|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
09/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: support September class, title,number 09/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 09/30/2010 > patent applications in patent subcategories. class, title,number
20100250908 - Concurrent patching of operating systems: Replacing a computer program with a replacement version concurrently with its execution by a first instance of an operating system in a computer system, wherein a persistent memory area in the computer system is used to store selected data from the first instance. A snapshot image of a second instance... Agent: International Business Machines Corporation Richard Lau
20100250909 - Multiple configuration electronic thermometer: A plurality of custom thermometer models are manufactured from a universal clinical thermometer core. The thermometer core includes a housing, a controller storing a software program, a power source, a probe, a probe cord, and a display. A plurality of model selection devices are produced, each corresponding to a different... Agent: Tyco Healthcare - Edward S. Jarmolowicz
20100250907 - Systems and methods for providing configuration management services from a provisioning server: A provisioning server can perform configuration management services on target machines served by the provisioning server. The provisioning server can maintain a set of management templates. The set of management templates can be utilized to generate management configuration files for target machines. The management configuration files, generated from the management... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20100250910 - Computer system and setting management method: In a computer system including a server having a BIOS and a management module, the server includes therein a memory area and a server controller, and the management module includes therein a backup memory area and a management-module controller. When the BIOS changes the BIOS setting, the BIOS stores the... Agent: Antonelli, Terry, Stout & Kraus, LLP
20100250912 - Computing device deployment using mass storage device: Computing device deployment and configuration using a mass storage device is provided. A generic computing device is provided to a customer or end user. A mass storage device is used to distribute configuration information to the generic computing device. The configuration information includes customer-specified or ordered software applications or other... Agent: Mcdermott Will & Emery LLP
20100250911 - Sensor for use in automation technology and method for configuring a sensor: The present invention is directed to a sensor for use in automation technology for detecting a measurand, particularly for detecting objects or articles, and a method for configuring a sensor. The sensor includes: a sensor element for measuring a physical variable; a first connecting means for connecting the sensor to... Agent: Hoffman Warnick LLC
20100250915 - Adjusting system configuration for increased reliability based on margin: A system provides a mechanism for increasing reliability by allowing margins to be evaluated and if one or more margins of a current configuration are too small, system configuration is modified to increase the margin. A computing device determines through training a first operating point of at least one operational... Agent: Zagorin O'brien Graham LLP (1001)
20100250916 - Component firmware integration in distributed systems: A plurality of platforms may be defined in a distributed system. Each of the platforms may include a processor and a chipset from a common source on a single motherboard. Extensible firmware interface drivers are provided for the processors and the chipsets. Each of the platforms may be defined pursuant... Agent: Trop, Pruner & Hu, P.C.
20100250913 - Methods and systems for managing a voltage regulator: A method for increasing efficiency of a voltage regulator in an information handling system (IHS) is provided. The method may include enabling one or more operating phases associated with the voltage regulator and initializing a switch configuration having at least one high-side switch and at least one low-side switch. In... Agent: Garrana Tran LLP
20100250914 - Wake on lan for blade server: A computer implemented method, a tangible computer medium, and a data processing system are provided for waking a blade server from an operational state of reduced power. When server blade enters the state of reduced power, a service firmware configures a multi-port blade switch of the server blade to direct... Agent: Ibm Corp (ya) C/o Yee & Associates PC
20100250917 - Distribution system and method of distributing content files: A distribution system including, for connection over a network a plurality of client upload devices, each client upload device storing one or more chunks of a content file, a client download device configured to download from the client upload devices chunks of the content file stored by the respective client... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100250918 - Method and system for identifying an application type of encrypted traffic: The present relates to a method and a system for identifying an application type from encrypted traffic transported over an IP network. The method and system extract at least a portion of IP flow parameters from the encrypted traffic using at least one of specific target encryption types. Then, the... Agent: Bcf LLP
20100250919 - Methods and systems for secure distribution of subscription-based game software: A method for secure communications. At least one encryption key can be generated based on a pass-phrase that associates a unique identifier of a client system with a customer. Customer data encrypted with the at least one encryption key can be received such that the customer data is uniquely associated... Agent: Foley & Lardner LLP
20100250920 - Techniques for packet processing with removal of ip layer routing dependencies: Techniques for packet processing with removal of Internet Protocol (IP) layer routing dependencies are presented. Encrypted packets associated with network communications occurring via a VPN and IP tunnel are grabbed off the network stack before being processed by an IP layer of the network stack. Next, an IP header is... Agent: Schwegman, Lundberg & Woessner/novell
20100250921 - Authorizing a login request of a remote device: Exemplary systems and methods for managed authorization of a login request of a remote device are provided. A user of the remote device may be authorized to login by an authentication server before attempting to login. Upon receipt of a login request from the remote device, an authorization process is... Agent: Carr & Ferrell LLP
20100250922 - Method and system for propagating trust in an ad hoc wireless communication network: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the... Agent: Motorola, Inc
20100250923 - Communication apparatus: A communication apparatus includes: a first storage unit configured to store a plurality of addresses of a plurality of first communication apparatuses; an acquiring unit configured to acquire a self-public key; a specifying unit configured to specify an address of at least one of the plurality of first communication apparatuses... Agent: Scully, Scott, Murphy & Presser, P.C.
