|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
07/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: support July category listing 07/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 07/29/2010 > patent applications in patent subcategories. category listing
20100191944 - Data storage apparatus: According to one embodiment, a data storage apparatus includes: a storage element including a user data storage area and an area for storing multiplexed pre-boot authentication applications; and a controller connected to a host and performs read/write access to the user data area when an authentication by the pre-boot authentication... Agent: Knobbe Martens Olson & Bear LLP
20100191946 - Apparatus, system, and method for improving user boot via a storage area network: An apparatus, system, and method are disclosed for remotely booting a client from a storage area network (“SAN”). A connection module enables a client, such as a diskless client, to connect to two or more storage area networks (“SANs”), the SANs belonging to a group of redundant SANs, each SAN... Agent: Kunzler Needham Massey & Thorpe
20100191948 - Boot control method of computer system: A computer system comprises two or more computers including at least one standby computer and a management computer which controls the computers. The management computer manages unique identification information which is assigned to an Ethernet controller of each computer. When a failure has occurred to an active computer, the management... Agent: Mattingly & Malur, P.C.
20100191949 - Information processing terminal and falsification verification method: An information processing terminal that performs falsification verification at the time of bootstrapping thereof includes: a state sensor that senses a connection of an external connector or a data reception via the external connector, to judge whether or not a program stored in the information processing terminal is in a... Agent: Christensen O'connor Johnson Kindness PLLC
20100191947 - Mobile terminal and method for controlling accessing of device thereof: A mobile terminal and its device accessing control method are disclosed. When power is applied to the terminal, the terminal executes BIOS information. When certain identification information (ID) is received, whether or not the received identification information is registered one. If the inputted identification information is a registered one, a... Agent: Ked & Associates, LLP
20100191945 - Portable device with user interface: A portable device (12) comprising a connector (14) for connecting the portable device (12) to a host (18); a central processing unit (22) for controlling the operation of the portable device (12); at least one non-volatile memory module (24); a user interface (16) for input of user commands to the... Agent: Sonnenschein Nath & Rosenthal LLP
20100191951 - Provisioned firmware updates using object identifiers: Methods, devices, and systems are provided for remotely updating provisioning data in devices or a population of devices. An update message is generated that includes an Object Identifier (OID) that uniquely identifies eligible devices or components for the provisioning data update. If an eligible device receives the update message, then... Agent: Sheridan Ross P.C.
20100191950 - System and method for processing booting failure of system: A method for processing booting failure of a computer system is adapted for being performed at a computer. The method includes the following steps. First, a parameter selecting signal is generated according to a triggering signal by a control module. Second, a driving parameter is chosen from a look-up table... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100191953 - Electronic apparatus, information output method and program: An electronic apparatus (10) has a plurality of functions. A key code recognizing unit (13) recognizes an input of a key code for requesting setting of a parameter about a setting particular related to each function. A storage unit (17) stores handling information (172) for handling setting restriction, for each... Agent: Mr. Jackson Chen
20100191952 - Risk mitigation for computer system change requests: Implementation of change requests involves risk for computer systems. Methods of mitigating such risk, and apparatus to perform the methods, include comparing levels of risk of risk factors of a change request to corresponding risk factors of one or more prior change requests, and suggesting alternative factor values to lower... Agent: Hewlett-packard Company Intellectual Property Administration
20100191954 - Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message: Provided are a method and apparatus for transmitting a message in a heterogeneous federated environment, and a method and apparatus for providing a service according to the message. In the method of transmitting a message to an external domain in the heterogeneous federated environment, a service server of a domain... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100191955 - System and method for distributing digital content: A method for distributing digital content is disclosed. The method includes receiving, at an operator of a wireless communications network, a request for digital content from a first mobile device. The method further includes determining, at the operator, that a second mobile device has the digital content. The method further... Agent: Toler Law Group
20100191956 - Method and apparatus of communicating security/encryption information to a physical layer transceiver: An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog circuitry configured to interface with a data transmission medium, digital circuitry configured to interface with a Media Access Controller (MAC); and a crypto engine coupled to the... Agent: Weaver Austin Villeneuve & Sampson LLP
20100191957 - Authentication/authorization protocol for media processing components: A computer-implemented authentication protocol is used to subvert man-in-the-middle-type attacks on communications between software components that are permitted to interoperate within a processing environment, such as a media processing environment, pursuant to one or more licenses. In one exemplary scenario, a particular application transmits to a particular media processing component... Agent: Microsoft Corporation
20100191958 - Method and network device for processing nested internet protocol security tunnels: A method and network device for processing nested IPSec tunnels are for processing outbound packets flowing into QC and inbound packets flowing out an IPSec tunnel via the network device. The network device (3) includes a network interface unit (31), a Security Association database (32), and an IPSec processing unit... Agent: Greenblum & Bernstein, P.L.C
20100191959 - Secure microprocessor and method: A method and reconfigurable computer architecture protect binary opcode, or other data and instructions by providing an encryption capability integrated into an instruction issue unit of a protected processor. Opcodes are encrypted at their source, and encrypted opcodes from authorized users are then delivered to a CPU and decrypted “inside”... Agent: Continuum Law
20100191960 - Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method: A two-factor network authentication system uses “something you know” in the form of a password/Pin and “something you have” in the form of a key token. The password is encrypted in a secure area of the USB device and is protected from brute force attacks. The key token includes authentication... Agent: Blynn L. Shideler The Blk Law Group
20100191961 - Method and system achieving individualized protected space in an operating system: Aspects for achieving individualized protected space in an operating system are provided. The aspects include performing on demand hardware instantiation via an ACE (an adaptive computing engine), and utilizing the hardware for monitoring predetermined software programming to protect an operating system.... Agent: Nixon Peabody LLP
20100191962 - File system filter authentication: A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter... Agent: Toler Law Group
20100191964 - Communications methods and apparatus for use in communicating with communications peers: Methods and apparatus related to the determination of the trustworthiness of information communicated in a message and/or the exchange of trust information are described. Various described methods and apparatus are well suited to peer to peer wireless communications in an ad-hoc network. At a given time, a communications device may... Agent: Qualcomm Incorporated
20100191966 - Method for checking the integrity of data, system and mobile terminal: According to a method in the transmitting end an authentication value is generated from a message to be sent and the random string. A check code is formed from the authentication value and the random sting. The first message is transferred from a sender to a recipient through a first... Agent: Ware Fressola Van Der Sluys & Adolphson, LLP
20100191963 - Method for transmission of dhcp messages: The invention describes a method for transmission of a DHCP message between a telecommunication network, especially a telecommunication network according to the WiMAX-standard, and an Internet Protocol (IP) subscriber (SS/MS; MN) to the telecommunication network. Therein, an information secured with an encryption key is added to the DHCP message. The... Agent: Squire, Sanders & Dempsey L.L.P.
20100191965 - Verification of system information in wireless communication system: The present invention relates to a method for communicating between a network and a mobile terminal. The method comprises possessing at least one configuration parameter, and transmitting a message to the network, wherein the message includes information for verifying the authenticity of the at least one configuration parameter to the... Agent: Lee, Hong, Degerman, Kang & Waimey
20100191967 - Client apparatus, server apparatus, and program: A client apparatus receives a message including a random number from a server apparatus during the handshake of agreement process, creates a biometric negotiation message including the biometric authentication method information and sends the biometric negotiation message to the server apparatus. Then, the client apparatus executes a biometric authentication based... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100191968 - Authentication for a multi-tier wireless home mesh network: An apparatus and method for a multi-tier wireless home mesh network is described. The method may include authentication of a node within a wireless home networking environment after discovering a wireless home mesh network. The authentication comprises (1) transmitting a first message, the first message including (i) an encrypted pass-phrase... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100191969 - Digital rights management with persistently-unencrypted content: A digital rights management license provides access to a decryption key that can be used to decrypt an encrypted digital content item. The digital rights management license also includes a policy that defines circumstances in which the decryption key is allowed to decrypt encrypted content data for the purpose of... Agent: Microsoft Corporation
20100191970 - Generating protected access credentials: A computer-implemented process comprises receiving, at a first computer, a base cryptographic seed through a secure connection to a second computer; generating one or more protected access credential parameters; combining said base cryptographic seed with at least a portion of said generated protected access credential parameters using a hashed message... Agent: Hickman Palermo Truong & Becker, LLP
20100191971 - Methods and apparatus for layer 2 and layer 3 security between wireless termination points: A method is provided for both layer 2 (L2) and layer 3 (L3) security in the context, for example, of a WISP-e protocol. An AES algorithm in CBC mode is used for encryption and decryption of the control frames. The session keys (e.g., 128-bit session keys) are derived from a... Agent: Ingrassia Fisher & Lorenz, P.C. (symbol)
20100191972 - Method and apparatus for providing secure document distribution: A system for providing secure document distribution is disclosed. The system includes an application configured to: allow an author to create a document, allow the author to secure the document using an access code, wherein the access code is needed to gain access to the document, encrypt the access code,... Agent: Pillsbury Winthrop Shaw Pittman LLP
20100191977 - Data certification method and apparatus: Apparatus for certifying electronic data supplied by a user receives data to be signed, supplied by the user from a source device, at a certifying apparatus including at least a signature server providing a signing function. An encrypted password is received at that server from the source device via a... Agent: Cesari And Mckenna, LLP
20100191976 - Method for installing rights object for content in memory card: A method, device and system for stably issuing a rights object (RO) to a memory, namely, an SRM, via a terminal. When RO has been issued to the memory card, namely, to the SRM, by using the stable procedure, the RO can be compatible with a different terminal that does... Agent: Birch Stewart Kolasch & Birch
20100191975 - Privacy-preserving communication: Anonymous information sharing systems and methods enable communication of information to parties in a privacy-preserving manner such that no one other than the designated parties can know the source, recipient, and content of the information. Furthermore, the communication can be accomplished without requiring trial decryption, and protection can be provided... Agent: Lee & Hayes, PLLC
20100191974 - Software application verification: Various embodiments for software application verification are disclosed. Software application verification applies digital rights management to applications that run protected content on a playback device. In this way, protected content may be provided to approved applications and withheld from applications that have not been approved to run the protected content.... Agent: Microsoft Corporation
20100191973 - System and method for establishing a secure connection with a mobile device: Methods and apparatus are provided for establishing a secure connection with a mobile device that is configured to store a first private key that mathematically corresponds to a first public key. The method comprises receiving a quasi-public key from a trusted entity, wherein the quasi-public key mathematically corresponds to a... Agent: Ingrassia Fisher & Lorenz, P.C. (gm)
20100191979 - Apparatus and method with controlled switch method: An embedded microcontroller system comprises a central processing unit, a system controller for receiving and handling an interrupt, a register having storage locations containing sets of predefined system data for different operating conditions of the system assigned to the interrupts coupled to set a system configuration. The system data in... Agent: Texas Instruments Incorporated
20100191978 - Method for the parameterization and operation of weighing scales: The invention relates to a method for the parameterization of scales which have a weighing belt for the weighing of products in a conveying process, wherein a teach procedure and subsequently a verification procedure take place after the input of product-specific data. The invention furthermore relates to a method for... Agent: Townsend And Townsend And Crew, LLP
20100191980 - Microprocessor in a security-sensitive system: A Microprocessor (1) in a security-sensitive computing system for processing an operand according to an instruction is for improving its security provided with a modulo-based check hardware (2) to perform operations in parallel to the microprocessor (1) and for comparing both results regarding congruence.... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100191981 - Storage apparatus and data falsification preventing method thereof: According to one embodiment, a storage apparatus includes: an encryption key generation information generator configured to generate encryption key generation information used to generate an encryption key based on information from a host computer; an encryption key generator configured to generate the encryption key based on the encryption key generation... Agent: Knobbe Martens Olson & Bear LLP
20100191982 - Device: A device is provided which includes: a processor that outputs a command signal or an address signal and includes a bus module which inputs or outputs a data signal; and an encryption circuit that encrypts or decrypts the data signal in an encryption method using a common key and the... Agent: Fujitsu Patent Center Fujitsu Management Services Of America, Inc.
