|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
01/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: support January recently filed with US Patent Office 01/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 01/28/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100023738 - State separation for application changes: Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state that is defined within a... Agent: Microsoft Corporation
20100023737 - Test mode initialization: A test mode initialization system includes beginning a power-on self-test (POST) wherein the POST may be performed by determining whether a system under test is in a quick test mode, and in response to being in the quick test mode, initialize only a portion of all memory in the system... Agent: Haynes And Boone, LLPIPSection
20100023742 - Bios sharing system in a high density server and method thereof: A BIOS sharing system in a high density servers includes a plurality of servers, a BIOS (Basic Input Out System), a switch and a micro controller. Each server has a motherboard hardware and a BMC (Baseboard Management Controller), wherein each BMC is operable to output a status order in response... Agent: Brian M. Mcinnis
20100023740 - Diagnostic utility and method for a data storage device: The disclosure is related to systems and methods of a diagnostic utility for a data storage device. Further, the present disclosure is also related to monitoring host activity and storing information related to the host activity in a nonvolatile cache of a data storage device. In a particular embodiment, a... Agent: Seagate Technology LLC C/o Westman, Champlin & Kelly, P.A.
20100023744 - Interface monitoring device, computer system, and method for monitoring a differential interface port: An interface monitoring device can be used with at least one differential interface port with a positive and a negative data line for connecting a peripheral device. The interface monitoring device has a monitoring circuit and a deactivation circuit. The monitoring circuit is designed to monitor at least one signal... Agent: Slater & Matsil, L.L.P.
20100023745 - Memorandum-presenting method and computer system using the same: A memorandum-information presenting method and a computer system using the method are provided. The computer system allows the memorandum-information to be presented and/or edited during a booting procedure, for example, while executing BIOS codes, initializing various components, checking hardware, allocating resources, or assisting to load an operating system. Accordingly, a... Agent: Wpat, PC Intellectual Property Attorneys
20100023739 - Method and apparatus for booting a processing system: Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether an encrypted version of a closed operating system is authentic may be determined. The encrypted version of the closed operating system may be decrypted with a key retrieved from a processor register to... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100023741 - Method for setting bios and recreating checksum value: A method is used for setting a basic input output system (BIOS) and recreating a checksum value in a computer. The BIOS is stored in a complementary metal-oxide semiconductor (CMOS). The method includes modifying an original BIOS value to a new BIOS value, writing a preset value into a setting... Agent: PCe Industry, Inc. Att. Steven Reiss
20100023743 - Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch: Methods and apparatus to measure the integrity of a virtual machine monitor and an operating system via secure launch are disclosed. In one example, a method measures a first characteristic of a virtual machine monitor, stores the first measured characteristic in a first hardware protected location, measures a second characteristic... Agent: Intel Corporation C/o Cpa Global
20100023747 - Critical security parameter generation and exchange system and method for smart-card memory modules: A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it may be used to store a relatively large amount of data. The memory device may also... Agent: Dorsey & Whitney LLP Intellectual Property Department
20100023749 - Harvesting entropy from trusted cryptographic sources: Extending entropy in a random number generation utility. Where a device has access to trusted sources of encrypted data, such as encrypted network traffic, such encrypted network traffic may be sampled and the bits fed into the entropy seeding routines of the random number generation utility.... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100023746 - Information processing system, information processing apparatus, and information processing method: This invention prevents confidential information included in information contents from leaking from an external apparatus when the external apparatus executes a layout process and print process of the information contents. An information processing system of this invention includes an information contents converter (101) which generates output information contents (107) and... Agent: Fitzpatrick Cella Harper & Scinto
20100023748 - Self checking encryption and decryption based on statistical sampling: The present invention is related to the checking of encryption. Embodiments of the present invention are based on the discovery that sufficiently high reliability may be established without checking every encryption block. Instead, embodiments of the present invention provide that data being encrypted may be sampled at certain rate (which... Agent: Emulex Design & Manufacturing Corporation C/o Morrison & Foerster LLP
20100023750 - System and method for controllably concealing data from spying application: A method for use in controllably concealing an input data that has been entered into a computer system via an input device, from being comprehended by a spying application during transportation of the input data across a communication link of the computer system, the method including the steps of: (i)... Agent: Michael Molins Molins & Co.
20100023751 - System and method for preventing web crawler access: Preventing web crawler access includes receiving a request for a webpage that includes web content that should be protected from a web crawler, encrypting the web content to be protected to generate encrypted content and responding to the request, including sending the encrypted content and a decryption instruction. The decryption... Agent: Van Pelt, Yi & James LLP
20100023752 - Method and device for transmitting groupcast data in a wireless mesh communication network: A method for transmitting groupcast data in a wireless mesh communication network as provided improves security of groupcast data. The method comprises processing, at a supplicant node, authentication handshake data received from an authenticator node, wherein the supplicant node is a next-hop neighbor of the authenticator node away from a... Agent: Motorola, Inc
20100023753 - System and method of generating subtitling for media: A method for media subtitling is described, wherein subtitles and/or captions for media are first created on a web interface in a first language along with the appropriate synchronization information with respect to the media. The document content may be created via the web interface, or it may be created... Agent: Cantor Colburn LLP - Fox Entertainment Group
20100023754 - System and method for monitoring unauthorized transport of digital content: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content... Agent: Martin D. Moynihan D/b/a Prtsi, Inc.
20100023758 - Document authentication using electronic signature: Embodiments of authenticating an electronic document are disclosed. A document authentication system is operatively connected with a professional system, a license management system and a certification authority system, for authenticating an electronic document of a client response to a request from a client system. An authentication unit included in the... Agent: David B. Tingey
20100023755 - Method and apparatus for secure information transfer to support migration: A system and method are disclosed for providing and maintaining a high level of security during migration of data from one platform to another. The disclosed system combines user and equipment authentication with equipment environment authorization guaranteed by a security module such as supported by a trusted platform module (TPM)... Agent: Staas & Halsey LLP
20100023759 - Method and system for authorizing client devices to receive secured data streams: A method and system for authorizing client devices to receive secured data streams through the use of digital certificates embedded in the client devices. A freely distributed cryptographically signed group file with an embedded expiration date is associated with each individual digital certificate. A single group file can be associated... Agent: Stolowitz Ford Cowger LLP
20100023757 - Methods and systems for sending secure electronic data: A method and system for providing encryption are provided, involving a) transmitting a request from a sender to a database for a public key for a selected recipient, the database being configured to store for each member in a plurality of members a member public key for encrypting electronic data;... Agent: Bereskin And Parr LLP/s.e.n.c.r.l., S.r.l.
20100023756 - Splitting an ssl connection between gateways: A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with... Agent: King And Spalding LLP
20100023760 - Method, system, and data server for checking revocation of content device and transmitting data: A method of checking revocation of a device and software, and transmitting data to a secure device and secure software whose keys have not been leaked is provided. The method includes receiving authentication information of a device requesting transmission of data, and authentication information of software accessing the data in... Agent: Sughrue Mion, PLLC
20100023761 - Systems and methods using cryptography to protect secure computing environments: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100023762 - Http authentication and authorization management: Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include an epoch processor that is used to validate authentication and authorization data that is valid only for an epoch. The epoch processor can maintain a public key that can be used to... Agent: Fish & Richardson P.C.