20100250924 - Communication apparatus: A communication apparatus includes: a first storage unit registering a plurality of addresses of a plurality of communication apparatuses; a command sending unit sending a first command for requesting a first public key, which corresponds to a first secret key of the first communication apparatus, to the address of the... Agent: Scully, Scott, Murphy & Presser, P.C.
20100250925 - Encrypted file delivery/reception system, electronic file encryption program, and encrypted file delivery/reception method: An encrypted file delivery/reception system comprises a first computer, a second computer, and a password management device connected to the first and second computers through a network. The first computer has means for encrypting an electronic file to create an encrypted file. The password management device has means for storing... Agent: Westerman, Hattori, Daniels & Adrian, LLP
20100250926 - Method of digital rights management about a compressed file: Provided is a method for digital rights management of a compressed file created by compressing one or more original files. The method include the steps of: generating right information on an encrypted compressed file during the encryption of the compressed file by a digital rights management server; checking the user... Agent: Gottlieb Rackman & Reisman PC
20100250927 - Interoperable systems and methods for peer-to-peer service orchestration: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100250933 - Communication apparatus: A communication apparatus including: a communication module configured to establish communication with a counterpart device and receive and transmit a content from and to the counterpart device; a storage configured to store the content; a first processor configured to perform decryption and encryption on the content using a first key... Agent: Knobbe Martens Olson & Bear LLP
20100250928 - Content data, transmitting apparatus, receiving apparatus and decoding method: A transmitting apparatus 100 comprises an initialization vector generating unit 110 for generating an initialization vector, an encryption unit 120 for initializing a stream encryption module using the generated initialization vector and performing stream encryption on stream data using the initialized stream encryption module, an encryption packet generating unit 130... Agent: Hogan Lovells US LLP
20100250934 - Content protection device and content protection method: According to one embodiment, a content protection device includes a writing module configured to write protection information into file management information item in order to protect a content which is specified to be protected, wherein the writing module is configured to write the protection information corresponding to sectors which stores... Agent: Knobbe Martens Olson & Bear LLP
20100250931 - Decryption of electronic communication in an electronic discovery enterprise system: Apparatus, methods and computer program products are described herein for automatically decrypting electronic communication that is harvested from custodians in an enterprise-wide electronic discovery system. Automatic decryption provides for electronic communication that is encrypted to be decrypted, even in instances in which the system is not provided the password and/or... Agent: Moore & Van Allen, PLLC For Bofa
20100250929 - Method and apparatus for email communication: According to a first aspect of the present invention there is provided a method of verifying to a recipient of an email that a sender of the email possesses a mobile telecommunications device associated with a specific telephone number. The method comprises at the sender, sending an identifier of the... Agent: Nixon & Vanderhye, PC
20100250930 - Method and apparatus for protecting the routing of data packets: A method and apparatus for protecting the routing of data packets in a packet data network. When a first end-host sends an address query to a DNS server system regarding a second end-host, the DNS server system responds by providing a destination parameter containing an encrypted destination address associated with... Agent: Ericsson Inc.
20100250932 - Method and apparatus for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture: A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting one or more faults into a simulated workflow, receiving a message in the simulated workflow having a data provenance wrapper, examining each... Agent: Prass LLP
20100250935 - Systems and methods for secure transaction management and electronic rights protection: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information.... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100250936 - Integrated circuit, encryption communication apparatus, encryption communication system, information processing method and encryption communication method: There is provided an integrated circuit includes an arithmetic circuit having input/output characteristics determined by element-specific physical characteristics; a storage unit having cipher text obtained by performing encryption processing on predetermined secret information using an output value output from the arithmetic circuit with respect to input of a predetermined value... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100250937 - Method and system for securely caching authentication elements: A system and method for authorizing a user to a plurality of secure servers. Each server is adapted to store user information. The secure server receives a request for access to one of the plurality of secure servers from a first user device from a user possessing an authorized account... Agent: Tomlinson & O'connell, P.C.