20100191983 - System and method for secure logging of document processing device messages: The subject application is directed to a system and method for secure logging of document processing device messages. A duration for capturing status messages is first defined and unencrypted document processing device status messages are received during the defined duration. An encryption key is generated for association with the duration... Agent: Tucker Ellis & West LLP
20100191988 - Method for reducing power consumption of a computer system in the working state: A method for reducing power consumption of a computer system in a working state is provided. The computer system comprises a processor, a memory and a chipset, and the processor is connected with the chipset through a processor bus. The method comprises classifying the power saving level of the computer... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100191986 - Multi-phase voltage regulator module system: A multi-phase voltage regulator module system includes a VRM and a phase control circuit. The VRM is capable of outputting a load detecting voltage which is direct proportion to the load of the CPU. The phase control circuit outputs a first level phase switching signal to the VRM, and a... Agent: Wpat, PC Intellectual Property Attorneys
20100191985 - Power signal detecting system, method and a portable electronic device thereof: A power signal detecting system and method thereof are disclosed. The power signal detecting system comprises a power supply and a portable electronic device. The portable electronic device is electrically connected with the power supply to receive a power signal. The portable electronic device comprises a sensing element, a detecting... Agent: Bacon & Thomas, PLLC
20100191987 - Semiconductor device using plural external voltage and data processing system including the same: To provide a first internal voltage generating circuit that generates an internal voltage based on a first external voltage and a second internal voltage generating circuit that generates the internal voltage based on a second external voltage. The semiconductor device generates an internal voltage from a plurality of the first... Agent: Mcginn Intellectual Property Law Group, PLLC
20100191984 - Single pin port power control: A power controller for a peripheral bus interface. A peripheral bus power controller includes a first terminal, a second terminal coupled to receive an power enable input signal from a host controller, and a third terminal coupled to provide an over-current output signal indicative of an over-current condition to the... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20100191989 - System and method for power management at an information handling system management subsystem: An information handling system management subsystem power manager adjusts power consumption of the management subsystem based on operational conditions at the information handling system. The power manager powers down the management subsystem when the information handling system is powered down so that the management subsystem performs substantially only those functions... Agent: Hamilton & Terrile, LLP
20100191991 - System and method for using an on-dimm remote sense for performance and power optimization: A system includes a dual in-line memory module and a system board. The dual in-line memory module includes a plurality of dynamic random access memory devices, and a system management interface. The system management interface is configured to measure a first voltage provided to the dynamic random access memory devices,... Agent: Larson Newman & Abel, LLP
20100191990 - Voltage-based memory size scaling in a data processing system: A memory has bits that fail as power supply voltage is reduced to reduce power and/or increase endurance. The bits become properly functional when the power supply voltage is increased back to its original value. With the reduced voltage, portions of the memory that include non-functional bits are not used.... Agent: Freescale Semiconductor, Inc. Law Department
20100191992 - Wireless communication apparatus and power management method for the same: A wireless communication apparatus is adapted for communication between a host and a communication device. The wireless communication apparatus includes a host transmission interface adapted to be coupled to the host, a host transmission interface controller coupled to the host transmission interface, a wireless transmission interface adapted for communicating with... Agent: Osha Liang L.L.P.
20100191993 - Logical power throttling: A processor includes a device providing a throttling power output signal. The throttling power output signal is used to determine when to logically throttle the power consumed by the processor. At least one core in the processor includes a pipeline having a decode pipe; and a logical power throttling unit... Agent: Gunnison, Mckay & Hodgson, L.L.P.
20100191995 - In-band sleep protocol for embedded bus: A sleep protocol is provided for controlling sleep mode in a device having a receive port and a transmit port. A location is established in a map of locations in the device as a sleep/wake control location. When the device receives a command to store a sleep value in the... Agent: Texas Instruments Incorporated
20100191994 - Method and apparatus for controlling energy consumption during resource sharing: An approach is provided for controlling energy consumption during resource sharing. One or more peer nodes determine scheduling information relating to when the peer nodes can utilize a predetermined level of communication capacity for sharing a computer resource (e.g., sharing content). The peer nodes transition between an active state for... Agent: Ditthavong Mori & Steiner, P.C.
20100191997 - Predict computing platform memory power utilization: A method is to include implementing at least one statistical prediction model to predict memory power utilization and reduce power consumption for a computing platform. The implementation includes determining a configuration parameter for the computing platform, monitoring an operating parameter for the computing platform and predicting memory power utilization for... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100191996 - Supply-and-demand control system of distributed and coordinated type, for use in power systems: According to one embodiment, each of the nodes incorporated in the respective electrical apparatuses that constitute a local power system establishes a communication path connected to any adjacent node, transmits and receive average supply-and-demand state data to and from the adjacent node through the communication path. Each node adjusts (increases... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100191998 - Apportioning and reducing data center environmental impacts, including a carbon footprint: Determining and apportioning the environmental impacts of a data center provides useful business intelligence for data center consumers. In one embodiment, apportioned carbon footprints are determined by identifying a data center and an application, determining the carbon footprint of a data center, and apportioning the carbon footprint on an application-specific... Agent: Shook, Hardy & Bacon L.L.P. (microsoft Corporation)
20100191999 - Memory device power managers and methods: Memory devices and methods are described that include a stack of memory dies and an attached logic die. Method and devices described provide for power management of portions of a stack of memory dies. Additional devices, systems, and methods are disclosed.... Agent: Schwegman, Lundberg & Woessner/micron
20100192000 - Setting controller termination in a memory controller and memory device interface in a communication bus: A DRAM and memory controller are coupled during driver training to reduce mismatches. The impedances of the system are controlled through a termination at the controller to yield improvements in timing margins. The coupling of the components on a shared electrical bus through adjustment of the termination values during training... Agent: Ibm-rochester C/o Toler Law Group
20100192001 - Device time adjustment for accurate data exchange: The clock of an endpoint device is adjusted to a collection system time in a meter reading system where the endpoint device is employed to read and record meter reading data for calculation of consumption data. Specifically, the meter reading data are recorded as a fixed number of intervals in... Agent: Dority & Manning, P.A.
20100192002 - Method and apparatus of testing data communication performance of a network system: Machine-readable media, methods, apparatus and system for testing a data communication performance of a network system are described. In some embodiments, an apparatus may comprise a first channel to synchronize a local clock of the apparatus with another local clock of another apparatus by communicating a synchronization message with the... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100192003 - Method and apparatus for supporting client data transport with timing transparency: Clock recovery is used in a variety of communications network applications to enable nodes using different clocks to operate in an effectively synchronized manner. Example embodiments of the present invention include an apparatus and corresponding method for supporting client data transport with timing transparency and require neither a common clock... Agent: Hamilton, Brook, Smith & Reynolds, P.C.07/22/2010 > patent applications in patent subcategories. category listing
20100185846 - Computer product, storage device, and firmware management method: According to one embodiment, an electronic apparatus includes a plurality of storage modules, a rewrite module, a start module, and a switch module. The storage modules store a plurality of firmware items, respectively. The rewrite module rewrites at least one of the firmware items other than a firmware item being... Agent: Knobbe Martens Olson & Bear LLP
20100185842 - Computer system with two operating devices and control method thereof: A computer system includes at least a first and a second operating device and a control module. The control module sends at least one signal to a central processing unit for managing and controlling the first and the second operating device, and copying the contents of any one of the... Agent: Nikolai & Mersereau, P.A.