20100023765 - Method for updating a routing entry: The present invention concerns method for updating a routing entry BC for a communication partner node CN communicating with a communication originating node MN via a network containing at least one routing node HA, the method comprising the steps of: requesting 1. a routing entry update from said communication originating... Agent: Connolly Bove Lodge & Hutz LLP
20100023763 - Multi-interface mobility client: A mobile node comprises: a plurality of network interfaces, each with a respective device driver; a network layer; a multi-interface driver capable of communication with each network interface by way of the respective device driver for that network interface, the multi-interface driver handling communications from the network layer to any... Agent: Wall & Tong, LLP/ Alcatel-lucent Usa Inc.
20100023764 - System and method for authenticating components in wireless home entertainment system: Configuration information is exchanged between a home entertainment system server and various wireless components by pushing a button on the server and a random button on a remote control device as it is pointed at the devices sought to be authenticated.... Agent: Rogitz & Associates
20100023766 - Computer program product and computer system for peer-to-peer communications: A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security... Agent: Ibm Endicott (anthony England) Law Office Of Anthony England
20100023767 - Api for diffie-hellman secret agreement: Various technologies and techniques are disclosed for implementing a Diffie-Hellman secret agreement. An application programming interface is provided that is operable to allow a first computer to generate a Diffie-Hellman secret agreement for communicating securely with a second computer over an insecure channel. A get public key operation is performed... Agent: Microsoft Corporation
20100023771 - Implicit certificate verification: A method of computing a cryptographic key to be shared between a pair of correspondents communicating with one another through a cryptographic system is provided, where one of the correspondents receives a certificate of the other correspondents public key information to be combined with private key information of the one... Agent: Blake, Cassels & Graydon LLP Box 25, Commerce Court West
20100023768 - Method and system for security key agreement: A method and system for security key agreement is disclosed. The method may include broadcasting a first connectivity association discovery message and receiving a message from a second node on the network; if the second node is not a member of a connectivity association and the message from the second... Agent: Pearl Cohen Zedek Latzer, LLP
20100023772 - Method for generating a one-time access code: A method for generating an access code for a device or system. The one-time access code generated by the method for the device or system is valid only once. The method can be used for supplying goods or services by means of automatic or semiautomatic access control devices or systems,... Agent: Patterson, Thuente, Skaar & Christensen, P.A.
20100023769 - Methods and apparatus for secure document printing: Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job... Agent: Glenn Patent Group
20100023770 - Methods and apparatus for secure document printing: Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job... Agent: Glenn Patent Group
20100023775 - Compressed ecdsa signatures: An improved compression scheme for compressing an ECDSA signature is provided. The scheme substitutes the integer s in a signature (r, s) by a smaller value c. The value c is derived from s and another value d, d being small enough such that c is smaller than s. The... Agent: Blake, Cassels & Graydon LLP
20100023774 - Information security device: An information security device (200) includes: a receiving unit (201) that receives a content and a collection command; a content storing unit (202) that stores a content and its usage rule; a collection command confirmation unit (203) that checks the validity of a received collection command; a content deletion unit... Agent: Wenderoth, Lind & Ponack L.L.P.
20100023776 - Method and system for storing a key in a remote security module: The invention concerns a method for obtaining assurance that a content control key is securely stored in a remote security module for further secure communications between a content provider and said security. A security module manufacturer, which has a pre-established trustful relation with the security module, imports a symmetric transport... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20100023773 - Signature verification apparatus, method for controlling signature verification apparatus, signing apparatus, method for controlling signing apparatus, program, and storage medium: A signature verification apparatus includes a determining unit configured to determine a type of a signature affixed to a document file, a first generating unit configured to, when the determining unit determines that the signature is of a first type, check the validity of a certificate contained in the signature,... Agent: Canon U.s.a. Inc. Intellectual Property Division
20100023777 - System and method for secure firmware update of a secure token having a flash memory controller and a smart card: A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining a firmware update portion and an encrypted hash portion of the firmware update package wherein the encrypted hash portion is... Agent: The Jansson Firm
20100023778 - Ticket authorized secure installation and boot: A method and apparatus for secure software installation to boot a device authorized by a ticket are described herein. A ticket request including a device identifier of the device is sent for the ticket which includes attributes for one or more components to boot the device into an operating state.... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20100023779 - Cryptographic processing method and cryptographic processing apparatus: In a cryptographic processing method, middle data which is the result of operation at a predetermined stage during encryption and decryption processing is saved and the subsequent encryption and decryption processes are divided into a first encryption and decryption processing which uses the initial data as input for the initial... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100023780 - Flash device security method utilizing a check register: Methods of operating memory systems and memory systems are disclosed, such as a memory system having a memory array storing a code generating program to instruct a processor to generate a code, and a register to store a code generated by the processor, where the register is configured to allow... Agent: Leffert Jay & Polglaze, P.A.
20100023782 - Cryptographic key-to-policy association and enforcement for secure key-management and policy execution: Key-to-policy association and hardware-based policy enforcement for file/folder encryption (FFE) and/or full-disk encryption (FDE) are provided. A CPU independent microprocessor (CIM) is coupled to a platform and provides a secure storage service, secure non-volatile storage, secure policy enforcement engine, and system interface for communication with platform components independent of the... Agent: Cool Patent, P.C. C/o Cpa Global
20100023781 - Data processing apparatus, data storage device, and data processing method therefor: A supported encryption and authentication function is inquired of a memory card having a digital data encryption and authentication function. An encryption and authentication function to be applied to digital data is selected based on the inquiry result. The memory card is notified of the selection result, and digital data... Agent: Cowan Liebowitz & Latman P.C. John J Torrente
20100023783 - System and method of decrypting encrypted content: System and method of decrypting content. The content may be decrypted with decryption keys stored on a secured dongle. The dongle may be connect to a computer and used to decrypt the content for the computer, limiting the decryption-based processing demands on the computer. The computer may output the decrypted... Agent: Brooks Kushman P.C.
20100023784 - Power delivery over ethernet cables: A method for power delivery comprises coupling an Ethernet cable comprising four wire pairs to a power delivery system and providing power to a powered device on all of the wire pairs. A power delivery system includes an interface operable to couple to an Ethernet cable comprising four wire pairs... Agent: Baker Botts L.L.P.
