply and external battery constantly supply power to the network communication module by using an... Agent: Dickstein Shapiro LLP
20090307505 - Sensing socket assembly: A power distribution apparatus to control the supply of electrical power to a suite of master and peripheral devices, the apparatus comprising a master electrical outlet and at least one slave electrical outlet, both connectable to a common power supply. The apparatus including a sampling means adapted to sample power... Agent: Ryan Kromholz & Manion, S.c.
20090307508 - Optimizing the efficiency of an organization's technology infrastructure: This disclosure is directed to a method and system for optimizing a technology infrastructure of an organization. It includes a step or component for collecting source data from various aspects of technology infrastructure. It also includes a step or component for processing the source data to generate information regarding the... Agent: Banner & Witcoff, Ltd Attorneys For Client Number 007131
20090307509 - Dynamic cpu voltage regulator phase shedding: A voltage regulator phase shedding system includes one or more subsystems to receive a system management interrupt (SMI), gather processor utilization information, determine whether to adjust a performance state, lookup voltage regulator information for new performance state, adjust active voltage regulator phase, and adjust performance state. The voltage regulator phase... Agent: Haynes And Boone, LLPIPSection
20090307510 - Processor and power controlling method thereof: A processor including a plurality of computation circuit blocks each having a function to perform a computation for each of a plurality of pieces of divided data to be computed, and a function to power on/off each power supply includes a signal value fixing circuit, which is provided for each... Agent: Staas & Halsey LLP
20090307511 - Portable electronic devices with power management capabilities: An electronic device may operate in standby and active modes. A headset may be coupled to the electronic device. The electronic device may have audio codec circuitry. The audio codec circuitry may use general purpose input-output circuitry in handling button and headset activity during active mode. Processing circuitry may be... Agent: Treyz Law Group
20090307513 - Electronic device, power-on method for an electronic device, and program: An information processing unit and a storage unit are connected to each other through any one of a first interface, which is capable of interconnection in which the storage unit is powered on first, and after the storage unit is put into operation, the information processing unit is powered on,... Agent: Staas & Halsey LLP
20090307512 - System and method for managing blades after a power supply unit failure: Systems and methods for managing blades in the event of a power supply unit failure are disclosed. A method may include determining whether a reduced power capacity of the non-failed power supply units is sufficient to provide an aggregate minimum power requirement of the resources in response to a failure... Agent: Baker Botts, LLP
20090307514 - System and method for managing power supply units: Systems and methods for power management in an information handling system are disclosed. A method may include determining a power requirement of resources configured to receive power from a plurality of power supply units including one or more online power supply units, one or more redundant power supply units, and... Agent: Baker Botts, LLP
20090307515 - Mapping computers and ports of power distribution units in a data center: Mapping computers and ports of power distribution units in a data center, the data center including a plurality of computers and a data center management server, each computer in the data center connected for power to one of a plurality of power distribution unit (‘PDU’) ports of a PDU, each... Agent: Ibm (rps-blf) C/o Biggers & Ohanian, LLP
20090307516 - Asynchronous circuit insensitive to delays with time delay insertion circuit: The asynchronous circuit insensitive to delays comprises at least one time delay insertion circuit on the propagation path of a signal. The delay insertion circuit comprises, between an input and an output of the signal, a Muller C-element and a plurality of delay circuits connected in series to an output... Agent: Oliff & Berridge, PLC
20090307517 - Apparatus and method for processing wirelessly communicated data and clock information within an electronic device: An electronic device (12) for processing information that includes data and clock information and that is wirelessly received from another electronic device (14) may include a first processor (18) that controls only wireless communications with the another electronic device (14) and excluding operations associated only with the electronic device (12),... Agent: Barnes & Thornburg LLP (roche)
20090307518 - Asynchronous counter based timing error detection: A method for estimating a timing difference between a first clock signal and a second clock signal is disclosed. The estimating method comprising: generating an edge signal by detecting an edge of the second clock signal by sampling the second clock signal using the first clock signal; generating a delayed... Agent: Ipr Works, LLC