20100185841 - Determining addresses of electrical components arranged in a daisy chain: In one aspect, a system includes electrical components arranged in a daisy chain that include a first electrical component disposed at a first end of the daisy chain and a second electrical component disposed at an opposite end of the daisy chain than the first end. Each of the first... Agent: Daly, Crowley, Mofford & Durkee, LLP
20100185844 - Evasion of power on self test during an operating system initiated reboot: A system and method to evade the power on self test during an operating system initiated reboot is disclosed. In one embodiment, a method for optimizing reboot process of a computer includes determining a status of a power on self test (POST) performed during a prior booting of the computer... Agent: Hewlett-packard Company Intellectual Property Administration
20100185843 - Hardware encrypting storage device with physically separable key storage device: Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key... Agent: Microsoft Corporation
20100185845 - Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit: A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating... Agent: Wenderoth, Lind & Ponack L.L.P.
20100185847 - Database outsourcing with access privacy: This invention introduces a new paradigm for outsourcing the transaction processing backend of a multi-client database application to an untrusted service provider. Specifically, the invention enables untrusted service providers to support transaction serialization, backup and recovery for clients, with full data confidentiality and correctness. Moreover, providers learn nothing about transactions... Agent: Ansel M. Schwartz Attorney At Law
20100185848 - Secure external buffer for hard disk drive system on a chip: A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface interposed between the host and a client. Communicatively coupled to the encryption interface is an external buffer for the collection and processing of data. A host... Agent: Stmicroelectronics, Inc.
20100185849 - Method and arrangement for certificate handling: The present invention relates to a method and an arrangement for authentication and authorization in an access network. In an initial phase of the method according to the invention the user equipment and the security gateway exchange information on available certificate(s). If the user equipment and the security gateway lack... Agent: Ericsson Inc.
20100185850 - Method and device for authenticating legal neighbor in group key management: Method and device for authenticating a legal neighbor in group key management (GKM) are disclosed. The method includes: members on a local network that needs the automatic GKM service store a group shared key and a group authentication algorithm; an authenticating member receives a first authentication value and authentication information... Agent: Huawei/bhgl
20100185851 - Efficient and secure cryptographic coupon reloading: t
20100185855 - Data repository and method for promoting network storage of data: In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the... Agent: Fish & Richardson PC
20100185852 - Encryption and decryption method for shared encrypted file: In response to a request to read or store a shared encrypted file, a filter driver in a client computer receives client authentication from a key management server and acquires a key list having pairs of UNC path names and encryption keys corresponding to shared encrypted folders allowed to be... Agent: Mattingly & Malur, P.C.
20100185853 - Local area network architecture: The present disclosure provides a local area network architecture including a server, a client and a data transfer system. The server uses a first operating system and includes an encryption chip and a server memory storing the encrypted files. The encryption chip includes an encryption system having a different operating... Agent: PCe Industry, Inc. Att. Steven Reiss
20100185854 - Multiple content protection systems in a file: Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each of the protection systems stores, in a protection system header box, information for decrypting the content in accordance with... Agent: Microsoft Corporation
20100185858 - Image forming system: A Multi-Function peripheral (MFP), a server apparatus, and a client apparatus for generating image output data from document data and transmitting the image output data to the server apparatus are each connected to a network. In the server apparatus, an output data management unit stores the received image output data... Agent: Mcdonnell Boehnen Hulbert & Berghoff LLP
20100185857 - Removable security modules and related methods: Example removable security modules for use with process control devices and related methods are disclosed. An example removable security module includes a body configured to be removably coupled to the process control device and a memory disposed in the body with a shared secret stored in the memory. The example... Agent: Hanley, Flight & Zimmerman, LLC
20100185859 - Software update system, management apparatus, recording medium, and integrated circuit: An update server 200 acquires, from an apparatus 100, a result of verifications relating to tampering of a protection control module 120 and each of install modules included in an install module group 130. The update server 200 determines a processing procedure of the apparatus 100 depending on the acquired... Agent: Wenderoth, Lind & Ponack L.L.P.
20100185856 - Stateless agent: Secure and stateless data transfer between a source agent at a first computer system and a destination agent at a second computer system is provided. A first list of labels of content structures is generated at the first computer system. During a first data transfer session, the first list, authentication... Agent: Microsoft Corporation
20100185860 - Method for authenticating a communication channel between a client and a server: A method for authenticating a communication channel between a client and server has been disclosed. The method employs a mutual authentication payload (MAP) protocol that enables mutual authentication between a client and server system in a convenient user-friendly manner while providing seamless and automated portability to the clients, In the... Agent: Sawyer Law Group, P.C.
20100185861 - Anonymous key issuing for attribute-based encryption: The claimed subject matter provides systems and/or methods that establish a decryption key for use with an attribute authority. The system can include components that identify a pseudonym based a global identifier (GID) associated with a user, initiates communication with the attribute authority, and selects a first random value utilized... Agent: Lee & Hayes, PLLC
20100185863 - Method and apparatus for time-lapse cryptography: According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to... Agent: Lando & Anastasi, LLP
20100185864 - Multi-dimensional credentialing using veiled certificates: In accordance with certain embodiments of the present disclosure, a method for creating a veiled certificate is provided. The method comprises requesting a certificate from a regulator by sending a message with a digital signature of the message signed by the owner. The message comprises an owner's veiled certificate token,... Agent: Dority & Manning, P.A.
20100185867 - Digital signature method, program, and apparatus: A method for generating a digital signature with respect to an electronic document, the method including: inputting a target electronic document and a corresponding digital signature σ; dividing the target electronic document into a plurality of partial documents mi; and when a revision of the partial documents is to be... Agent: Fujitsu Patent Center Fujitsu Management Services Of America, Inc.
20100185865 - Generation of communication device signatures for use in securing nomadic electronic transactions: A method for execution in a communication device, which comprises accessing an identifier stored in a memory; receiving a first data set and a second data set over a first communication path; generating a first signature from the identifier and the first data set; generating a second signature from the... Agent: Smart & Biggar
20100185866 - Method and system for categorizing contents: The present invention discloses a method and system for categorizing contents and relates to network and communication technologies. The content categorizing method includes: categorizing a content for which a category is requested and determining the content category; generating a digital signature according to the content and the content category; and... Agent: Futurewei Technologies, Inc. Ipr & Standards Department
20100185868 - Personilized digital media access system: The invention is an apparatus that facilitates access to encrypted digital media to accept verification and authentication from an excelsior enabler using at least one token and at least one electronic identification. The at least one electronic identification could be a device serial number, a networking MAC address, or a... Agent: The Str3em Team
20100185870 - Method and system for managing a hierarchy of passwords: A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the codeword is randomly modified with a probability p to produce a modified codeword. The modified codeword is... Agent: Mitsubishi Electric Research Laboratories, Inc.
20100185871 - System and method to provide secure access to personal information: A personal information system allowing users to securely collect, store, and transfer personal information is disclosed. The personal information system provides a central location for users to store information, and allows third parties to securely access the information in accordance with user-defined access rules. By providing a central storage area... Agent: Perkins Coie LLP Patent-sea
20100185875 - Background service process for local collection of data in an electronic discovery system: Embodiments of the invention relate to systems, methods, and computer program products for a local collection tool that is configured to run as an authorized background service process. As such, the local collection tool of the present invention is capable of being executed in the absence of the device user's... Agent: Moore & Van Allen, PLLC For Bofa
20100185873 - System and method for file processing and file processing program: A cipher processing system is provided for allowing file access while maintaining the integrity without a user being conscious of the difference between files when the user accesses a file in a folder containing both a ciphertext file and a plaintext file. Thus, according to the present invention, if a... Agent: Mattingly & Malur, P.C.
20100185872 - System, method and apparatus for reading content of external storage device: A system for enabling the reading on a reader of content stored in an external storage device is disclosed. The reader is a read-only device and has a display, a processor for controlling the operation of the reader, and a port for operative connection of the external storage device. The... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100185876 - Keyboard-input information-security apparatus and method: A keyboard-input information-security apparatus and method are provided. The apparatus includes an interrupt-descriptor table for storing a list of addresses of functions for handling interrupts, and storing an address of a secure input interrupt-service routine at a specific location in an address area for an operating-system input interrupt-service routine supported... Agent: Lemaire Patent Law Firm, P.l.l.c.