20100250940 - Data processor, relay transmitter, and data transmission system: A data processor is configured to perform wireless communication with a relay transmitter, store a first physical address for the relay transmitter on a storage unit, receive a second physical address for the relay transmitter from the relay transmitter after the data processor being turned on, determine whether the second... Agent: Scully, Scott, Murphy & Presser, P.C.
20100250938 - Distributed generation of mutual secrets: Embodiments provide methods, apparatuses, and systems for determining numbers that correspond to a collection of matching derivative numbers. The matching derivative numbers may be included in both a first plurality of derivative numbers selected by a first computing system, and in a second plurality of derivative numbers selected by a... Agent: Schwabe, Williamson & Wyatt, P.C.
20100250939 - System and method of handling encrypted backup data: By using a symmetric key to encrypt mobile device data before transmitting the data to a backup location in a backup operation, access to the data, at the backup location, may be restricted. To facilitate later decryption of the backed up mobile device data, the mobile device may also transmit... Agent: Ridout & Maybee LLP
20100250942 - System for enabling authenticated communication between entities: A system for enabling authenticated communication between a first entity and at least one other entity is provided. The system has a second entity and a processor. The first entity and the second entity share transport keys. The second entity has at least one variant key configured to be transported... Agent: Silverbrook Research Pty Ltd
20100250941 - Wapi unicast secret key negotiation method: A WAPI unicast secret key negotiation method includes the following steps: 1 a authenticator entity adds a message integrity code onto a unicast secret key negotiation request packet, and transmits it to a authentication supplicant entity; 2 after the authentication supplicant entity receives the unicast secret key negotiation request packet,... Agent: Harness, Dickey & Pierce, P.L.C
20100250944 - Information processing apparatus, authentication device, and recording medium: An information processing apparatus includes a first signing unit which digitally signs device information and environment information, a first generator which generates a first digital envelope as data including the signed device information and the signed environment information, a second signing unit which digitally signs biometric authentication information and the... Agent: Staas & Halsey LLP
20100250943 - Method for security in electronically fused encryption keys: A method for electronically fused encryption key security includes inserting a plurality of inverters between a bank of security fuses and a fuse sense logic module. The method also includes sensing an activated set of the bank of security fuses and the plurality of inverters. The method further includes comparing... Agent: Ibm Corporation (swp)
20100250945 - Privacy-enhanced e-passport authentication protocol: A passport authentication protocol provides for encryption of sensitive data such as biometric data and transfer of the encryption key from the passport to the authentication authority to permit comparison to a reference value.... Agent: Blake, Cassels & Graydon LLP
20100250946 - Ad hoc distribution: Systems and methods for developing an application for a data processing device using a portal, such as a world wide web portal. In one exemplary method, an application signing certificate is generated using the portal, and the portal designates the data processing device using a unique device identifier. A unique... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20100250948 - System and method for checking digital certificate status: A method for handling digital certificate status requests between a client system and a proxy system is provided. The method includes the steps of receiving at the proxy system digital certificate status request data transmitted from the client system and generating query data for the digital certificate status in response... Agent: Jones Day (rim) - 2n
20100250947 - System and method of preventing spam by using pay-charge-contribution and authentication means: A system for preventing junk mails includes a sender email server (2-1), a recipient email server (2-2), a user terminal (3) for communicating email (4) through the sender email server (2-1) and the recipient email server 2-2, an internet communication network (6) for forwarding the email (4), and a digital... Agent: Carlson, Gaskey & Olds, P.C.
20100250952 - two-way access authentication method: A two-way access authentication method comprises: According to the system parameters pre-established by the third entity, the first entity sends the access authentication request packet to the second entity, then the second entity validates whether the signature of first entity is correct, and if yes, the share master key of... Agent: Harness, Dickey & Pierce, P.L.C
20100250951 - Common key setting method, relay apparatus, and program: A secret key of a second apparatus is stored in a relay apparatus. A first apparatus specifies secret information used to identify a common key, generates encrypted secret information by encrypting the secret information by using a public key of the second apparatus, and transmits the encrypted secret information to... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100250950 - Communication apparatus: A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the received electronic mail; a printing unit printing the received electronic mail if a verification result of the first verification is positive; a deletion... Agent: Scully, Scott, Murphy & Presser, P.C.