20100023785 - Unified bus architecture for poe communication and control: Embodiments of a unified communication and control bus architecture for Ethernet and/or PoE systems are provided. Embodiments enable a unified communication and control bus architecture that significantly simplifies communication and control in Ethernet and/or PoE systems. Embodiments enable significant savings both in terms of cost and complexity as the number... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100023787 - Controlling the power utilization of a computer system by adjusting a cooling fan speed: Some embodiments of the present invention provide a system that controls a power utilization of a computer system by adjusting a cooling fan speed. During operation, a relationship between information related to the cooling fan speed and the power utilization is determined. Then, the cooling fan speed is adjusted based... Agent: Pvf -- Sun Microsystems Inc. C/o Park, Vaughan & Fleming LLP
20100023788 - Reducing power consumption by offloading applications: Methods of reducing power consumption in a computing device are described in which file sharing applications which are running in the background are offloaded onto a lower power subsystem and the rest of the computing device can be put into a low power state. The lower power subsystem runs application... Agent: Lee & Hayes, PLLC
20100023786 - System and method for reduction of electricity production and demand: A system and method of intermittently reducing power demand loads to postpone an activation of an incremental power supply source or hasten the deactivation of a power source.... Agent: Pearl Cohen Zedek Latzer, LLP
20100023789 - Host device with power-saving function: A card reader with power-saving function is used for being inserted with a memory card so that a computer can access the memory card through the card reader. When the memory card is inserted in the card reader, the card reader is enabled to operate. On the other hand, when... Agent: North America Intellectual Property Corporation
20100023790 - Cpu power management based on utilization with lowest performance mode at the mid-utilization range: A demand-based method and system of a processor power management is described. A processor is caused to enter a particular performance mode based on a first and a second utilization threshold. The particular performance mode includes at least a first performance mode, a second performance mode, and a third performance... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100023791 - Process for digital, bidirectional data transmission: The invention relates to a process for digital, bidirectional data transmission between a processing unit and a position encoder, as based on the transmission of frames of a predetermined bit length, such that each frame is provided with at least an initial bit length for the transmission of data from... Agent: The Nath Law Group
20100023792 - Signal synchronization method and signal synchronization circuit: There is provided a signal synchronization method of performing signal synchronization between a device which operates in synchronization with a first clock signal and a processor which operates in synchronization with a second clock signal with a different cycle from that of the first signal.... Agent: Townsend And Townsend And Crew, LLP
20100023793 - Apparatus and method for generating a delayed clock signal: An apparatus and method for generating a delayed clock signal is provided. The clock signal generator includes a synchronizing circuit for generating an output clock signal from an input clock signal and further includes a delay circuit having an input coupled to the output of the synchronizing circuit. The delay... Agent: Dorsey & Whitney LLP Intellectual Property Department
20100023794 - Apparatus and method of generating power-up signal of semiconductor memory apparatus: An apparatus for generating a power-up signal of a semiconductor memory apparatus includes a first power-up signal generator that generates a first power-up signal to be activated on the basis of a comparison between a power supply voltage level supplied to the semiconductor memory apparatus and a first set voltage... Agent: Venable LLP
20100023795 - Method for handling data: A method for handling data in which a serial data flow, with which a plurality of data is transmitted simultaneously per line, is transmitted using a serial protocol, which is formed from data blocks and synchronization blocks.... Agent: Kenyon & Kenyon LLP
20100023796 - Methods and devices for treating and processing data: A data processing unit having a field of clocked logic cells (PAEs) which is operable in different configuration states and a clock preselecting means for preselecting logic cell clocking. The clock preselecting means is designed in such a way that, depending on the state, a first clock is preselected at... Agent: Kenyon & Kenyon LLP01/21/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100017587 - Method and system for securing an option rom configuration: A method and system are disclosed to secure option read-only memory (ROM) configuration by calling a get user input function, determining if the user input is an option ROM configuration input sequence that allows a user to interact with an option ROM, performing one or more filtering checks on the... Agent: Hewlett-packard Company Intellectual Property Administration
20100017592 - Grid processing control apparatus: According to an aspect of the embodiment, a grid processing control apparatus includes a grid OS being an OS dedicated to grid computing, a general-purpose OS being an OS other than the grid OS, and an OS boot up unit selectively allowing the grid OS or the general-purpose OS to... Agent: Staas & Halsey LLP
20100017590 - Method and related computer system capable of executing programs for a computer system: A method capable of executing programs for a computer system operating in a shut down state includes generating a control instruction while a key of the computer system is pressed down; storing the control instruction; and performing actions according to the control instruction when the computer system is booted up.... Agent: North America Intellectual Property Corporation
20100017591 - Method for booting an operating system: A method for accelerating an operating system boot process is disclosed. In one exemplary embodiment, during a first operating system boot, information regarding the physical locations of disk access performed by the operating system to complete the boot are recorded and stored in a control data file. The control data... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20100017589 - Provision of remote system recovery services: In an illustrative embodiment, a computer implemented method for providing remote system recovery services is provided. The computer implemented method generates bootable system recovery images to form a set of bootable system recovery images, creates a list of authorized users from a set of subscribers, and receives a request for... Agent: Ibm Corp (ya) C/o Yee & Associates PC
20100017588 - System, method, and computer program product for providing an extended capability to a system: A system, method, and computer program product are included for providing an extended capability to a system. In operation, a request to boot a system is identified. Additionally, in response to the request, extended capability code is returned. Furthermore, the extended capability code is capable of being executed to provide... Agent: Zilka-kotab, PC
20100017593 - Identity-based-encryption system: A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator based at least partly on the name of an organization may be associated with a local key server... Agent: Treyz Law Group
20100017594 - Transmitting method and transmitting device, receiving method and receiving device, and transfer method and transfer system: Data broadcast data, which is broadcast in data broadcasts, is constructed by disposing, for example, EMD (Electric Music Distribution) links required to acquire song data as actual broadcast data, which is broadcast in actual broadcasts by a transmitting device, the actual broadcast data is transmitted, and the data broadcast data... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100017595 - Security in networks: Embodiments related to security in networks are described and depicted.... Agent: Infineon Technologies Ag Patent Department
20100017596 - System and method for managing authentication cookie encryption keys: There is provided a system and method for managing authentication cookie encryption keys. The system comprises a computing device including a memory with authentication data having a key identifier and encrypted data with a session identifier. The key identifier references a key having a validity period, the key capable of... Agent: Disney Enterprises C/o Farjami & Farjami LLP
20100017599 - Secure digital content management using mutating identifiers: Methods and system for managing manipulation of digital content stored in a content server. One method includes receiving a first mutating identifier at a content manipulation device. The first mutating identifier includes a first secret key. The method also includes generating a content request for digital content stored in the... Agent: Michael Best & Friedrich LLP
20100017598 - Secure e-mail messaging system: According to one embodiment, a secure e-mail messaging system includes an e-mail relay server coupled to a secure client configured on a secure domain and an external client configured on an external domain. The e-mail relay server has a memory for storage of an actual address of the secure client,... Agent: Baker Botts LLP
20100017597 - Secure network address provisioning: A network in which a client receives a network credential, such as a valid network address, following an exchange of messages with a credential server that includes security information. The security information may validate the credential, avoiding rogue devices inadvertently or maliciously distributing credential information that can interfere with clients... Agent: Wolf Greenfield (microsoft Corporation) C/o Wolf, Greenfield & Sacks, P.C.
20100017600 - Secure neighbor cache preload: The present invention relates to methods, apparatus, and systems for implementing a secure neighbor cache preload. The method includes initiating a data transfer request. The data transfer request is associated with a sequence of bytes. Further, receiving bytes associated with the data transfer request. Further, the method includes storing the... Agent: Townsend And Townsend And Crew LLP Viasat, Inc. (client #017018)
20100017602 - Ad-hoc trust establishment using visual verification: Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual representations generated can be visually compared by a user. This method can be used to verify that the correct... Agent: Lee & Hayes, PLLC
20100017610 - Authentication system: An authentication system determines if a counterfeit ineligible unit is installed in a main device. When connected with a battery pack, a notebook PC generates and combines a random number and a function determination signal using a signal combining unit and transmits same to the battery pack. A first function... Agent: Jordan And Hamburg LLP
20100017611 - Authentication system: An authentication system determines if a counterfeit ineligible unit is installed in a main device. When connected with a battery pack, a notebook PC generates and combines a random number and a function determination signal using a signal combining unit and transmits same to the battery pack. A first function... Agent: Jordan And Hamburg LLP
20100017608 - Distributed network management hierarchy in a multi-station communication network: The invention relates to a network and to a method of operating a network. The network comprises a plurality of stations each able to transmit and receive data so that the network can transmit data between stations via at least one selected intermediate station. The network further comprises a plurality... Agent: Michael P Pettit
20100017603 - Extensible authentication protocol authentication and key agreement (eap-aka) optimization: Systems and methods are described for improved authentication of subscribers wishing to connect to a wireless network using the EAP-AKA protocol. Embodiments exploit the requirement that the client store and transmit the Pseudonym and Fast Re-authentication Identities upon request. By using the Fast Re-authentication Identity to store session state key... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100017606 - Interoperable systems and methods for peer-to-peer service orchestration: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100017609 - Method and device for controlling and managing compressed and freely downloaded multimedia files: The invention also relates to a device for the controlled distribution and use of digital multimedia files separated into at least two parts with a view to implementing the method according to any one of claims 1 to 19, including at least one server for the preferred parameters and one... Agent: Harness, Dickey & Pierce, P.L.C
20100017601 - Method and server for providing a mobility key: A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which... Agent: Staas & Halsey LLP
20100017605 - Method of detecting an abnormal use of a security processor: m
20100017604 - Method, system and device for synchronizing between server and mobile device: An arrangement and corresponding method for authentication synchronizing cryptographic key information between a server and a client device, via data signals, where the client device at least comprises one client. The server is at least configured to generate and send to the client device a current encryption key and a... Agent: Osha Liang L.L.P.