20090307519 - Power saving scheduler for timed events: The disclosed system and methods include a power saving scheduler that maintains timed events in an event table. Each timed event has an associated tolerance period within which the event should begin execution following a trigger, and a timestamp indicating a scheduled execution time for the event. When a device... Agent: Warren A. Sklar (soer) Renner, Otto, Boisselle & Sklar, LLP
20090307520 - Apparatus and method for processing wirelessly communicated information within an electronic device: An electronic device (12) for processing information wirelessly received from another electronic device (14) or to be wirelessly sent to the another electronic device (14) may include a first processor (20) that controls only wireless communications with the another electronic device (14) and excluding operations associated only with the electronic... Agent: Barnes & Thornburg LLP (roche)
20090307521 - Ddr memory controller: A DDR memory controller is described wherein a core domain capture clock is created by programmably delaying the core clock of the memory controller. The delay of this capture clock is calibrated during a power on the initialization sequence in concert with a DDR memory in a system environment, thereby... Agent: Jung Lee C/o Uniquify, Inc.12/03/2009 > 62 patent applications in 28 patent subcategories. patent applications/inventions, industry category
20090300342 - Apparatus, system, and method for resetting and bypassing microcontroller stations: An apparatus, system, and method are disclosed for resetting and bypassing microcontroller stations. A command module asserts and de-asserts a reset line in response to a command. A reset module resets a microcontroller station if the command module asserts and de-asserts the reset line within a time interval. In addition,... Agent: Kunzler & Mckenzie
20090300341 - System and method for automatic configuration of portal composite applications: The present invention is directed to the automatic configuration of portal composite applications. A method for automatic configuration of a portal composite application including a portal composite application infrastructure, wherein configuration parameters are managed within a composite application interface of the portal, which interface defines a runtime behavior of instances... Agent: Hoffman Warnick LLC
20090300343 - Method and apparatus for changing bios parameters via a hot key: An apparatus for changing BIOS parameters via a hot key, including a control unit, a microprocessor, a first memory, a second memory, a third memory and a keyboard. The first memory saves BIOS code while the third memory saves N parameter banks of BIOS. When the apparatus performs a keyboard-scanning... Agent: Muncy, Geissler, Olds & Lowe, PLLC
20090300344 - Device and method for identifying a certificate for multiple identifies of a user: A device and method associates a certificate with a first recipient identity. The method comprises receiving the first recipient identity of a user. The method comprises associating the first recipient identity of the user with a second recipient identity of the user. The second recipient identity is associated with a... Agent: Motorola Inc
20090300345 - Concept for client identification and authorization in an asynchronous request dispatching environmnet: The present invention provides client and server identity validation in an asynchronous request dispatching environment with client-side aggregation. An application server receives an asynchronous include request from a client. A first unique identifier associating the client with the asynchronous include is generated and sent to a results server. A second... Agent: Duke W. Yee
20090300346 - Device and method for identifying certificates: A device and method identifies a certificate. The method comprises determining, by a transmitter of data, an identity of a recipient of the data. The method comprises identifying a certificate associated with the identity. The identifying includes a local search and a remote search. The method comprises encrypting the data... Agent: Motorola Inc
20090300347 - Set membership proofs in data processing systems: A method and apparatus for proving and a method and apparatus for verifying that a secret value is a member of a predetermined set of values. The proving mechanism receives a set of signatures which has respective values in the predetermined set signed using a private key. The proving mechanism... Agent: Ibm Corporation, T.j. Watson Research Center
20090300348 - Preventing abuse of services in trusted computing environments: Methods and systems for regulating services provided by a first computing entity, such as a server, to a second computing entity, such as a client are described. A first entity receives a request for a service from a second entity over a network. The first entity determines whether the second... Agent: Beyer Law Group LLP
20090300349 - Validation server, validation method, and program: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148.... Agent: Mcdermott Will & Emery LLP