20100250949 - Generation, requesting, and/or reception, at least in part, of token: An embodiment may include circuitry to at least one of generate at least in part, receive at least in part, and request at least in part, a token. The token may identify, at least in part, a device to an entity. The token, as received by the entity, may be... Agent: The Law Offices Of Christopher K. Gagne C/o Cpa Global
20100250953 - System and method for generating a signature: The present invention provides a system and a method for generating digital signatures. The system comprises a first formula which generates the signature as selected series from at least two, but preferably more digitized biometric features of a user. The signature comprises a different selected series per unit of time... Agent: Troutman Sanders LLP 5200 Bank Of America Plaza
20100250954 - Website login processing method and apparatus: Disclosed is a website login processing method and apparatus. If a user tries to log in a website, a plurality of user information that are stored in a user computer are visually displayed to the user, such that the user selects one of the plurality of user information. A login... Agent: Ampacc Law Group
20100250955 - Brokered information sharing system: A brokered information sharing system including a primary broker configured with software to store cards of a principal, to transmit the cards when requested by the principal, to authenticate the principal, and to provide a master authentication of the principal to at least one issuing party. A selector is used... Agent: Iandiorio Teska & Coleman
20100250956 - Method and system for facilitating data access and management on a secure token: A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is provided in the smart card which allows data stored thereon to be shared by multiple parties. Access to data stored on the smart card... Agent: Townsend And Townsend Crew LLP
20100250957 - Method of authenticating a user on a network: A method of controlling access to electronic information is provided. The method requires the use of a portable token adapted to read and verify a user's biometric data in order to view encrypted files or data fields. If the proper biometric data is entered into the token, the user is... Agent: Smith Hopen, Pa
20100250960 - Apparatus, network system, method, and computer program for enabling functions of a plurality of devices: An apparatus includes a plurality of devices and is configured to enable a specified function of a first device among the plurality of devices in response to a first license key distributed by a licenser. The apparatus includes a key input unit and a key generation unit. The key input... Agent: GlobalIPCounselors, LLP
20100250961 - Control device: A control device performs reading of data from a recording medium or writing of data into the recording medium. The control device includes a plurality of processing sections for performing at least any one of encrypting and decrypting processes, a plurality of interface sections serving as an interface to the... Agent: Mcdermott Will & Emery LLP
20100250962 - Electronic token comprising several microprocessors and method of managing command execution on several microprocessors: The invention is a method of managing application (AP) execution in an electronic token (ET) comprising at least a first and a second microprocessors (MP1, MP2). One of the microprocessor is the master microprocessor when it has responsibility for application (AP) execution. Said method comprises the step of: selecting (E1)... Agent: Buchanan, Ingersoll & Rooney PC
20100250958 - Encrypted data management in database management systems: The subject matter herein relates to database management systems and, more particularly, encrypted data management in database management systems. Various embodiments provide systems, methods, and software to maintain database tables, some of which are encrypted. Some embodiments include holding clear text in cache and servicing queries from the cache. When... Agent: James M. Stover Teradata Corporation
20100250963 - External storage device, as well as method, program and information processing apparatus for processing data stored in external storage device: An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data is exchanged with an information processing apparatus; a first storage region where data associated with first and second validity periods is stored; and a second storage region where... Agent: Ibm Corporation
20100250959 - Security for storage devices: The invention broadly contemplates a security solution for storage devices that is inexpensive and robust. The invention allows a store of system specific data to be used to release the hard disk key of full-disk encryption (FDE) drives. This system specific data is passed to the FDE drives and used... Agent: Ference & Associates LLC
20100250965 - Apparatus and method for implementing instruction support for the advanced encryption standard (aes) algorithm: A processor including instruction support for implementing the Advanced Encryption Standard (AES) block cipher algorithm may issue, for execution, programmer-selectable instructions from a defined instruction set architecture (ISA). The processor may include a cryptographic unit that may receive instructions for execution. The instructions include one or more AES instructions defined... Agent: Mhkkg/oracle (sun)
20100250964 - Apparatus and method for implementing instruction support for the camellia cipher algorithm: A processor including instruction support for implementing the Camellia block cipher algorithm may issue, for execution, programmer-selectable instructions from a defined instruction set architecture (ISA). The processor may include a cryptographic unit that may receive instructions for execution. The instructions include one or more Camellia instructions defined within the ISA.... Agent: Mhkkg/oracle (sun)
20100250966 - Processor and method for implementing instruction support for hash algorithms: A processor including instruction support for implementing hash algorithms may issue, for execution, programmer-selectable hash instructions from a defined instruction set architecture (ISA). The processor may include a cryptographic unit that may receive instructions for execution. The instructions include hash instructions defined within the ISA. In addition, the hash instructions... Agent: Mhkkg/oracle (sun)
20100250967 - Semiconductor integrated circuit and control, method of the same: There is provided a semiconductor integrated circuit including a scan path circuit, which includes an encryption data storage unit that stores a secret key B created by encrypting a chip ID with use of a secret key A, and an encryption circuit that encrypts output data of the scan path... Agent: Mcginn Intellectual Property Law Group, PLLC
20100250968 - Device for data security using user selectable one-time pad: Devices for securing data and method of managing a one-time pad stored in nonvolatile memory of a device. In one embodiment, the device for securing data includes: (1) a nonvolatile memory, (2) a nonvolatile memory controller coupled to the nonvolatile memory and configured to cooperate with the nonvolatile memory to... Agent: Hitt Gaines P.C.