20100017607 - Methods and systems to resolve message group: A method and system for resolving addresses of a message including looking up, from a source directory, a group name associated with a message address of the message, looking up through a cache of user names mapped to user addresses, a user address for each of the looked up user... Agent: Research In Motion Attn: Glenda Wolfe
20100017612 - Electronic apparatus and communication system: According to one embodiment, an electronic apparatus includes a display process unit and a data transmission process unit. The display process unit is configured to display connection confirmation information, which is known to a user and is transmitted from a device via a network during a connection establishing process for... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100017613 - Dual usage smart card of cpu and logical encryption and its data synchronization method: A dual usage smart card of CPU and logical encryption and its data synchronization method. Said method comprises that a CPU command processing module controls an accessing control module for the logical encryption storage region to read the data in the logical encryption storage region to a data format conversion... Agent: Knobbe Martens Olson & Bear LLP
20100017615 - Digital data authentication: A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another document... Agent: Harness, Dickey & Pierce, P.L.C
20100017614 - Encoding and detecting apparatus: An encoding data processing apparatus generates a video material item marked copy by embedding a payload data word into the video material item. The video material item includes plural video frames. A code word generator generates a water mark code word from the payload data word and reads data representing... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100017616 - Web based system that allows users to log into websites without entering username and password information: Systems and methods for securely managing Internet user passwords are presented herein. A formation component can enable a user to create a master account on a web server, the master account comprising a master username and password. An access component can enable the user to access a plurality of password... Agent: Turocy & Watson, LLP
20100017617 - Radio frequency identification (rfid) security apparatus having security function and method thereof: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received... Agent: Staas & Halsey LLP
20100017618 - Method and system for biometric authentication and encryption: A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100017619 - Systems and methods for secure and authentic electronic collaboration: The present disclosure relates to systems and methods for secure and authentic electronic collaboration between a plurality of users using a combination of biometric security, a separate and secure network infrastructure, management processes, encrypted electronic storage, and collaborative templates. In an exemplary embodiment, an online collaboration system includes a server... Agent: Clements Bernard PLLC
20100017620 - Software self-checking systems and methods: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100017623 - Executable software security system: A computer system which is configured to load executable programs. This configuration first accepts an operator defined key; withdraws an encrypted executable program from memory; and, using the operator defined key, decrypts the encrypted executable program into a functional executable program. It is this functional executable program which is used... Agent: Mark E. Ogram
20100017622 - High performance arithmetic logic unit (alu) for cryptographic applications with built-in countermeasures against side channel attacks: The present invention is a cryptoengine configured for providing countermeasures against attacks, including: an input/output (I/O) control unit, a memory, a controller, and an Arithmetic Logic Unit (ALU). The memory is communicatively coupled with the I/O control unit, receives inputs from the I/O control unit, and provides outputs to the... Agent: Lsi Corporation C/o Suiter Swantz PC Llo
20100017621 - Radio transceiver or other encryption device having secure tamper-detection module: An encryption device includes a system processor having a first key for encrypting information. The system processor periodically generates random data strings that are also encrypted using the first key. The encryption device also includes a first output for communicating the encrypted information to an external location and a tamper... Agent: Motorola, Inc. Law Department
20100017625 - Architecure, system, and method for operating on encrypted and/or hidden information: An architecture, system and method for operating on encrypted and/or hidden information (e.g., code and/or data). The invention enables creators, owners and/or distributors of proprietary code to keep such code inaccessible to users and user-controlled software programs. A memory architecture includes first and second protected memory spaces, respectively storing operating... Agent: Transmeta C/o Murabito, Hao & Barnes LLP
20100017624 - From polymorphic executable to polymorphic operating system: A method, capable of being implemented in executable instructions or programmes in device(s), including computer system(s) or computer-controlled device(s) or operating-system-controlled device(s) or system(s) that is/are capable of running executable code, providing for the creation in Device(s) of executable code, such as boot code, programmes, applications, device drivers, or a... Agent: Raymond Y. Chan
20100017627 - Ensuring authenticity in a closed content distribution system: A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is disclosed.... Agent: Perkins Coie LLP
20100017626 - Information processing apparatus, authentication method, and storage medium: According to one embodiment, a storage medium comprises an encrypted content, key management information which is updated whenever necessary and includes a media key block including encrypted media keys obtained by encrypting a media key which is a base of an authentication key used for mutual authentication with another apparatus... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100017631 - Detection algorithm for delivering inline power down four pairs of an ethernet cable to a single powered device: Methods and apparatus for determining that all conductors of an Ethernet connection are connected to the same powered device (PD). In one disclosed embodiment, it is first determined that a signal conductor pair of the Ethernet connection is coupled to a valid PD according to a discovery process, and the... Agent: Kraguljac & Kalnay
20100017629 - File sharing apparatus and file sharing system: There is provided a file sharing system which allows accessing a memory that stores failure information and using the failure information even in a case where a CPU is shut down. When a failure occurs on a substrate, a control circuit on the substrate detects the failure and stores the... Agent: Antonelli, Terry, Stout & Kraus, LLP
20100017630 - Power control system of a high density server and method thereof: A power control system of a server system is described. The power control system includes a plurality of server motherboards, a power supply and a micro controller. Each server motherboard comprises a BIOS, a power switch and a baseboard management controller (BMC), wherein each power switch is operable to selectively... Agent: Brian M. Mcinnis
20100017628 - Systems for using different power supply configurations with a common motherboard: In some embodiments, an information handling system may include a motherboard including a processor and memory coupled to the processor; one or more power supply units configured to provide power to the motherboard; and a connection system configured to deliver voltage from the one or more power supply units to... Agent: Baker Botts, LLP
20100017632 - Managing power-consumption: Managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices is provided. A receiver receives a policy comprising a power-management parameter, a first parameter and a rule associated with the policy. An analyser, responsive to receipt of a policy, analyzes second data... Agent: Ibm Corp. (wip) C/o Walder Intellectual Property Law, P.C.
20100017633 - Memory device, control device for memory device, and control method for memory device: According to one embodiment, a control device includes: a calculation module acquiring at least one of speed information, and calculating a process time taken to write data group when the acquired speed information is used, each of the speed information corresponding to different swing speed; a selection module selecting one... Agent: Greer, Burns & Crain
20100017634 - Dual-mode communication apparatus and power management method thereof: A dual-mode communication apparatus and a method thereof are provided. The dual-mode communication apparatus comprises a microprocessor, a first tick generator, a second tick generator, and an operation system tick module that comprises a tick converter and an OS tick generator. The microprocessor receives an OS clock tick to execute... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100017636 - Power supply system: In a power supply system having: a processor 1; a power supply controller 31 and a VR 35 to be a switching regulator for supplying power to the processor; a voltage command generator 11 and a clock command generator 16 for varying an operation voltage and a clock frequency of... Agent: Mattingly & Malur, P.C.