20100185879 - Load balancing power supplies: In one embodiment, a computer system comprises an enclosure, at least one power supply module in the enclosure, the power supply comprising at least a first power output and a second power output, at least one compute node, comprising an input/output module and logic to generate a power input signal... Agent: Hewlett-packard Company Intellectual Property Administration
20100185878 - Method for controlling power consumption and a device having power consumption capabilities: A method for controlling power consumption of a processor, the method includes: receiving an indicator that indicates that the processor is expected to change its activity; determining, in response to the indicator and to a current power consumption of the processor, whether to change a frequency of a clock signal... Agent: Freescale Semiconductor, Inc. Law Department
20100185881 - Semiconductor device incorporating regulator and electric apparatus including a plurality of the semiconductor devices: A semiconductor device includes a processing unit which generates a main signal, a first output terminal which outputs the main signal, a regulator which supplies power to the processing unit, a first input terminal which receives the input of a first control signal, a unit which generates a second control... Agent: Turocy & Watson, LLP
20100185877 - System and method for information handling system power management by variable direct current input: A power manager of an information handling system selectively commands a first or second source voltage from an AC-to-DC adapter based upon power consumption of the information handling system. A lower direct current voltage is provided during reduced power consumption so that DC-to-DC conversion in a power supply is more... Agent: Hamilton & Terrile, LLP
20100185880 - Test apparatus: A test apparatus for supporting compatibility testing between a motherboard and a number of power supply units includes a plug, a number of sockets, and a microprocessor. The plug is configured for connecting to the motherboard. The number of sockets is configured for connecting to the number of power supply... Agent: PCe Industry, Inc. Att. Steven Reiss
20100185882 - Computer system power management based on task criticality: A method, apparatus, and program product are provided for managing power consumption in a computer system based on the degree with which performance of tasks can be degraded in order to save power. A criticality value controls the degree with which performance of a task may be degraded is associated... Agent: Wood, Herron & Evans, L.L.P. (ibm)
20100185883 - Power management for large memory subsystems: A power management system is provided. The system includes a permanent storage medium that has a plurality of storage segments that are individually controllable. A power manager analyzes requirements of programs that access the permanent storage medium and selectively enables or disables a subset of the storage segments in order... Agent: Lee & Hayes, PLLC
20100185884 - Standby power saving system and computer power-on and power-off method thereof: A standby power saving system includes a standby power control module connected to or disposed on a motherboard of a computer for bidirectional signal transmission and transmitting a control signal; and at least one receiving module disposed on at least one AC power line of the computer and/or at least... Agent: Muncy, Geissler, Olds & Lowe, PLLC
20100185885 - Method and apparatus for adjusting a performance state of a processor resource: A method, apparatus or stored program for adjusting the clock throttle rate of a central processing unit (CPU) included in a computer, in which the usage of the CPU is measured, so that the clock throttle rate of the CPU can be automatically adjusted on the measured usage of the... Agent: Carlineo, Spicer & Kee, LLC
20100185886 - Information processing device: An information processing device of the present invention comprises a main CPU capable of taking at least two states which are an operating state and a sleeping state, a sub-CPU having power consumption lower than that of the main CPU and capable of taking at least two states which are... Agent: Wenderoth, Lind & Ponack L.L.P.
20100185887 - Apparatus and method for saving power in portable terminal using ethernet: A method for saving power in a portable terminal includes determining whether an Ethernet cable is communicatively connected to an Ethernet modem; and when the Ethernet cable is not in communication with the Ethernet modem, intermittently supplying power to the Ethernet modem.... Agent: Cha & Reiter, LLC
20100185888 - Microchip for monitoring an electrical subassembly: The invention relates to a microchip (1) for monitoring an electrical subassembly (12). Said microchip (1) comprises a means (3) for monitoring a supply voltage (9, 11) of the subassembly as well as a watchdog unit (4) for monitoring a program flow of a microprocessor (6). The invention makes it... Agent: Henry M Feiereisen, LLC Henry M Feiereisen
20100185889 - Channel subsystem server time protocol commands: A protocol for communicating with the timing facility used in a data processing network to provide synchronization is provided via the execution of a machine instruction that accepts a plurality of commands. The interaction is provided through the use of message request blocks and their associated message response blocks. In... Agent: Heslin Rothenberg Farley & Mesiti P.C.
20100185890 - Synchronous global controller for enhanced pipelining: The present invention relates to a system and method for processing the read and write operations in a memory architecture. The system processing the read and write operations includes at least one local memory block and a synchronously controlled global controller coupled to the local memory block and adapted to... Agent: Mcandrews Held & Malloy, Ltd07/15/2010 > patent applications in patent subcategories. category listing
20100180107 - Virtualization system provision: A method for providing a virtualization system includes receiving a plurality of virtualization system requirements from a customer. The plurality of virtualization system requirements include a plurality of information handling systems (IHSs), at least one storage, and a plurality of configuration details. A primary IHS and at least one secondary... Agent: Haynes And Boone, LLPIPSection
20100180108 - Electronic device and method for secure operating system update in embedded system: An electronic device and method for secure embedded operating system update within embedded system. The embedded system includes a random-access memory, a non-volatile storage unit and a processing unit. The non-volatile storage unit defines a boot sector, a first sector and a second sector and contains a boot loader in... Agent: Rosenberg, Klein & Lee
20100180109 - System for registering and initiating pre-boot environment for enabling partitions: A method for registering and initiating a pre-boot environment for enabling partitions. The method provides a basic input output system (CIOS) with an application program interface (API) that accesses a Logical Clock Address (LCA) sector number when a boot configuration flag is set, the LCA sector number stores an operating... Agent: Hamilton & Terrile, LLP
20100180110 - System and method for configuring option rom: A method of configuring an information handling system includes operating a management controller to obtain device configuration data from a management server, storing the device configuration data in the information handling system, booting the information handling system, and accessing the device configuration data to configure a device. Machine-executable code for... Agent: Larson Newman & Abel, LLP
20100180111 - method of establishing fast security association for handover between heterogeneous radio access networks: A method of establishing security association between heterogeneous networks is disclosed. The method comprises a first step of receiving information of heterogeneous networks near a mobile station; a second step of transmitting a request message requesting authentication related information transfer to a target heterogeneous network where the mobile station intends... Agent: Birch Stewart Kolasch & Birch
20100180112 - Secure node admission in a communication network: A system and method for key determination in a communication network having a network control node and a plurality of associated network nodes. According to various embodiments of the disclosed method and apparatus, an entry node sends to the network control node a submission requesting a salt; the entry node... Agent: Entropic Communications, Inc.
20100180113 - Method for misbehaviour detection in secure wireless mesh networks: In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the packet from the sending node and forwards the packet to one or more receiving nodes. A destination node receives the packet.... Agent: King & Spalding LLP
20100180114 - Processing packet streams: Systems and methods are disclosed that include a data-bus, system memory, a first processor arranged to receive an input stream, and a second processor programmed to apply one or more security algorithms to secure packets of the input stream to generate at least partially security-processed packets.... Agent: Docket Clerk
20100180116 - Intrusion-tolerant group management for mobile ad-hoc networks: An inventive system and method for intrusion-tolerant group management for a network is presented. The method comprises a client broadcasting a message request to controllers and validating the rekey messages received from the controllers, and controllers validating the client's broadcast message request and broadcasting proposals, collecting proposals, constructing threshold-signed proofs,... Agent: Telcordia Technologies, Inc.
20100180115 - Method and system for detecting successful authentication of multiple ports in a time-based roving architecture: In one embodiment of the present invention, a method includes authenticating an HDCP transmitting device at a first port of an HDCP receiving device. A port of the HDCP receiving device is connected to a pipe of an HDCP architecture of the HDCP receiving device at a first time. A... Agent: Silicon Image/bstz Blakely Sokoloff Taylor & Zafman LLP
20100180117 - Random signal generator: A random signal generator uses a folded MOS transistor, whose drain-source current includes a random component, as an electronic noise source. The random signal generator generates a random binary signal from the random component. The invention may be applied, in particular, to smart cards.... Agent: Allen, Dyer, Doppelt, Milbrath & Gilchrist P.A.
20100180118 - Information processing apparatus, method for switching cipher and program: An information processing apparatus is provided which includes a plurality of encryption algorithm units which are respectively capable of performing mutual authentication with an external device by respectively using an encryption method or a cipher key being different from one another; and a data memory unit which stores a plurality... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100180119 - Key exchanging apparatus: A key exchanging apparatus transmits the contribution data to the plurality of counterpart apparatuses, generates a signer contribution confirmation signature with respect to a contribution data set including all the contribution data received from the plurality of counterpart apparatuses, generates auxiliary data and auxiliary data validity certification sentence from the... Agent: Young & Thompson
20100180120 - Information protection device: A method for communication includes coupling an information protection device (34) to communicate via a local interface (36) with a local computer (28) operated by a user (22), the information protection device having an input transducer (58) associated therewith. A communication session is initiated between the local computer and a... Agent: D. Kligler I.p. Services Ltd
20100180121 - Method and apparatus for enhancing security in network-based data communication: Various embodiments of a method and associated equipment for enhancing security in a network-based data communication are provided. In one embodiment, the method includes: a) maintaining at least access to data which a transmitting user may selectively transmit, b) providing a submit control associated with a recipient user to which... Agent: Fay Sharpe/lucent
20100180125 - Information service method, information service unit, recording or reproducing controlling method, and recording and/or reproducing unit: Unique identification information is prerecorded on a disc. The identification information is registered to a server along with user's license when he or she buys the disc. When an terminal unit reproduces data from the disc, identification information is read and transmitted to the server through the Internet. The server... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100180122 - Method and device for detecting an attempt to substitute an original casing portion of an electronic system with a replacement casing portion: The invention relates to an electronic system comprising a casing consisting of at least first and second casing portions and containing a device for detecting the substitution of the first casing portion. The device comprises a first integrated circuit intended to be fixed to the first casing portion and a... Agent: Vedder Price P.C.
20100180123 - Procedure and architecture for the protection of real time data: The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements of real-time data processing, such as the timeliness of real-time data transmission and limited resource availability. Frequent modification of an asymmetric key... Agent: Design Ip, P.C.
20100180124 - Verification apparatus and program: According to one embodiment of the present invention, the first authentication context includes the template certificate indicative of the validity of a template and the first apparatus evaluation certificate indicative of the validity of the first apparatus evaluating information whilst the second authentication context includes the second apparatus evaluating certificate... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100180126 - Secure remote password validation: A method, system and apparatus for secure password validation can include a local authentication process configured for coupling both to local authentication data and to a remote authentication process. The system also can include a comparator disposed in the local authentication process and programmed to detect an extended password string... Agent: Carey, Rodriguez, Greenberg & Paul, LLP Steven M. Greenberg
20100180127 - Biometric authentication based upon usage history: Customized biometric authentication based at least in part upon usage history and learning capabilities of a user is provided. A biometric sample of a user received at a biometric interface of a device is compared with at least one stored template that uniquely identifies the user, and a match score... Agent: Motorola, Inc.