20090300350 - Security groups: Methods and devices are provided for implementing security groups in an enterprise network. The security groups include first network nodes that are subject to rules governing communications between the first network nodes and second network nodes. An indicator, referred to as a security group tag (SGT), identifies members of a... Agent: Weaver Austin Villeneuve & Sampson LLP
20090300351 - Fast searchable encryption method: The present invention provides a method, apparatus and system for fast searchable encryption. The data owner encrypts files and stores the ciphertext to the server. The data owner generates an encrypted index according to each keyword of the files, and stores the encrypted index to the server. The index is... Agent: Sughrue Mion, PLLC
20090300355 - Information sharing method and apparatus: Embodiments of the present invention relate to methods and apparatus for sharing information with third parties and providing mechanisms whereby those third parties may legitimately pass the personal information on to other, for example affiliated, third parties. In one example of information sharing, information is shared electronically between an information... Agent: Hewlett-packard Company Intellectual Property Administration
20090300354 - Method and apparatus for preventing replay attack in wireless network environment: A method for preventing a replay attack is provided. A prime number is mutually exchanged between a main node and children nodes. The main node generates a Prime Sequence Code Matrix (PSCM) corresponding to the prime number, notifies the children nodes of sequence orders corresponding to the children nodes. The... Agent: The Farrell Law Firm, LLP
20090300352 - Secure session identifiers: An apparatus and a method for an authentication protocol. In one embodiment, a server generates a sequence number, and a server message authentication code based on a server secret key. The server sends the sequence number, an account identifier, and the server message authentication code to the client. The client... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20090300353 - Trusted network interface: Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet, are configured to perform defensive and/or offensive actions against botnets and/or other cyber threats. According to some embodiments, network security appliances may be configured... Agent: Townsend And Townsend And Crew LLP Viasat, Inc. (client #017018)
20090300356 - Remote storage encryption system: An exemplary remote storage encryption system includes a data storage unit and a key server having a key management module configured to communicate with a client device. The key management module stores at least one key access map that maps at least one access credential to at least one encryption... Agent: Rader, Fishman & Grauer PLLC
20090300359 - Apparatus and method for securely submitting and processing a request: An apparatus and a method for securely submitting a request and an apparatus and a method for securely processing a request. The apparatus for securely submitting a request includes a request pre-submitting component and a request confirmation component. The request pre-submitting component sends a request with a unique identifier to... Agent: Ibm Corporation, T.j. Watson Research Center
20090300360 - Application setting terminal, application executing terminal, and setting information managing server: An application setting terminal includes a GUI 11 for displaying a screen corresponding to a screen displayed by an application executing terminal 2 that executes an application, and accepting both a selection of an application to be installed and an on-screen arrangement of the application, which are input via the... Agent: Birch Stewart Kolasch & Birch
20090300358 - Method for managing network key and updating session key: A method for managing network key and updating session key is provided. The step of the key management includes: constructing key request group, constructing key negotiation response group, and constructing key negotiation acknowledgement group. The step of multicasting key management method includes multicasting main key negotiation protocol and multicasting session... Agent: Cantor Colburn, LLP
20090300357 - Method for personal network management across multiple operators: A method for accessing a Personal Network (PN) from a Guest device. In this method, the Guest device (18) receives a service key from a Master device (16) of the Personal Network (15) to which the Guest device wishes to access. The Guest device (18) then sends the Device ID... Agent: Christensen, O'connor, Johnson, Kindness, PLLC
20090300361 - Method for receiving/sending multimedia messages: A method for receiving/sending multimedia message uses a wireless LAN, and communicates with a gateway via the wireless LAN so as to send and receive multimedia messages. Furthermore, the gateway of the invention detects whether the user device is located within the wireless LAN. If yes, then multimedia messages are... Agent: Michael Buchenhorner, P.A.
20090300362 - Password self encryption method and system and encryption by keys generated from personal secret information: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed... Agent: Walter J. Tencza Jr.