20100017635 - Zero indication forwarding for floating point unit power reduction: A method, system and computer program product for reducing power consumption when processing mathematical operations. Power may be reduced in processor hardware devices that receive one or more operands from an execution unit that executes instructions. A circuit detects when at least one operand of multiple operands is a zero... Agent: Dillon & Yudell LLP
20100017637 - Portable electronic terminal and method therefor: A portable electronic terminal capable of changing to an idle or sleep mode during which selective powering of portions of the electronics of the terminal takes place to save energy, the terminal comprising:—at least one memory storing, when in the idle or sleep mode, a program code of a background... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100017638 - System and method for reducing power requirements of microprocessors through dynamic allocation of datapath resources: There is provided a system and methods for segmenting datapath resources such as reorder buffers, physical registers, instruction queues and load-store queues, etc. in a microprocessor so that their size may be dynamically expanded and contracted. This is accomplished by allocating and deallocating individual resource units to each resource based... Agent: Mcdonnell Boehnen Hulbert & Berghoff LLP
20100017639 - Power management apparatus and methods: A power management apparatus including power supply circuit and control unit is disclosed. The power supply circuit receives input voltage having voltage value, and converts voltage value into a first converted signal having a first voltage value and a second converted signal having a second voltage value through first and... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100017640 - Efficient time-based memory counters: Some embodiments of efficient time-based memory counters have been presented. In one embodiment, a set of arrays of counters is arranged in layers to associate the set of arrays with a set of predefined time intervals. Furthermore, a set of pointers may be used to reference the set of arrays... Agent: Townsend And Townsend And Crew, LLP
20100017641 - Communication system communication device and method for determining duty ratio of pwm control: A communication system includes: a master; a plurality of slaves; and a bus for coupling among the master and the plurality of slaves in order to communicate asynchronously among the master and the plurality of slaves. The master supplies electricity to the bus in a power supply period. The master... Agent: Posz Law Group, PLC01/14/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100011197 - Enhanced uefi framework layer: A unified extensible firmware interface (UEFI) includes providing by a manufacturer, a basic input/output system (BIOS) personality module to initialize an information handling system (IHS) and receiving from an outside vendor, a BIOS initialization module to initialize the IHS. The UEFI also includes integrating operations of the personality module and... Agent: Haynes And Boone, LLPIPSection
20100011198 - Microprocessor with multiple operating modes dynamically configurable by a device driver based on currently running applications: A computing system includes a microprocessor that receives values for configuring operating modes thereof. A device driver monitors which software applications currently running on the microprocessor are in a predetermined list and responsively dynamically writes the values to the microprocessor to configure its operating modes. Examples of the operating modes... Agent: Huffman Law Group, P.C.
20100011201 - Computer system and control method thereof: A control method of a computer system, including setting whether to enable a connection with at least one peripheral device in an operating system of the computer system to transmit and receive data; and enabling or disabling the connection with the at least one peripheral device based on the setting... Agent: Stein Mcewen, LLP
20100011203 - Control protocol for image enumeration and transfer: A control protocol is used to deploy and install an operating system image on a client. The data structure of the control protocol includes an operation code corresponding to an operation associated with the deployment and installation of the operating system image on the client. When a server receives a... Agent: Merchant & Gould (microsoft)
20100011199 - Method and device of bootloader-to-go: A method comprising two steps is provided for a simplified on-site bootloading process. Step 1: having a computer or similar device preload initialization instructions and executable codes to an intermediate device. Step 2: having that said device transfer such initialization instructions and executable codes to the operating device. The intermediate... Agent: Huihui Duan
20100011200 - Method and system for defending security application in a user's computer: Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The security agent may be used for enforcing a security policy required by an organization or network to which the user's computer belongs. One aspect... Agent: Pearl Cohen Zedek Latzer, LLP
20100011204 - Method and system for image management in a computing system: A method and system for migrating data to a build-to-order computing system is provided. The method comprises storing an image at a remote site. The image comprises data stored on a computing system. An order is received to provide a second computing system to a customer. Access to the image... Agent: Baker Botts, LLP
20100011202 - Multi-stage boot pin sampling: In accordance with embodiments, a method for configuring an electronic device during a power-on sequence includes sampling a boot pin state multiple times. The method also includes storing a value corresponding to each sampled boot pin state, wherein the stored values comprise one of four different states for a single... Agent: Texas Instruments Incorporated
20100011205 - Secure data exchange technique: Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which... Agent: Townsend And Townsend And Crew, LLP
20100011206 - Embedded apparatus, remote-processing method, and computer program product: A processing unit performs a predetermined process by a remote operation from a client device. A monitoring unit monitors a first port for an unencrypted communication with the processing unit and a second port for an encrypted communication with the processing unit, denies a connection request via the first port,... Agent: Cooper & Dunham, LLP
20100011207 - Service oriented architecture device: A system for Service Oriented Architecture (SOA) communication includes a plurality of SOA nodes having a standardized hardware configuration, wherein the standardized hardware configuration includes an operating engine, an encryption module accessed by the operating engine, which provides security for message traffic, a compression module to compress and decompress the... Agent: Lee & Hayes, PLLC
20100011208 - Cryptographic control and maintenance of organizational structure and functions: Methods, systems and devices for cryptographic control and maintenance of organizational structure and functions are provided. A method for control and maintenance of an operational organizational structure, the method includes associating entities with cryptographic capabilities; organizing entities within the organizational structure as roles; and maintaining roles within the organizational structure.... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20100011209 - Secure execution of a computer program: Hijacking of an application is prevented by securing execution of a computer program on a computing system. Prior to execution of the computer program, the computer program is analyzed to identify permitted targets of all indirect transfers. An application-specific policy based on the permitted targets is created. When the program... Agent: Vmware, Inc.
20100011210 - Method and apparatus for remotely provisioning software-based security coprocessors: A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system.... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100011211 - Radio frequency identification (rfid) based authentication system and methodology: Disclosed are embodiments of a radio frequency identification (RFID) authentication system and an associated authentication methodology. The embodiments incorporate an identification device (e.g., an identification badge, a key fob, etc.) with an embedded RFID tag. The embedded RFID tag is associated with a specific user and stores a private key... Agent: Frederick W. Gibb, Iii Gibb Intellectual Property Law Firm, LLC
20100011213 - Information processing device, computer program, and information processing system: An information processing device includes: a receiving unit that receives a first random number from another information processing device; a generating unit that generates a second random number; a time-variant-key generating unit that generates a time variant key for encryption according to the second random number; an encrypting unit that... Agent: K&l Gates LLP
20100011212 - Radio frequency identification (rfid) based authentication methodology using standard and private frequency rfid tags: Disclosed is a self-contained hardware-based authentication system that incorporates different authentication protocols for access to soft and/or hard assets with different security levels. The system embodiments include the use of a RFID device that comprises dual RFID tags operating under different frequencies. Specifically, one RFID tag operates on a public... Agent: Frederick W. Gibb, Iii Gibb Intellectual Property Law Firm, LLC
20100011214 - Method and apparatus for secure trusted time techniques: A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source... Agent: Volpe And Koenig, P.C. Dept. Icc
20100011216 - Method of providing secure tamper-proof acquired data from process instruments: Field devices used to measure process parameters can also function as a data historian by storing process data and associated time stamps. In response to a request for stored process data, the field device uses a cipher and a secret method to generate an encrypted validation string that is provided... Agent: Kinney & Lange, P.A.