20100180128 - Information source agent systems and methods for distributed data storage and management using content signatures: Information source agent systems and methods for distributed content storage and management using content signatures that use file identicality properties are provided. A data management system is provided that includes a content engine for managing the storage of file content, a content signature generator that generates a unique content signature... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100180129 - Apparatus comprising a plurality of arithmetic logic units: An arrangement of arithmetic logic units carries out an operation on at least one operand, wherein the operation is determined by operation codes received by the arithmetic logic units. The operation codes and at least one operand are received on a first clock cycle. The result of the operation is... Agent: Gardere Wynne Sewell LLP Intellectual Property Section
20100180130 - Cryptographic protection of usage restrictions in electronic devices: An electronic device requires valid control keys to change any usage restriction setting. The device is provided control keys, a secret key, and a signed software object including a batch ID and a hash of the secret key. For each control key, the device generates a cryptographic footprint bound to... Agent: Coats & Bennett, PLLC
20100180132 - Power management device for a computer system and related power management method and computer system: A power management device for a computer system includes a detection unit coupled to a peripheral interface of the computer system for detecting whether a portable electronic device is coupled to the peripheral interface when the computer system is shut down, to generate a detection result, and a control unit... Agent: North America Intellectual Property Corporation
20100180131 - Power management mechanism for data storage environment: A method, system, and computer program product for facilitating power instability in a central electronics complex (CEC) of data storage computing environment in advance of a potential power failure is provided. Upon receipt of a first early power off warning (EPOW) signal indicating power instability, a first priority of execution... Agent: Griffiths & Seaton PLLC (ibm)
20100180133 - Link state detection system for network cable: A link detection system for a network cable is applicable for detecting a connection state of the network cable. If the network cable is connected to the link detection system, the network state detection unit sends a voltage level of a first signal, so as to turn on the power... Agent: Quintero Law Office, PC
20100180134 - Apparatus and method for power saving of bus interface in portable terminal: An apparatus and a method for power saving in a portable terminal are provided. The method for power saving in the portable terminal includes determining a throughput when processed by a bus, determining a throughput required for a program and selectively controlling a bus clock connected with a modem according... Agent: Cha & Reiter, LLC
20100180135 - Dynamic power management for internal information handling system links: In some embodiments, a method for automatically and dynamically controlling the power states of physical layer links (PHYs) in a modular information handling system is provided. A chassis manager automatically determines a status of at least one of the chassis manager and a managed chassis module of a modular information... Agent: Baker Botts L.l.p
20100180137 - Control device: A control device performs the reading of data from a recording medium that is authenticated mutually or the writing of data into the recording medium. The control device includes an interface section which interfaces with the recording medium, a storing section which stores key information and authentication information produced in... Agent: Mcdermott Will & Emery LLP
20100180138 - Power switching circuit of portable electronic device: A power switching circuit of a portable electronic device is disclosed. The portable electronic device can be coupled to an expansion device. The power switching circuit includes a first power terminal, a second power terminal, a first switch module, a second switch module, and a power pin. The first switch... Agent: Muncy, Geissler, Olds & Lowe, PLLC
20100180136 - Ultra low power wake-on-event mode for biometric systems: An apparatus for reducing power consumption in fingerprint-sensing circuits is disclosed in one embodiment of the invention as including a fingerprint sensing area onto which a user can apply a fingerprint. An integrated circuit communicates with the fingerprint sensing area and is configured to detect finger activity over the fingerprint... Agent: Stevens Law Group
20100180139 - Power outage operation of a cable modem: A method, system and computer program product for operation of a cable modem in response to Alternating Current (AC) power outage is described herein. When a loss of AC power is detected, the cable modem is switched to battery backup mode of operation using a single upstream and a single... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100180140 - Data processing system and image processing system: A data processor comprising: a bus control circuit adapted to be interfaced with a synchronous DRAM which can be accessed in synchronism with a clock signal; a plurality of data processing modules coupled to said bus control circuit for producing data and addresses for accessing a memory; and a clock... Agent: Mattingly & Malur, P.C.
20100180141 - Method of dynamically adjusting signal delay time of circuit system: A circuit system periodically checks a system-environment monitor value, and then obtains a system-environment monitor value index corresponding to the system-environment monitor value in the environment-adjustment look-up table. Finally, the circuit system adjusts a signal delay time according to a delay adjustment value corresponding to the system-environment monitor value index.... Agent: North America Intellectual Property Corporation
20100180142 - Method, can bus driver and can bus system for the recovery of a clock frequency of a can bus: A method, a CAN bus driver and a CAN bus system for the recovery of a clock frequency of a CAN bus, which couples a master device, that has a clock generator for providing the clock frequency, to at least one slave device. A phase-locked loop is used in the... Agent: Kenyon & Kenyon LLP
20100180143 - Techniques for improved timing control of memory devices: Techniques for improved timing control of memory devices are disclosed. In one embodiment, the techniques may be realized as a memory controller to communicate with a memory device via a communications link. The memory controller may comprise a memory interface to exchange data with the memory device via a set... Agent: Hunton & Williams LLP/rambus Inc. Intellectual Property Department07/08/2010 > patent applications in patent subcategories. category listing
20100174894 - Method, apparatus, and system for configuring an operating system on a target computer: A method, apparatus, and system are disclosed for configuring an operating system on a target computer. A configuration module configures a target computer as a diskless client. A boot module boots the target computer to a setup state. A communication module establishes communications between the target computer, a donor storage... Agent: Kunzler Needham Massey & Thorpe
20100174895 - Rapid-boot computing device with dual operating systems: A computing device is booted in a manner that enables a software application to begin execution with minimal delay. When the device is powered up, a first processor begins booting under control of a first operating system, and a second processor begins booting under control of a second operating system.... Agent: Gardner Groff Greenwald & Villanueva. PC
20100174896 - Method and system to update applications based on availability settings: A method and system for updating one or more application settings based upon information contained in an availability setting. A determination may be made as to whether a first availability setting is activated for a first application associated with a user. In response to the determination that the availability setting... Agent: Sonnenschein Nath & Rosenthal LLP
20100174898 - Communication between call controllers by amending call processing messages: Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses... Agent: Anderson Gorecki & Manaras, LLP Attn: John C. Gorecki
20100174897 - Encryption method for highest security applications: A method for encrypting a message M of IM-bit length, includes the steps of a) providing a first random bit sequence of IR-bit length, IR≧IM; b) subdividing the message M into unitary message strings of IS-bits, wherein IS≦IM; c) for each unitary message string, executing an XOR-operation of the unitary... Agent: Cantor Colburn, LLP
20100174899 - Data distribution system, key management device, and key management method: Receiving terminals joining a multicast group are divided into sub groups and rekeying is performed only on the sub group which one of the receiving terminals has left. An encryption key management system having an encryption method is provided in which a multicast server is connected via an IP network,... Agent: Mattingly & Malur, P.C.
20100174900 - Method and apparatus for authenticating online transactions using a browser: A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and the authentication server using a user browser. The method includes requesting, using the user browser, the authenticating with the service provider... Agent: Ipsg, P.C.
20100174901 - Implementing ieee 802.1ae and 802.1af security in epon (1gepon and 10gepon) networks: A method and system is provided for securing communication on an EPON. Particularly different types of encrypted messages, each with a respective short MAC SegTAG, may be sent from the OLT to an ONU and from an ONU to the OLT without need for a full SecTAG with an explicit... Agent: Dr. Mark M. Friedman C/o Bill Polkinghorn - Discovery Dispatch
20100174902 - Portable storage media with high security function: A portable storage media with high security function is disclosed. The portable storage media comprises a microprocessor, a sensor and a memory. The microprocessor is connected to a data transmission interface, a sensor transmission interface and a memory transmission interface, wherein the data transmission interface is adopted for connecting to... Agent: Jianq Chyun Intellectual Property Office
20100174905 - Communication between call controllers by amending call processing messages: Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses... Agent: Anderson Gorecki & Manaras, LLP Attn: John C. Gorecki
20100174906 - Method, system and equipment for key distribution: A method, system and equipment for key distribution are disclosed. During the course of computing a shared key Kab between a client node and a third party equipment, a serial number is introduced into keying materials to compute the Kab, instead of just using constant parameter, thus once the Kab... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20100174903 - Secure login protocol: The present invention provides a method for generating a secret to be used in an authentication of a user before a server. Using a data association between two data sets, the association being created by the server, the user can provide a secret using an algorithm based on a pin... Agent: Foley And Lardner LLP Suite 500
20100174904 - Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates: Authentication of elements (e.g. digital certificates 140) as possessing a pre-specified property (e.g. being valid) or not possessing the property is performed by (1) assigning a distinct integer pi to each element, and (2) accumulating the elements possessing the property or the elements not possessing the property using a P-th... Agent: Haynes And Boone, LLPIPSection
20100174907 - Secure bootstrapping for wireless communications: A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF... Agent: Qualcomm Incorporated
20100174909 - Data authentication using plural electronic keys: A method for transmitting digital data to a recipient via a communications network includes providing digital data and digitally signing the digital data using N cryptographic keys. Each of the N cryptographic keys is associated with a same sender of the digital data, and N>1. The recipient receives the digital... Agent: Freedman & Associates
20100174908 - Method and system for securely exchanging encryption key determination information: A system and method for securely exchanging plurality of information items used to generate a plurality of encryption keys used in a public key-and-private key system. In accordance with the principles of the invention, elements of exchanged information items, such as public key and synchronizing indictors are encrypted before the... Agent: Plevy & Keene LLP
20100174910 - Public key encryption with digital signature scheme: An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process. The reuse of the encryption ephemeral key pair in the digital signature process advantageously results in reduced byte size of the... Agent: Jones Day (rim) - 2n
20100174911 - Anonymous authentication system and anonymous authentication method: A disclosed anonymous authentication system comprises a group management device, an authentication-subjected user device, a verification device and an authentication-subjected user identification device. A user previously registers a verification key in the group management device such that his signature can be verified. For authentication, the user generates his or her... Agent: Foley And Lardner LLP Suite 500
20100174912 - Unique account identification: A synchronization system includes a first account assigned a first unique identifier. Access to the first account is contingent on validation of a shared access credential. The synchronization system also includes a second account assigned a second unique identifier. Access to the second account is contingent on validation of the... Agent: Microsoft Corporation
20100174913 - Multi-factor authentication system for encryption key storage and method of operation therefor: A method for operating a multi-factor authentication system includes: authenticating a user by a self-authenticating token system; and retrieving a decryption key from the self-authenticating token system by a computer system after authenticating the user, the computer system using encryption to encrypt data.... Agent: Law Offices Of Mikio Ishimaru
20100174914 - System and method for traceless biometric identification with user selection: A device, system and method for identifying an individual with a biometric identifier that is designed to be non-unique, such that at least one other individual in a given population has the identical biometric identifier. The biometric identifier according to the present invention, also referred to herein as a “BIdToken”,... Agent: Dr. D. Graeser Ltd.