20090300363 - Method and arrangement for real-time betting with an off-line terminal: The invention relates generally to a method and arrangement for real-time betting with an off-line terminal, and especially to the technological field of keeping reliable time in the off-line terminal when handling, within a communications system comprising a distributed domain and a central domain, electronic records that contain predictions of... Agent: Ip Patent Docketing K&l Gates LLP
20090300364 - Username based authentication security: An apparatus and a method for an authentication protocol. In one embodiment, a client requests for an authentication challenge from a server. The server generates the authentication challenge and sends it to the client. The authentication challenge includes the authentication context identifier, a random string, a timestamp, and a signature... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20090300365 - Vehicle diagnostic system security with memory card: A method and system are provided to authenticate a software stored on a computing device such as vehicle diagnostic tool. The system generates and stores encrypted information such as a memory media and the media access control address of the vehicle diagnostic tool. The encrypted information can be sent to... Agent: Baker & Hostetler LLP
20090300367 - Electronic certification and authentication system: The invention is an automated system that works in the data center of certification offices connected to the internet which enables a member of the any of the certification offices to certify his document electronically from a distance using a computer connected to the internet, digital pad, an electronic pen... Agent: Pearl Cohen Zedek Latzer, LLP
20090300366 - System and method for providing a secure application fragmentation environment: System and method for providing and using expanded memory resources secure application environment is disclosed. An embodiment comprises a system and method for providing secure application functionality comprising receiving a request for a secure operation; determining if required application code for the secure operation is present in an application fragment... Agent: Slater & Matsil LLP
20090300368 - User interface for secure data entry: A computer input device for operation with a computer includes an input transducer, which is coupled to receive an input from a user and to generate a data signal responsively to the input. An encryption processor is coupled to process the data signal so as to output data to the... Agent: D. Kligler I.p. Services Ltd
20090300370 - Enabling byte-code based image isolation: In one embodiment, the present invention includes a method for setting an extensible policy mechanism to protect a root data structure including a page table, interpreting a bytecode of a pre-boot driver in a byte code interpreter, and controlling access to a memory location based on the extensible policy mechanism.... Agent: Trop, Pruner & Hu, P.C.
20090300369 - Security unit and protection system comprising such security unit as well as method for protecting data: In order to provide a protection system (100; 100′) for protecting data (D1+D2), for instance at least one data processing program and/or at least one software application, the protection system (100; 100′) comprising at least one data storage unit (10) for storing the data (D1+D2), at least one main processing... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20090300371 - Semiconductor integrated device and method of testing semiconductor integrated device: According to one embodiment, a semiconductor integrated device which stores secret data and is capable of operating in a test mode in which a scan test with respect to an internal circuit is executed, the semiconductor integrated device comprises a mode signal receiving module configured to receive a scan mode... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090300372 - Solid state disk and input/output method: Disclosed is a solid state disk including a storage unit configured to store data, and a control part configured to control enciphering and writing operation for the data using a key value and an initialization vector. The initialization vector is generated by processing an address corresponding to the data.... Agent: Volentine & Whitt PLLC
20090300378 - Computer having power management function: A power management system is disposed in a computer. The power management system includes a current detecting module and a chipset. The current detecting module is disposed between the power receiving end of an external device and the power cord of the power source of the computer for detecting the... Agent: North America Intellectual Property Corporation
20090300377 - Computer system for managing power consumption and method thereof: A computer system for managing power consumption includes a power supply, a current detecting module, a power control module and a feedback control module. The power supply is used for outputting a system voltage according to a feedback signal. The current detecting module senses a system current to generate system... Agent: North America Intellectual Property Corporation
20090300376 - Control method and computer system for advanced configuration and power interface: Provided is a control method for an advanced configuration and power interface (ACPI) in a computer system. The computer system comprises a processor and a bus master, wherein the processor, as defined by the ACPI specification, has a first state (C0 state), a second state (C1 state), a third state... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20090300375 - Power supply control circuit: An exemplary power supply control circuit includes a first electric switch, a second electric switch, a third electric switch, a power supply, and an output terminal. The first electric switch has a first terminal connected to an SIO chip to receive a control signal. When the control signal is at... Agent: PCe Industry, Inc. Att. Steven Reiss