20100011215 - Securing dynamic authorization messages: To fortify trust in a roaming environment, a token is introduced in transactions between an authoritative entity (e.g., a Home AAA in RADIUS) and a service providing entity (e.g., a NAS in RADIUS). A Token-Information is sent from the authoritative entity to the service providing entity during the initial authentication.... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100011218 - System and method for secure authentication of a \"smart\" battery by a host: Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within... Agent: Texas Instruments Incorporated
20100011217 - Watermark signal generating apparatus: An apparatus 10 for generating watermark signals to be embedded as a digital watermark in real-time contents includes: input means 12 for inputting the real-time contents; an input buffer 14 for storing the real-time contents; generation means for generating watermark signals corresponding to predicted intensities of the real-time contents from... Agent: Ibm - Yor Shimokaji & Associates, P.C.
20100011220 - Authentication and key agreement method, authentication method, system and device: An AKA method, and authentication method and related devices are disclosed so that a user card not supporting storing of a SQN can resist replay attacks during an AKA procedure. In an AKA method, a second device generates a fourth sequence number for a user according to system time of... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100011219 - Secure use of user secrets on a computing platform: A computing platform (20) is adapted for secure use of trusted user input. The computing platform (20) comprises a user input device (14), a first isolated operating environment (21) for execution of applications requiring use of trusted user input, a second isolated operating environment (23) adapted for secure processing of... Agent: Hewlett-packard Company Intellectual Property Administration
20100011221 - Secured storage device with two-stage symmetric-key algorithm: A secured storage device uses a user key set by user to encrypt a primary key that is for encryption or decryption of user data, to produce a first encrypted data. In the secured storage device, neither the primary key nor the user key is stored, but the first encrypted... Agent: Rosenberg, Klein & Lee
20100011222 - Interfacing with a system that includes a passcode authenticator: Protecting the security of an entity by using passcodes is disclosed. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a... Agent: David Lewis
20100011223 - Method for making smart cards capable of operating with and without contact: The invention concerns a method for making smart cards capable of operating with or without contact called mixed cards and contactless smart cards. In order to avoid the risk of deteriorating the antenna the method consists in producing an antenna comprising at least two turns, on a support sheet, said... Agent: Buchanan, Ingersoll & Rooney PC
20100011226 - Data management method, data management system, and data storage system: Encrypted data and an encryption key used for the encrypted data are separately stored and managed. A first storage device stores an encrypted data block, predetermined information and first management information. The predetermined information includes key data for decrypting the encrypted data block and includes a requirement for using the... Agent: Mattingly & Malur, P.C.
20100011225 - Information terminal, security device, data protection method, and data protection program: An information terminal that decrypts sealed data without returning program data after update to the state before update. The information terminal includes update certificate storage unit 102 storing an update certificate for certifying update of the program data to be executed by CPU 101, and a selection unit 103 which,... Agent: Wenderoth, Lind & Ponack L.L.P.
20100011224 - System and method for producing and checking validation certificates: A system, method, and computer program product for computing a digest value of a document, one or more schemas, and a validation report. The validation report indicates a validation status of the document based on the schema or schemas. The digest value is encrypted to produce a digital signature of... Agent: Fay Sharpe / Xerox - Rochester
20100011229 - Methods of powering up a disk drive storage enclosure and storage enclosures: A method of powering up a disk drive storage enclosure is disclosed, the storage enclosure having at least one power supply and at least one module having a keyed readable interface corresponding to its power rating. The method includes: receiving a power-on signal; determining the power supplying capability of the... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20100011228 - Power supply: A power supply allows an electronic product to access the Internet, characterized in that a casing of the power supply is provided with a network connection port, the casing of the power supply is provided therein with a power line communication module, the power line communication module is coupled to... Agent: Rosenberg, Klein & Lee
20100011227 - System and method for measurement-based power and energy accounting for virtual machines: A method for measurement-based power and energy accounting for virtual machines distributed among at least one hosting device is disclosed. The method comprising determining an energy for the hosting device during a first time interval and a second time interval, partitioning a difference in the determined energy among virtual machines... Agent: Ibm - Spp Shimokaji & Associates, P.C.
20100011231 - Access point rotation for sharing power load: Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first... Agent: Oliff & Berridge, PLC
20100011232 - Digital component power savings in a host device and method: A control arrangement, for example, in a digital component that forms part of a system, draws an input current for its operation and is configured for monitoring an interface for any one of a group of commands and, upon detecting an issued one of the group of commands, operates the... Agent: Workman Nydegger 1000 Eagle Gate Tower
20100011230 - Link aggregation with dynamic bandwidth management to reduce power consumption: Embodiments of the present invention provide configurations and techniques for determining, by link aggregation logic, whether a load of network traffic communicated across a team of aggregated links allows inactivation of one or more aggregated links of the team, wherein the team of aggregated links is coupled with a plurality... Agent: Schwabe, Williamson & Wyatt, P.C.
20100011233 - Adaptive power control: A method for controlling the power used by a computer including the steps of measuring the operating characteristics of a central processor of the computer, determining when the operating characteristics of the central processor are significantly different than required by the operations being conducted, and changing the operating characteristics of... Agent: Transmeta C/o Murabito, Hao & Barnes LLP
20100011234 - Apparatus, system, and method for reducing idle power in a power supply: An apparatus, system, and method is provided for reducing idle power in a power supply. The apparatus includes a connection module to determine whether a load is connected to the output terminal of the power supply. Also included is an idle module that turns off the power supply for an... Agent: Ibm - Aus Shimokaji & Associates, P.C.
20100011235 - Method and apparatus for power management: An electronic device includes a processor configured to run a plurality of applications, a power supply coupled to the processor, and a database coupled to the processor The database is configured to store information identifying each of the plurality of applications as being in either a first set of applications... Agent: Foley & Lardner LLP
20100011236 - Method and system for enhancing computer peripheral safety: A method and system for enhancing computer peripheral safety is provided. In accordance with various aspects of the present invention, the exemplary method and system are configured to monitor and/or isolate alternating current (A.C.) supplies with and/or from any peripheral subsystems or devices. An exemplary method and system comprises an... Agent: Snell & Wilmer L.L.P. (main)
20100011237 - Controlling real time during embedded system development: Disclosed herein are representative embodiments of methods, systems, and apparatus that can used to control real-time events (e.g., the real-time clock) during the design, simulation, or verification of an embedded system. In one exemplary embodiment disclosed herein, for example, a real-time clock signal is generated and tasks defined by an... Agent: Klarquist Sparkman, LLP01/07/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100005280 - Virtualized service tool and virtualized control tool: A computer-readable medium is disclosed. The computer-readable medium stores a virtualized service tool application program for running on a computer running an existing operating system platform. The virtualized service tool application program has operating system software configured to execute as an internal operating system platform separate from the existing operating... Agent: Caterpillar/finnegan, Henderson, L.L.P.