20100250969 - Privacy-enhanced searches using encryption: Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption... Agent: At & T- Legal Department - Brendzel
20100250970 - Storage device: The storage device used in connection with an information processing apparatus is provided. The storage device includes: an authentication storage area storing an authentication program in advance, wherein the authentication program is executed to authenticate whether each user operating the information processing apparatus is an approved user; an operating system... Agent: Beyer Law Group LLP
20100250971 - Printer consumable comprising integrated circuit protected from power supply attacks: A printer consumable includes an integrated circuit for authentication of the consumable. The integrated circuit has a non-volatile memory for storing secret information and an indicator, as well as a detection unit for preventing a power supply attack on the secret information. The detection unit includes a comparator having reference... Agent: Silverbrook Research Pty Ltd
20100250977 - Computer system: The invention discloses a compute system which may detect the state of a power supply. The system includes a power supply and a motherboard. The power supply has a detecting unit for detecting a power state of the power supply. The detected information is converted to a high-frequency signal and... Agent: Jianq Chyun Intellectual Property Office
20100250978 - Information processing apparatus, method for controlling the same, and storage medium: An apparatus determines, when receiving a packet transited via a network in a power saving mode, whether or not the packet is a packet according to a predetermined protocol. If the packet is determined to be the packet according to a predetermined protocol, the apparatus analyzes the data of a... Agent: Canon U.s.a. Inc. Intellectual Property Division
20100250973 - Methods and systems for initiating power to an information handling system: An information handling system (IHS) is disclosed providing a power supply operable to provide an output current to the IHS during power initiation. The IHS may also include a first power component associated with a first power stage wherein the first power stage may have a first current threshold. Furthermore,... Agent: Garrana Tran LLP
20100250976 - Motherboard capable of playing image or video in power-off state: A motherboard which can play an image or a video in a power-off state is disclosed. The motherboard includes a circuit board, a north bridge chipset, a digital photo frame chipset, and a switch unit. The north bridge chipset, the digital photo frame chipset, and the switch unit are disposed... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100250974 - Power supply management integrated circuit: A power management integrated circuit comprises a plurality of power source circuits power received at a power supply input terminal to supply power to a plurality of power supply output terminals. A plurality of power source circuits is coupled between the power supply input terminal and the respective power supply... Agent: Docket Clerk
20100250972 - Reversible power transitions in a computing device: A computing device which if in the process of powering down either to total shutdown or to a standby mode to have this process interrupted by a user request or an external event, in which case the device is able to reverse the power down process and resume full operation,... Agent: Alston & Bird LLP
20100250975 - System and method of providing scalable computing between a portable computing device and a portable computing device docking station: A method of managing processor cores within a portable computing device (PCD) is disclosed and may include determining whether the PCD is docked with a PCD docking station when the PCD is powered on and energizing a first processor core when the PCD is not docked with the PCD docking... Agent: Qualcomm Incorporated
20100250979 - Command processing apparatus: A digital camera is provided with: a sub CPU started irrespective of a state of an SW group; and a main CPU and an HDMI-CPU which are started when the SW group is in an on state while stopped when the SW group is in an off state. The sub... Agent: Novak Druce + Quigg LLP
20100250982 - Conserving power in a platform supporting network interfaces: A computer system may comprise a platform in which a processing block may be provisioned. The processing block may determine an optimal compression ratio such that the optimal compression ratio may cause a minimum of a total power to be consumed by the computer platform. The total power may comprise... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100250981 - Dynamic memory voltage scaling for power management: In the context of computer systems, the present invention broadly contemplates the ability to dynamically adjust the voltage and frequency of DRAM memory modules that are dual-voltage tolerant based on system performance. The invention allows a computer system to dynamically scale the memory voltage between a lower and a higher... Agent: Ference & Associates LLC