20090300379 - Sensor system: A sensor node for use in a sensor system includes a core component a sensor component and a power component. The core component includes processing and transmission/receiving components. Additionally, the core component includes interfaces for selectively connecting sensor and power components of any one of a plurality of types. In... Agent: Hoffman Warnick LLC
20090300374 - Storage apparatus and start-up control method for the same: Upon initial start-up of additional chassis, a CPU 214 for a basic chassis 400 selects, based on predicted power consumption for additional chassis 410, 412, etc., N additional chassis as a start-up control unit so that total power consumption for the basic chassis 400 and the respective additional chassis 410,... Agent: Sughrue Mion, PLLC
20090300373 - System for turning a computer on and off: A system for turning a computer on and off, the system has a first switch mounted on an external device, and a control circuit for turning the computer on or off. The control circuit has a second switch and a first resistor. The first switch is connected between the second... Agent: PCe Industry, Inc. Att. Steven Reiss
20090300382 - Controlling power consumption in a data processing apparatus: A data processing apparatus, bus logic and method are provided for controlling power consumption within a data processing apparatus. The data processing apparatus has a plurality of logic elements, at least one of the logic elements being an initiator logic element for initiating transfers, and at least one of the... Agent: Nixon & Vanderhye, PC
20090300383 - Energy conservation control device for a network system: In order to accomplish the aforementioned task, there is characterized an electric power consumption control method, for a plurality of network connection devices connected with the network, which groups a plurality of network connection devices and, on the basis of the traffic level of the grouped network connection devices, controls... Agent: Brundidge & Stanger, P.C.
20090300380 - Remote power save service for imaging device: A remote power save service for an imaging device is provided. When the imaging device is awake, a power save controller on the imaging device causes the imaging device to enter a reduced power mode in response to a valid power save request received from a remote power save client.... Agent: Sharp Laboratories Of America, Inc.
20090300381 - Thin client and power management method thereof: Thin client-server architecture networks have a server and a thin client electrically connecting each. The server receives command signals from the thin client, produces respond signals respectively, and sends the respond signals back to the thin client. The server has a counter for counting a residual number, the number of... Agent: Chih Feng Yeh Brian M. Mcinnis
20090300387 - Operation method of storage apparatus, storage apparatus and storage subsystem: Proposed is an operation method for seeking a power interruption operation target in which MTBF will become longest. When a target value regarding a power interruption time and a target value regarding a power interruption count per 24 hours is input from an administrator to a management computer, the management... Agent: Antonelli, Terry, Stout & Kraus, LLP
20090300386 - Reducing power consumption during execution of an application on a plurality of compute nodes: Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: powering up, during compute node initialization, only a portion of computer memory of the compute node, including configuring an operating system for the compute node in the... Agent: Ibm (roc-blf)
20090300384 - Reducing power consumption while performing collective operations on a plurality of compute nodes: Methods, apparatus, and products are disclosed for reducing power consumption while performing collective operations on a plurality of compute nodes that include: receiving, by each compute node, instructions to perform a type of collective operation; selecting, by each compute node from a plurality of collective operations for the collective operation... Agent: Ibm (roc-blf)
20090300385 - Reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application: Methods, apparatus, and products are disclosed for reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application that include: beginning, by each compute node, performance of a blocking operation specified by the parallel application, each compute node beginning the blocking operation asynchronously with respect... Agent: Ibm (roc-blf)
20090300388 - Distributed clock gating with centralized state machine control: A method, computer program product, and system are provided for controlling a clock distribution network. For example, an embodiment of the method can include programming a predetermined delay time into a plurality of processing elements and controlling an activation and de-activation of these processing elements in a sequence based on... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090300393 - Dynamic power control for reduced voltage level of graphics controller component of memory controller based on its degree of idleness: A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the... Agent: Buckley, Maschoff & Talwalkar LLC
20090300392 - High speed network interface with automatic power management with auto-negotiation: A computer system comprises host processor and a network interface, wherein the host processor includes resources supporting a full power mode, a lower power mode and a power down mode, as seen in standard system bus specifications such as PCI and InfiniBand. The network interface includes a medium interface unit... Agent: 3com Corporation
20090300390 - Imaging device with adaptive power saving behavior and method for use thereon: An imaging device with an adaptive power saving behavior conserves power by establishing reduced power mode entry and/or exit timeout values based on device usage statistics. Such an imaging device in some embodiments comprises at least one interface and a processor communicatively coupled with the interface, wherein under control of... Agent: Sharp Laboratories Of America, Inc.