20100005283 - Computer system and control method of the same: A computer system includes a device which transmits data through a predetermined interface and outputs first recognition information in response to a predetermined power on self test (POST) control signal, a device controller which has second recognition information about whether the device is mounted, and a system controller which outputs... Agent: Stanzione & Kim, LLP
20100005285 - Computer system and method of booting the same: Provided are a computer system and a method of booting the same. The computer system includes: a first storage unit for storing a booting-related program including an operating system program and data, the stored program and data being retained even when a power voltage is not supplied; and a second... Agent: Cantor Colburn, LLP
20100005284 - Device having shared memory and method for transferring code data: The present invention relates to a device having a shared memory and a code data transmitting method. According to an embodiment of the present invention, the digital processing device can include n processors, n being a natural number of 2 or greater; and a shared memory, coupled to each of... Agent: Birch Stewart Kolasch & Birch
20100005282 - Method and apparatus for booting from a flash memory: Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20100005286 - Method for booting computer system: A method for booting a computer system is provided. In the method for booting the computer system, a memory space is created using a BIOS to simulate a virtual disk. The virtual disk is used to execute operations which have to be executed via a floppy disk drive. The operations... Agent: Jianq Chyun Intellectual Property Office
20100005281 - Power-on initialization and test for a cascade interconnect memory system: A memory buffer, memory system and method for power-on initialization and test for a cascade interconnect memory system. The memory buffer includes a bus interface to links in a high-speed channel for communicating with a memory controller via a direct connection or via a cascade interconnection through an other memory... Agent: Cantor Colburn LLP-ibm Poughkeepsie
20100005287 - Data security for digital data storage: A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data encryption may utilize a key which is derived at least in part from an identification code stored... Agent: Knobbe Martens Olson & Bear LLP
20100005288 - Systems and methods for adjusting the maximum transmission unit by an intermediary device: The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present invention provides a method for establishing a direct connection between peer computing devices via a third computing device, such as a... Agent: Choate, Hall & Stewart / Citrix Systems, Inc.
20100005290 - Method of identity protection, corresponding devices and computer softwares: A method is provided for authenticating a client terminal with an authentication server. The client terminal holds an authentication certificate. The method includes the following phases: obtaining at least once encryption parameter by the client terminal; encrypting the authentication certificate by the client terminal, based on the at least one... Agent: Westman Champlin & Kelly, P.A.
20100005289 - Methods and apparatus for protecting digital content: A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to generate cipher data, based at least in part on (a) a session key and (b) at least one... Agent: Intel Corporation C/o Cpa Global
20100005291 - Application reputation service: One embodiment of the claimed subject matter is implemented as a method to determine the reputation of an element (e.g., an application). When a user attempts to install or execute a new application, the Application Reputation Service is queried by the user's machine with a set of identities for the... Agent: Microsoft Corporation
20100005292 - Method and apparatus for efficient certificate revocation: Revocation of digital certificates in a public-key infrastructure is disclosed, particularly in the case when a certificate might need to be revoked prior to its expirations. For example, if an employee was terminated or switched roles, his current certificate should no longer be valid. Accordingly, novel methods, components and systems... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100005293 - Systems and methods for accessing secure and certified electronic messages: The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email infrastructure, email management processes, and the addition of text, audio and visual format options to sending emails messages.... Agent: Clements Bernard PLLC
20100005294 - Security in wireless environments using out-of-band channel communication: A methodology of using an (preferably uni-directional) out-of-band channel for secure information transmission between two devices capable for LPRF communication is provided. Information, which is intended for secure transmission from one of the devices to the other device, is encoded into a time dependent visual sequence. The visual sequence may... Agent: Hollingsworth & Funk
20100005295 - System and method for providing unique encryption key: A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the VoIP adapter, configured to decrypt the configuration file using a default key stored in the VoIP adapter, update one... Agent: Verizon Patent Management Group
20100005296 - Systems and methods for controlling access to encrypted data stored on a mobile device: Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote from the mobile device. The access control system can control access... Agent: Peters Verny , L.L.P.
20100005297 - Mashssl: a novel multi party authentication and key exchange mechanism based on ssl: The present invention provides a method that allows three parties to mutually authenticate each other and share an encrypted channel. The invention is based on a novel twist to the widely used two party transport level SSL protocol. One party, typically a user at a browser, acts as a man... Agent: Sughrue Mion, PLLC
20100005299 - Method for manufacturing a product, system for manufacturing a product, and product: Provided is a product on which is imprinted an encrypted message obtained by encrypting a message sent along with the product from a sender to a recipient, a method for manufacturing the product, and a system for manufacturing the product. The product manufacturing system has a general web server, an... Agent: Jianq Chyun Intellectual Property Office
20100005300 - Method in a peer for authenticating the peer to an authenticator, corresponding device, and computer program product therefore: The invention concerns a method in a peer (201) for authenticating the peer (201) to an authenticator (220), wherein the method comprises the steps of establishing (101) a network link to the authenticator (220), receiving (102) a challenge message from the authenticator (220) over the network link, the challenge message... Agent: Fay Sharpe/lucent
20100005298 - Resource scheduling in workflow management systems: A system for improved scheduling of resources within a Workflow-Management-System or a computer system with comparable functionality (WFMS). Based on a new resource specification comprised within a process model and associated with an activity, the WFMS determines the resources required for execution of said activity. The invention further schedules a... Agent: Carey, Rodriguez, Greenberg & Paul, LLP Steven M. Greenberg
20100005301 - Authentication and encryption utlizing command identifiers: A data processing system, recording device, data processing method and program providing medium are provided to execute authentication processing and content storing processing between apparatuses. Program localization is employed to restrict access to program content. A plurality of key blocks store key data for authentication processing. Key block designation information... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100005302 - Techniques for validating and sharing secrets: Techniques for validating and sharing secrets are presented. A secret is divided into a plurality of parts. Each part is represented by a unique value. Each value is distributed to a unique user that shares in the secret. The secret is recreated when each user presents each user's unique value.... Agent: Schwegman, Lundberg & Woessner/novell
20100005303 - Universal authentication method: The object of the current invention is to provide the user with an authentication method that is more secure than conventional authentication methods and can be used on personal computers, PDAs, cell phones, personal digital media devices, home and car lock and security systems, television/VCR/DVD remote controls, credit card authentication... Agent: Karr Tuttle Campbell Attn: Priya Sinha Cloutier
20100005304 - Security and ticketing system control and management: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit... Agent: Shimokaji & Associates, P.C.