20100174917 - Information recording medium, reproducing apparatus and cumputer program: An information recording medium (1) includes a recording area (12) in which a content (122) which is encrypted by an encryption key in a first encryption system and first key information (121) for obtaining the encryption key by a second encryption system that is different from the first encryption system... Agent: Young & Thompson
20100174918 - Personal digital server (pds): Personal Digital Server (“PDS”) is a unique computer application for the storage, updating, management and sharing of all types of digital media files, including audio, video, images and documents, irrespective of their format. PDS provides users with a single location to store and access, both locally and remotely, all of... Agent: Nields, Lemack & Frame, LLC
20100174915 - Turnover controller: This disclosure solves the problem of data security of transactions and turnovers in all distribution levels, including monitoring by the appropriate government institutions, in order to prevent tax avoidance, VAT fraud, smuggling, bootlegging, diversion of original goods from the distribution system and infiltration into the distribution system of counterfeited and... Agent: Hunton & Williams LLP Intellectual Property Department
20100174916 - Universal file: A system for processing a universal media file is provided. The system includes a universal file recognition module that processes a universal media file based on a key. A key protection module provides the key based on a business relationship.... Agent: Cantor Colburn LLP - Fox Entertainment Group
20100174919 - Program execution apparatus, control method, control program, and integrated circuit: Information processing apparatus 100 ensures confidentiality of encryption and reduces overhead associated with processing not directly related to the encryption. The information processing apparatus 100 includes: application program A158 that includes an instruction for encryption which uses a key; tampering detection unit 135x that detects tampering of the program; CPU... Agent: Wenderoth, Lind & Ponack L.L.P.
20100174920 - Data processing apparatus: A data processing apparatus comprises an integrated circuit containing a data processor and a non-volatile store storing at least one security code. A first memory external to the integrated circuit stores data, the data being cryptographically protected in a first format. A second memory external to the integrated circuit is... Agent: Hewlett-packard Company Intellectual Property Administration
20100174921 - Device side host integrity validation: Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file,... Agent: Microsoft Corporation
20100174922 - Encryption bridge system and method of operation thereof: A method of operation of an encryption bridge system that includes: authenticating a user using a self-authenticating encryption bridge; and controlling encryption using the self-authenticating encryption bridge disposed between a computer system and a storage system in response to the authenticating of the user.... Agent: Law Offices Of Mikio Ishimaru
20100174926 - Data processing device and data processing method: Disclosed is a data processing device, which comprises: an input device for generating first input information; a central processor; an embedded controller, connected to the power supply, the input device and the central processor. When the data processing device is powered on, the embedded controller is adapted to control the... Agent: Schwegman, Lundberg & Woessner, P.A.
20100174924 - Hierarchical power management: s
20100174925 - Hierarchical power management with hot mode:
20100174927 - Power control bus: A circuit and method utilizing a power control data bus for implementing power control. Various aspects of the present invention provide an electrical circuit that comprises a power supply circuit that outputs electrical power. The electrical circuit may also comprise an integrated circuit that receives electrical power from the power... Agent: Mcandrews Held & Malloy, Ltd
20100174923 - Regulating power consumption: Methods, systems, and design structures for providing power-regulated multi-core processing. The method includes determining a configuration of processing cores for optimal power consumption. The configuration of processing cores for optimal power consumption comprises a managing core and zero or more active processing cores wherein the active processing cores are selected... Agent: Jo Katherine D'ambrosio
20100174931 - Managing electric power consumption by configuring elements of a distributed computing system: A method and system for managing electric power consumption by elements of a distributed computing system comprises: determining one or more system metrics that relate to electric power usage as consumed by elements of a configured distributed environment; determining a system value in response to the one or more system... Agent: Scully, Scott, Murphy & Presser, P.C.
20100174929 - Method and systems for power consumption management of a pattern-recognition processor: Disclosed are methods and devices, among which is a device that includes a pattern-recognition processor. In some embodiments, the pattern-recognition processor includes a first block of feature cells coupled to a decoder via a first plurality of local input conductors, a first block-disabling circuit, and a plurality of global input... Agent: Fletcher Yoder (micron Technology, Inc.)
20100174930 - Mobile device having organic light emitting display and related display method for power saving: After receiving a web page containing several templates from a web server, a mobile device converts an original color in a selected template of the web page into a new color. Then the mobile device displays the color-converted web page on a display unit which may be formed of OLED.... Agent: Docket Clerk
20100174928 - Optimizer mechanism to increase battery length for mobile devices: An optimizer mechanism to increase battery length for mobile devices is provided. An operational state of a data processing system, e.g., a mobile device, is adjusted so as to achieve a target time period of operation when the data processing system is using a depleting power supply. A predicted power... Agent: Ibm Corp. (wip) C/o Walder Intellectual Property Law, P.C.
20100174932 - Circuit, system and method for selectively turning off internal clock drivers: The present invention includes a circuit, system and method for selectively turning off internal clock drivers to reduce operating current. The present invention may be used to reduce power consumption by reducing operating current in a memory device. Operating current may be reduced by turning off internal clock drivers that... Agent: Hamilton, Brook, Smith & Reynolds, P.C.
20100174934 - Hibernation or suspend using a non-volatile-memory device: This disclosure describes techniques for using a non-volatile-memory device such as flash memory to store memory data during hibernation or suspend. By so doing, hard drives and/or data are safer, and less power may be used.... Agent: Sadler, Breen, Morasch & Colby, Ps
20100174935 - Image forming apparatus and method of controlling power consumption thereof: A method of controlling power consumption of an image forming apparatus includes outputting information regarding power consumption of a plurality of operation units if a power consumption check mode is set, performing power save operation in which at least one operation unit from among the plurality of operation units is... Agent: Stanzione & Kim, LLP
20100174933 - System and method for reducing processor power consumption: A system and method for reducing active power in processors is disclosed. A method embodiment comprises the steps of determining when a particular logic block is inactive, determining the powered state of the particular logic block, isolating the particular logic block from a main processor core, and powering off the... Agent: Slater & Matsil, L.L.P.
20100174936 - Communicating via an in-die interconnect: In one embodiment, the present invention includes a method for writing data from a writer coupled to a reader via an in-die interconnect into a queue entry according to a first clock of the writer, generating a mapping of which second clocks of the reader that the reader is allowed... Agent: Trop, Pruner & Hu, P.C.
20100174937 - Method and system for a message processor switch for performing incremental redundancy in edge compliant terminals: Certain embodiments of the invention may be found in a method and system for processing messages. Aspects of the method may comprise receiving at least one signal on a chip that controls switching from a core processor to a DSP. At least a first bus that couples the core processor... Agent: Mcandrews Held & Malloy, Ltd07/01/2010 > patent applications in patent subcategories. category listing
20100169629 - Method for configuring computer by bios, server, computer, system startup method and computer system: A method for configuring computer by Basic Input/Output System (BIOS), a server and a computer are provided. The method comprising the steps of: setting up a connection to a server storing configuration information for the computer through a network; acquiring the configuration information for the computer from the server; and... Agent: Dickstein Shapiro LLP
20100169631 - Authentication for resume boot path: Methods and systems to perform an authentication operation after resuming from a sleep state are presented. In one embodiment, a method includes starting a boot process from a sleep state. The method further includes providing platform services to support an authentication operation as part of the boot process and determining... Agent: Blakely, Sokoloff, Taylor & Zafman LLP
20100169632 - Component configuration mechanism for rebooting: Aspects of the invention support a component configuration mechanism when rebooting a circuit module (201) of a programmable logic controller (101). A component (application) may be configured from a plurality of sources, including flash memory (204) and a web-based configuration source. The configuration mechanism avoids using invalid configuration data when... Agent: Schneider Electric / Square D Company Legal Dept. - I.p. Group (b&w)
20100169635 - Method and system to facilitate configuration of a hardware device in a platform: A method and system to allow the secure configuration of the configurable feature(s) of a hardware device in a platform. The configuration of the configurable feature(s) of the hardware device is performed with protection against software attacks. A management module determines that the platform is authorized to configure at least... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100169630 - Pre-boot recovery of a locked computer system: Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed.... Agent: Schwabe, Williamson & Wyatt, P.C.