20090300389 - Power supply having multiple sets of output power: A power supply having multiple sets of output power includes a primary power system to transform AC power to DC power when a computer host is power on and a standby power system linking and transforming the AC power to the DC power when the computer host is shut down.... Agent: Muncy, Geissler, Olds & Lowe, PLLC
20090300391 - Self-powered devices and methods: A system includes a computing device that selectively communicates with a self-powered device. The self-powered device has several modes of operation, including a first low-power mode of operation and a second high-power mode of operation. The self-powered device is to communicate with the computing device when the self-powered device is... Agent: Morgan Lewis & Bockius LLP/rambus Inc.
20090300396 - Information processing apparatus: According to one embodiment, an information processing apparatus includes a power supply module, a connection bus, a processor connected to the connection bus and including a power supply control circuit module supplied with power from the power supply module and a arithmetic circuit module connected to the power supply control... Agent: Knobbe Martens Olson & Bear LLP
20090300397 - Method, apparatus and system for reducing power consumption involving data storage devices: The invention provides a method, apparatus and system for reducing power consumption involving data storage devices. One embodiment involves storing data in a first memory; in response to the first memory exceeding a first threshold, migrating the data from the first memory to a second memory; in response to the... Agent: Kenneth L. Sherman, Esq. C/o Myers Andras Sherman LLP
20090300395 - Power saving system and method: A power saving system is provided, comprising a system chip, at least one controller and at least one corresponding switch. The system chip is coupled to the controller. The controller is coupled between the system chip and a connector. The switch is coupled between the controller and a power and... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20090300394 - Reducing power consumption during execution of an application on a plurality of compute nodes: Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node,... Agent: Ibm (roc-blf)
20090300398 - Control structure for a power supply cluster: A control structure for a power supply cluster which has a primary power supply and a secondary power supply that are independently linked to AC power and transform the AC power to DC power to supply electric power required by an electronic device in a computer equipment. A switch unit... Agent: Muncy, Geissler, Olds & Lowe, PLLC
20090300400 - Primary side control circuit and method for ultra-low idle power operation: A method and circuit for reducing power consumption during idle mode to ultra-low levels, such as about 1/10th to 1/1000th or less of active power is disclosed. An ultra-low idle power supply comprises a primary circuit, a secondary circuit and a control circuit. The control circuit monitors behavior of the... Agent: Snell & Wilmer L.L.P. (main)
20090300399 - Profiling power consumption of a plurality of compute nodes while processing an application: Methods, apparatus, and products are disclosed for profiling power consumption of a plurality of compute nodes while processing an application that include: executing the application on the plurality of compute nodes; monitoring performance characteristics for components of the plurality of compute nodes during execution of the application; and recording, in... Agent: Ibm (roc-blf)
20090300401 - Performing a perform timing facility function instruction for sychronizing tod clocks: A system, method and computer program product for performing a Perform Timing Facility (PTFF) instruction for steering a Time of Day (TOD) clock of the computer system for synchronizing the TOD clock with TOD clocks of other computer systems. The computer system comprises a memory; and, a processor in communications... Agent: Scully, Scott, Murphy & Presser, P.C.
20090300402 - Embedded software testing using a single output: An integrated circuit includes a processor and a circuit. The processor is configured to execute software. The software includes a plurality of software events. The circuit is configured to output a pulse on a single pin or pad of the integrated circuit in response to executing each software event. A... Agent: Dicke, Billig & CzajaPrevious industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20130613:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.57379 seconds