20100005305 - Apparatuses, and methods for inserting user data into digital multimedia signals: Apparatuses, and methods for inserting user data into digital multimedia signals are provided in which user data is inserted into the digital multimedia signals in a substantially imperceptible fashion. In one embodiment of the invention, digital watermarking techniques are used to embed user data into the digital multimedia signal, such... Agent: Amitabh Dixit
20100005311 - Electronic-data authentication method, elctronic-data authentication program, and electronic-data, authentication system: An electronic-data authentication method is for authenticating electronic data provided by a virtual person anonymously used on a network, performed by a virtual-person management system including a user terminal, a user management device, and a virtual-person management device. The method includes receiving, by the virtual-person management device, the electronic data,... Agent: Staas & Halsey LLP
20100005310 - Method and apparatus for authenication of data streams with adaptively controlled losses: Methods, components, and systems for efficient authentication, either through a digital signature or message authentication codes, and verification of a digital stream sent from a source to a receiver via zero or more intermediaries, such that the source or intermediary (or both) can remove certain portions of the data stream... Agent: Haynes And Boone, LLPIPSection
20100005309 - Method and apparatus for authentication of data streams with adaptively controlled losses: Methods, components, and systems for efficient authentication, either through a digital signature or message authentication codes, and verification of a digital stream sent from a source to a receiver via zero or more intermediaries, such that the source or intermediary (or both) can remove certain portions of the data stream... Agent: Haynes And Boone, LLPIPSection
20100005308 - Optimization methods for the insertion, protection, and detection of digital watermarks in digital data: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in... Agent: Scott A. Moskowitz
20100005307 - Secure approach to send data from one system to another: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a... Agent: Schmeiser, Olsen & Watts
20100005306 - Storage media storing electronic document management program, electronic document management apparatus, and method to manage electronic document: An electronic document management apparatus acquires an electronic document comprised of a plurality of components for each of which a first digital signature and a second digital signature are uniquely specified. The electronic document is linked to an aggregate digital signature which aggregates the first digital signatures. After that the... Agent: Greer, Burns & Crain
20100005312 - Mutually excluded security managers: Techniques for controlling access to at least one resource are provided. At least one shared key and at least one private key unique to one or more resource sets are generated. Each of the one or more resource sets identify the at least one resource. The at least one shared... Agent: Ryan, Mason & Lewis, LLP
20100005313 - Portable telecommunications apparatus: Portable telecommunications apparatus having one or more functionalities including providing user access to a telecommunications network, the portable telecommunications apparatus comprising integrated circuit card (ICC) reader circuitry, storage circuitry and processing circuitry, wherein the ICC reader circuitry is configured to communicate with one or more network-access ICCs; the storage circuitry... Agent: Foley & Lardner LLP
20100005314 - In-circuit security system and methods for controlling access to and use of sensitive data: The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as... Agent: Cooley Godward Kronish LLP Attn: Patent Group
20100005315 - Methods for secure enrollment and backup of personal identity credentials into electronic devices: A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a... Agent: Kimberly A. Chasteen
20100005316 - Branch trace methodology: Method, system, and computer program product embodiments for performing a branch trace operation on a computer system of an end user are provided. An encrypted mapping macro is provided to the end user to be made operational on the computer system. A trace program is provided to the end user.... Agent: Griffiths & Seaton PLLC (ibm)
20100005319 - Hardware protection for encrypted strings and protection of security parameters: In one embodiment, a disk drive is provided that is adapted for security authentication. The disk drive includes: a non-volatile memory storing object code; a processor for retrieving the stored object code; a decryption engine for decrypting a retrieved shared secret from the object code; and a first memory for... Agent: Haynes And Boone, LLPIPSection
20100005318 - Process for securing data in a storage unit: The invention is a process for securing data in a storage unit using public and private key encryption and symmetrical encryption techniques by a owner of the data for use by multiple users. The process including the steps of: 1) encrypting the data; 2) attaching encrypted meta data to the... Agent: Louis L. Dachs
20100005317 - Securing temporary data stored in non-volatile memory using volatile memory: Temporary digital data received for storage in non-volatile memory are encoded using a key stored in volatile memory. The encoded digital data are then stored in the non-volatile memory. As long as there has been no interruption of supply of power to the volatile memory, the key is available enabling... Agent: Freedman & Associates
20100005322 - High speed isolation interface for poe: A high speed isolation interface which can be used to enable high speed communications between the isolated side and the wire side in a PoE system is provided. The high speed isolation interface may implement an Ethernet or non-Ethernet based signaling scheme. The high speed isolation interface can be used... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100005320 - Protected midspan power sourcing equipment for power over ethernet applications: A protected midspan power sourcing equipment for a local area network communications system includes a network connection subsystem that is connectable to at least one first network cable having a plurality of electrical wires, and a powered equipment connection subsystem that is connectable to at least one second network cable... Agent: Bodner & O'rourke, LLP
20100005323 - Semiconductor integrated circuit: The semiconductor integrated circuit with processors incorporated therein is provided with a management unit, combining first control for changing a value of the voltage and a frequency of the clock signal based on control information contained in the program, and second control for changing the voltage value and clock signal... Agent: Miles & Stockbridge PC
20100005324 - Substrate bias switching unit for a low power processor: The feature of the present invention consists in: a processor main circuit for executing program instruction strings on a processor chip; a substrate bias switching unit for switching voltages of substrate biases applied to a substrate of the processor main circuit; and an operation mode control unit for controlling, in... Agent: Mattingly & Malur, P.C.
20100005321 - Wireless communication terminal and control method thereof: In a wireless communication terminal 103 that is supplied with power through an external device connection terminal to be power-supplied from a PC (electronic apparatus) 101 and performs a processing according to a schedule, a power supply state of the PC and a power consumption state in the wireless communication... Agent: Hogan & Hartson L.L.P.
20100005325 - Energy saving information appliance network and energy saving control method: The present invention relates to an energy saving information appliance network and an energy saving control method. The energy saving information appliance network comprises a household network host and an intelligent information appliance. The household network host is provided with a signal interface module. The intelligent information appliance is provided... Agent: Fulbright & Jaworski L.l.p
20100005326 - Profiling an application for power consumption during execution on a compute node: Methods, apparatus, and products are disclosed for profiling an application for power consumption during execution on a compute node that include: receiving an application for execution on a compute node; identifying a hardware power consumption profile for the compute node, the hardware power consumption profile specifying power consumption for compute... Agent: Ibm (roc-blf)
20100005327 - Usb host controller, information processor, control method of usb host controller, and storage medium: A USB host controller includes: a suspend signal generating unit configured to generate a suspend signal for stopping the operation of a PLL circuit and output the signal to a physical layer including the PLL circuit if there is no communication between a USB device and a CPU in a... Agent: Turocy & Watson, LLP
20100005328 - Integrated circuit with modular dynamic power optimization architecture: A system and method for regulating power consumption within an integrated circuit (IC) with a modular design. The IC is designed so that any one distinct functional module within the IC utilizes only transistors with a substantially same or similar critical voltage level, which may for example be the threshold... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100005329 - Storage system: There is provided a storage system including a file server connecting to a computer over a network and a storage apparatus connecting to the file server connecting over the network, wherein the file server includes a first controller, the storage apparatus includes multiple storage devices having multiple storage areas and... Agent: Antonelli, Terry, Stout & Kraus, LLP
20100005331 - Automatic discovery of physical connectivity between power outlets and it equipment: The invention relates generally to the field of power management in data centers and more specifically to the automatic discovery and association of connectivity relationships between power outlets and IT equipment, and to methods of operating data centers having automatic connectivity discovery capabilities.... Agent: Gibbons P.C.
20100005330 - Static and dynamic power management for a memory subsystem: In one embodiment, an information handling system may include a processor, a power supply coupled to the processor, a memory device communicatively coupled to the processor, where the memory device may include (1) a plurality of memory modules, and (2) a memory extender configured to extend a communication bandwidth of... Agent: Baker Botts, LLP
20100005332 - Method and system for distributing a global timebase within a system-on-chip having multiple clock domains: A global timebase system and method for a system-on-chip synchronizes multiple clock domains in each of a plurality of receiver modules by broadcasting a global timebase count value as Gray code over a global timebase bus. A global timebase generator includes a binary counter and a binary-to-Gray-code converter. Each receiver... Agent: Schneck & Schneck
20100005334 - Method for ensuring synchronous presentation of additional data with audio data: A recording medium, method and apparatus for managing data are discussed. According to an embodiment, the present invention provides a method of reproducing main data and additional data. The method includes receiving the additional data associated with the main data, the additional data being divided into a plurality of segment... Agent: Fish & Richardson P.C.
20100005333 - Microtca carrier, clock card and method for providing a clock: A MicroTCA system is disclosed that includes an MCH, a clock card connected with the MCH, and multiple AMCs. The clock card includes a clock selecting unit, configured to select and output a clock source and a phase-lock unit, configured to generate a system synchronization clock according to the clock... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.89578 seconds