20100169636 - System and method for a secure i/o interface: A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware from unauthorized access or attack. The security processor sends and receives all incoming and outgoing data packets for a host device and includes a packet engine, coupled... Agent: Davidson Berquist Jackson & Gowdey LLP
20100169634 - System and method for self-clocking os kernel boot: In some embodiments, the invention involves a system and method to enable a mobile device to utilize self-clocking during boot. In at least one embodiment, a platform has at least one processor core coupled to an internal timer. For an X86 processor, the internal timer may reside in an advanced... Agent: Intel Corporation C/o Cpa Global
20100169633 - System and method to secure boot both uefi and legacy option rom's with common policy engine: In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold... Agent: Intel Corporation C/o Cpa Global
20100169637 - Palette for real-time display of previously accessed documents: Palette for real-time display of previously accessed documents. At some of the illustrative embodiments are methods comprising rendering on a display a palette proximate to a window of a Web-Browser, the rendering by executing a software application by a processor, enabling a first mode of the palette, obtaining information pertaining... Agent: Conley Rose, P.C. David A. Rose
20100169638 - Communication system having message encryption: A system includes a communication device configured to transmit a message to an unsecured server. A secured server is in communication with the communication device, and is configured to receive the message from the communication device before the message is transmitted to the unsecured server, encrypt the message, and transmit... Agent: Verizon Patent Management Group
20100169639 - Method for managing a globally accessible operational data warehouse system with improved security and consumer response: A secure data exchange and access system, method, and architecture for allow web-based data transfer with improved security and scalability. The system incorporates and enables serialized pedigree systems while allowing security for storing, authenticating, and tracking a change of custody of a serialized item along a transfer chain. A plurality... Agent: Lackenbach Siegel, LLP
20100169640 - Method and system for enterprise network single-sign-on by a manageability engine: A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has successfully authenticated to the PC. The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key... Agent: Intel Corporation C/o Cpa Global
20100169641 - Trust authority supporting digital communication: A trust authority includes a network connected server executing trust service software stored in a machine-readable medium, one or more network ports for communicating on the network, and a data repository coupled to the server, the repository storing indications of trustworthiness for one or both of enterprises and agents of... Agent: Central Coast Patent Agency, Inc,- Alcatel Joint Number
20100169642 - Remote virtual medical diagnostic imaging viewer: A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and visualization purposes by users unconstrained by geography. Medical images and data are stored on one or more servers running application service provider software along with meta-data... Agent: Fish & Associates, PC Robert D. Fish
20100169643 - Proof verification system, proving device, verifying device, proof verification method, and program: The proof verification system of the present invention is composed of a proving device (100) and a verifying device (200). The proving device (100) holds m items of n items of secret data, and finds a plurality of Commit values from a portion of the plurality of elements of a... Agent: Scully Scott Murphy & Presser, PC
20100169644 - Message authentication code with elliptic polynomial hopping: The message authentication code with elliptic polynomial hopping provides methods for the generation of message authentication codes (MACs) utilizing elliptic curves, which are based on the elliptic curve discrete logarithm problem. The elliptic curve discrete logarithm problem is well known to be a computationally “difficult” or “hard” problem, thus providing... Agent: Litman Law Offices, Ltd.
20100169645 - Key transport in authentication or cryptography: A computer system for authenticating, encrypting, and transmitting a secret communication, where the encryption key is transmitted along with the encrypted message, is disclosed. In an embodiment, a first transmitting processor encrypts a plaintext message to a ciphertext message using a data key, encrypts the data key using a key... Agent: Hickman Palermo Truong & Becker, LLP
20100169646 - Secure and efficient domain key distribution for device registration: A domain key is securely distributed from a device in an existing network to a device outside the network. Each device generates the session key on its own using the first random number, the second random number, the Personal Identification Number, and the same key generation function. The device in... Agent: Motorola, Inc. Law Department
20100169648 - Communication terminal apparatus and information communication method: An information communication method performed by a communication terminal apparatus, the method including: sharing a first encryption key with a first server; receiving a request for sending identification information of the communication terminal apparatus; authenticating the first server based on certificate information of the first server that is acquired while... Agent: Patterson & Sheridan, L.L.P.
20100169647 - Data transmission: A method of and apparatus for transmitting data in systems such as computer networks, for example in client-server or peer-to-peer arrangements. Access to transmitted data received by a destination apparatus is limited by the provision of software code at the destination apparatus. The software code is arranged to produce a... Agent: Sutherland Asbill & Brennan LLP
20100169653 - Apparatus, method, and program for digital signature: A digital signature method to generate a signature for an electronic document, the method including: initializing a signature t of each of the document segments of electronic document and twice raising the signature t to the power of a hash value of each of the document segments and digitally signing... Agent: Fujitsu Management Services Of America, Inc.
20100169655 - Blocking of unlicensed audio content in video files on a video hosting website: A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content with licensed audio content. An audio replacement tool is provided that enables the... Agent: Google / Fenwick
20100169652 - Digital watermarking systems and methods: Systems and methods for protecting digital content using digital watermarks and for distributing that protected digital content are described. The digital watermark contains watermark information, fingerprint information, and any other information desired by the provider of the digital content. To insert the digital watermark in the digital content, a section... Agent: Kenneth E. Horton Kirton & Mcconkle
20100169651 - Electronically signing a document: An electronic signature device includes a processor, a memory, a user input device including a first biometric input device, and a device interface, all communicatively connected by at least one bus. A method of personalizing the electronic signature device to a user includes receiving a digitized biometric signature of the... Agent: Ip Strategies
20100169649 - Image encryption for print-and-scan channels using pixel position permutation: An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption... Agent: Pitney Bowes Inc.
20100169654 - Method for author verification and software authorization: Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a... Agent: Nvidia C/o Murabito, Hao & Barnes LLP
20100169650 - Storage minimization technique for direct anonymous attestation keys: A storage minimization technique for direct anonymous attestation (DAA) keys is presented. In one embodiment, the method includes deriving a random portion of a (DAA) private key from a device's fuse key, computing a point on an elliptical curve from the derived random portion and a master private key, and... Agent: Intel Corporation C/o Cpa Global
20100169656 - Group signature system, device, and program: A group signature system includes a group manager device, a signer device and a verifier device capable of communicating with each other, each device using a group signature scheme. The group manager device generates a group secret key, a group public key, a member secret key and a signer tracing... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100169658 - Elliptic curve-based message authentication code: The elliptic curve-based message authentication code is a computational method for improving the security of existing message authentication code (MAC) generating methods through the use of elliptic curve cryptography. Particularly, the message authentication codes and elliptic curve cryptography are based on an elliptic curve discrete logarithm problem, which is well... Agent: Litman Law Offices, Ltd.
20100169657 - Message authentication code with blind factorization and randomization: The message authentication code with blind factorization and randomization is a computational method for improving the security of existing Message Authentication Code (MAC) methods through the use of blind integer factorization. Further, blind randomization is used as a countermeasure to minimize collision attacks where different plaintexts produce the same MAC.... Agent: Litman Law Offices, Ltd.
20100169659 - Gaming console-specific user authentication: Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the capabilities of platforms other than conventional personal computers and laptops, such as gaming consoles and wireless devices. Unique intrinsic user activities, such as controller motions or activities,... Agent: Moore & Van Allen, PLLC For Bofa
20100169660 - Public key infrastructure-based first inserted subscriber identity module subsidy lock: A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using... Agent: Prass LLP
20100169665 - Method for indexing encrypted column: The present invention relates to a method of creating indexes so that an index scan can be worked for columns in a database encrypted by means of secrete key cipher algorithm. The method of creating indexes according to the present invention comprises the steps of: re-encrypting to be able to... Agent: The Farrell Law Firm, LLP
20100169664 - Security processor and recording method and medium for configuring the behaviour of this processor: Security processor (42) for a decoder able to receive a scrambled multimedia signal, this processor comprising:—at least one first rewritabie lock (FIELDKEY, FIELDPIEMM, FIELDPIEMMC, FIELDPIECM, FIELDFCT) whose value can be toggled between a first and a second predetermined value in response to an EMM or ECM message,—a restriction function able... Agent: Stites & Harbison PLLC
20100169661 - Simultaneous state-based cryptographic splitting in a secure storage appliance: Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the secure storage appliance, each I/O request associated with a block of data and a volume, each volume associated with a plurality of shares stored on... Agent: Unisys Corporation
20100169662 - Simultaneous state-based cryptographic splitting in a secure storage appliance: Methods and systems for managing data blocks and I/O requests are provided. One method is a method of managing data blocks in a secure storage appliance. The method includes receiving a block of data associated with a volume, the volume associated with a plurality of shares stored on a plurality... Agent: Unisys Corporation
20100169663 - Systems and methods for detecting authorized players: One embodiment includes method for determining whether a player application is authorized to play protected content. The method comprises reading a digital signature associated with the player application from a predetermined memory location using a protection interface associated with the player application, where the digital signature comprises one or more... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100169666 - Methods and systems to direclty render an image and correlate corresponding user input in a secuire memory domain: Methods and systems to assign an application and a video frame buffer to a protected memory domain to render an image of a keyboard from the protected memory domain to a random position of the video frame buffer and correlate user input from a pointing device to the rendered keyboard... Agent: Garrett Ip, LLC
20100169671 - Cryptoprocessor with improved data protection: The invention relates to an electronic circuit comprising: a first random-access data storage element, a processing module designed to delete the first storage element, and an access terminal which is connected to the processing module and receives a first power signal supplied by a first power source external to the... Agent: Vedder Price PC
20100169672 - Encryption program operation management system and program: According to one embodiment, an encryption program operation management system includes an encryption key table creation module which creates encryption keys and creates an encryption key table including encrypted versions of the encryption keys and items of plaintext index information for recognizing the encryption keys, and an installation package creation... Agent: Knobbe Martens Olson & Bear LLP
20100169669 - Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption: A method, system, and computer-readable storage medium containing instructions for controlling access to data stored on a plurality of storage devices associated with a first platform. The method includes authenticating a user to access the first platform, wherein the first platform includes first and second storage devices, chipset encryption hardware,... Agent: Intel Corporation C/o Cpa Global
20100169668 - Obtaining backups using a portable storage device: A backup site and a client are coupled to a network and the backup site obtains backup data for the client using a portable storage device by providing a direct coupling between the portable storage device and the backup site. The portable storage device contains full backup data for the... Agent: Muirhead And Saturnelli, LLC
20100169667 - Protecting content on client platforms: A method, computer system, and computer-readable medium with instructions to provide a client security management layer and a content player that ensure that the content is protected from malware on the receiving computer system. The client security management layer controls access to a protected portion of a memory of a... Agent: Intel Corporation C/o Cpa Global
20100169670 - System and method for encrypting and decrypting data: A system for encrypting and decrypting data being transmitted between a data processing device and a storage device is provided. The system includes a password storing unit, an input unit, an authentication unit, a read unit, a key generator, an encrypting unit, and a decrypting unit. The password storing unit... Agent: PCe Industry, Inc. Att. Steven Reiss
20100169673 - Efficient remapping engine utilization: A device, system, and method are disclosed. In one embodiment device includes remapping engine reallocation logic that is capable of monitoring a first amount of traffic that is translated by a first remapping engine. If the first amount of traffic reaches the threshold level of the first remapping engine, then... Agent: Intel Corporation C/o Cpa Global
20100169676 - Information processing apparatus and device control method: There is provided an information processing apparatus including an internal power source that supplies power, a power source information acquiring unit that acquires, from the internal power source, power source information relating to supply of the power in the internal power source, a drive status setting unit that determines power... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100169674 - Power-source control system and power-source control method: A power-source control system and method which calculates required power representing electric power to be supplied to an information processing apparatus, supplies electric power corresponding to the required power calculated, controls the power-source apparatus, generates frequency information representing an operating frequency to be determined by the frequency controller in accordance... Agent: Staas & Halsey LLP
20100169675 - Synchronizing circuit: A synchronizing circuit includes an internal partial power supply interruption circuit section which can be subjected to a power supply interruption and includes a data transmission register configured to output data for controlling a power supply interruption and a clock enable control register configured to output an enable signal; an... Agent: Turocy & Watson, LLP
20100169678 - Data storage device, method for controlling the same, and recording medium: A data storage device transmits, when shifting to a power-saving condition, identification information (file name, and pass information) of data to another data storage device of a standby condition present in a network, in order to shift to the power-saving condition. When there is no other data storage in the... Agent: Canon U.s.a. Inc. Intellectual Property Division
20100169677 - Remotely powering on-off network devices via a network interface device: In general, in one aspect, the disclosure describes a network interface device (NID) that can be remotely instructed to power-up powered-down network devices by generating magic packets that instruct the powered-down network device to power-up and to broadcast the magic packets to the network devices connected thereto. Utilizing the NID... Agent: Motorola, Inc. Law Department
20100169679 - Controlling multilevel shared resources in a computing device: A computing device is arranged to include a resource manager that controls access to all power resources on the device. The resource manager detects unused devices by counting the components that have requested usage and powers down unused resources, and for those resources offering multiple power levels, it guarantees that... Agent: Alston & Bird LLP
20100169680 - Distributed table-driven power mode computation for controlling optimal clock and voltage switching: A method for computing the optimal power mode for a system-on-chip (SoC) in which both the clock and Vdd settings are controlled. Information from hardware blocks is synthesized into a global power mode for the entire SoC. The clocks can be disabled or enabled, and Vdd voltages can be disabled,... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100169681 - Method and system for reducing power consumption of active web page content: A method and system for reducing power consumption of active web page content includes identifying those threads associated with active advertisement components of the web page and synchronizing the wakeup periods of such threads such that the total number of wakeups over a given period is reduced.... Agent: Barnes & Thornburg, LLP
20100169682 - Network apparatus: An apparatus includes a switching unit to output data input from an input unit to an output unit to which the data is to be output, and an input control unit, wherein input units included in a same group among a plurality of input units each have a buffer to... Agent: Staas & Halsey LLP
20100169684 - Downstream device service latency reporting for power management: For one disclosed embodiment, a transition from a first state to a second, different state for at least a portion of a downstream device may be identified. The first and second states may correspond to different levels relating to activity for at least a portion of the downstream device. Data... Agent: Intel Corporation C/o Cpa Global
20100169685 - Idle duration reporting for power management: For one disclosed embodiment, data corresponding to an idle duration for one or more downstream devices may be received. Power may be managed based at least in part on the received data. Other embodiments are also disclosed.... Agent: Intel Corporation C/o Cpa Global
20100169686 - Near field communication host controller interface: Provided is a communication interface between an NFCH and an NFC device and a method for controlling an NFC HCI. In the method, a command message is transmitted from the host to the device. The command message includes one of recording data, reading data of the device, requesting the device... Agent: Lee, Hong, Degerman, Kang & Waimey
20100169683 - Platform and processor power management: The present invention relates to platform power management.... Agent: Intel Corporation C/o Cpa Global
20100169687 - Data storage device and power-saving control method for data storage device: A data storage device includes a first nonvolatile memory, a second volatile memory that temporarily stores therein data to be transferred between a host device and the first memory, a first control unit that controls the second memory, a second control unit that controls data transfer between the first control... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100169688 - Disk array unit, and method and program for controlling power source in disk array unit: Intended is improvement in reliability of a disk array unit formed of a plurality of nodes at the time of start-up and stop. The disk array unit formed of a plurality of nodes, which includes a control unit which executes power source control of other node based on power source... Agent: Mr. Jackson Chen
20100169691 - Apparatus and method for determining operation mode of node in ad hoc network: Provided is a method of determining an operation mode of a node in an ad hoc network. The method includes: monitoring a measured amount of residual energy of the node and comparing the measured amount of residual energy of the node with an amount of residual energy theoretically calculated for... Agent: Ampacc Law Group
20100169692 - Mechanism for adaptively adjusting a direct current loadline in a multi-core processor: A central processing unit (CPU) is disclosed. The CPU includes two or more processing cores and a power control unit to regulate voltage applied to the CPU based upon the number of processing cores that are active.... Agent: Intel Corporation C/o Cpa Global
20100169689 - Method for auto power restoration: The present invention relates to an auto-restore method for a power device by using a computer device to build a detecting/responding packet in an Ethernet exchanger, and the Ethernet exchange can mutually transmit the packet with the power device. If the Ethernet exchanger fails to receive a responding packet from... Agent: Moxa Inc.
20100169690 - System power management using memory throttle signal: According to some embodiments, power information associated with a computing system may be monitored. Based on the monitored power information, it may be determined whether a hardware memory throttling signal will be asserted and/or that a processor power control signal will be asserted.... Agent: Buckley, Maschoff & Talwalkar LLC/ Intel Corporation
20100169693 - State history storage for synchronizing redundant processors: Embodiments of an invention for synchronizing redundant processors using state history are disclosed. In one embodiment, an apparatus includes two processors, state storage for each processor, and control logic. Each processor is to execute the same instructions. The state storage is to store compressed processor state information for each instruction... Agent: Intel Corporation C/o Cpa Global
20100169695 - Autonomous multi-device event synchronization and sequencing technique eliminating master and slave assignments: An apparatus and method for event synchronization. One or more devices that have a plurality of events to be carried out in a scheduled order in time are connected to a single shared time position clock (TPCLK). There are one or more sequencing controllers coupled with the one or more... Agent: Mcdermott Will & Emery LLP
20100169694 - Method for ensuring synchronous presentation of additional data with audio data: A recording medium, method and apparatus for managing data are discussed. According to an embodiment, the present invention provides a method of reproducing main data and additional data. The method includes receiving the additional data associated with the main data, the additional data being divided into a plurality of segment... Agent: Fish & Richardson P.C.
20100169696 - Processor system employing a signal acquisition managing device and signal acquisition managing device: A processor system having a processor core configured to control an external apparatus in accordance with a control algorithm; a signal acquisition managing device configured to receive state signals provided by the apparatus, perform corresponding actions, and generate corresponding synchronized command signals; and a peripheral module structured to receive the... Agent: Seed Intellectual Property Law Group PLLC
20100169697 - Control device having output pin expansion function and output pin expansion method: A control device having an output pin expansion function and an output pin expansion method thereof are provided. The method includes: connecting at least a shift register unit having a plurality of data transmission pins to a control unit such that the shift register unit can receive strobe signals, a... Agent: Baker, Donelson, Bearman, Caldwell & Berkowitz Intellectual Property Department
20100169698 - Recording medium control element, recording medium control circuit board, and recording medium control device: A recording medium control element includes: an input/output module configured to input/output a command and data to/from a recording medium; a first control module configured to control the input/output of the command and data performed by the input/output module; a buffer holding the data input/output to/from the input/output module; a... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100169699 - Memory device, host device, and sampling clock adjusting method: A memory card includes a memory controller configured to perform control for sending and receiving a command signal, a response signal, a data signal, and a status signal in synchronization with a clock signal, and a memory-side pattern signal storage unit configured to store a tuning pattern signal to be... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100169700 - Adaptive clock enable for memory control: In some embodiments a memory rank idle counter enables de-assertion of a clock enable signal of a rank of a memory for idle systems. Clock enable signal assertion is maintained when there is a lot of traffic to the memory rank. A memory rank idle time prediction counter transfers a... Agent: Intel Corporation C/o Cpa Global
20100169701 - Computer system capable of dynamically modulating operation voltage and frequency of cpu: A computer system capable of dynamically modulating an operation voltage and an operation frequency of a CPU comprises: a CPU from which a VID1 is outputted based on a real load of the CPU; a VID converting/comparing controller capable of determining to operate in an bypass mode or a calculation... Agent: Wpat, PC Intellectual Property Attorneys
20100169702 - Memory control apparatus, memory optimization program product, and memory optimization method: According to one embodiment, a memory control apparatus includes a generator configured to delay a clock signal having a rise and a fall that appear in a constant cycle and to generate a plurality of delay clock signals having delay times different from each other; an extractor configured to extract,... Agent: Knobbe Martens Olson & Bear LLPPrevious industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.42446 seconds