20100250984 - Electronic device and power saving method thereof: The present invention discloses an electronic device and power saving method thereof. In an embodiment, when the electronic device operates in a power-saving mode, which means an area on a screen of the electronic device is not a currently in-focus window-based interface, the area is adjusted to have reduced backlight... Agent: Jianq Chyun Intellectual Property Office
20100250980 - Methods for reducing power consumption and devices using the same: A method for reducing power consumption of a device with an embedded memory module is provided. The device includes comprises a processor, an embedded memory module, a software module, a power supplying unit, and an auxiliary logic. The embedded memory module is accessed by the processor and partitioned into a... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100250983 - Power saving control system: A power saving control system includes a power supply, a voltage conversion unit, an electrical switch, a control chip having a general programmable input output (GPIO) pin and a basic input system (BIOS) chip. The power supply is configured for supplying a voltage. The voltage conversion unit is connected to... Agent: Altis Law Group, Inc. Attn: Steven Reiss
20100250985 - Body heat sensing control apparatus and method: Embodiments of the disclosed invention include a body heat sensing control apparatus and method for automating features of an electronic device based on detection of a user's body heat. For example, in one embodiment, a data processing system is disclosed having a heat sensing mechanism for detecting the body heat... Agent: Sonnenschein Nath & Rosenthal LLP
20100250989 - Method and apparatus for a computing system having an active sleep mode cpu that uses the cache of a normal active mode cpu: A method is described that involves storing active sleep mode software instructions to be executed by a low end central processing unit into an on chip cache that caches normal active mode software instructions executed by a high end central processing unit. The active sleep mode software instructions are to... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100250986 - Method and device for improving battery life of a mobile computing device: A method (150) and device (200) adapted to run an application in synchronous communication with an application server is described. The method (150) can include the steps of: detecting (155) motion in proximity to the mobile computing device; and adjusting (160) a synchronization interval between the mobile computing device and... Agent: Motorola Inc
20100250987 - Processing device: A processing device may comprise a first controlling unit, a second controlling unit, a first memory and a second memory. The second memory may be set to a normal operation mode in a case where the first controlling unit is in the non-sleeping state, and may be set to a... Agent: Banner & Witcoff, Ltd. Attorneys For Client No. 016689
20100250988 - Video display system, display device, plug-in module and power control method of plug-in module: It provides a video display system capable of effective control of power consumption, safe power-off operation, and resetting from a hang-up state by properly setting power supply to a plug-in module in accordance with the operational request and operational status of a digital broadcast receiving device and the plug-in module,... Agent: Ratnerprestia
20100250990 - Electronic device, and method of controlling the electronic device: An electronic device including an external-memory-medium installing portion in which an external memory medium storing contents data, a display portion for displaying the contents data, a sound generating portion for generating a sound, a power-shut-down-requirement receiving portion for receiving a requirement for shutting-down a power supply to the electronic device,... Agent: Baker Botts LLP C/o Intellectual Property Department
20100250991 - Variable power systems for computers: Arrangements which provide a degree of flexible power allocation among multiple power rails in computer systems, in a manner to permit the sharing and exchange of power across multiple rails. The rails involved in such sharing could be of similar or dissimilar voltage. By way of an advantageous refinement, a... Agent: Ference & Associates LLC
20100250993 - High speed power supply system: A power supply system includes a high-speed power supply providing a first output, operating in conjunction with an externally supplied DC source or low frequency power supply which provides a second output. A frequency blocking power combiner circuit combines the first and second outputs to generate a third output in... Agent: Fenwick & West LLP
20100250992 - Method to lower the operating cost of wireless network by enforcing low power infrastructure operation: A system and techniques for managing power utilization in a wireless local area network are disclosed. The system can utilize an infrastructure power management module that is configured to identify and power down one or more unused wireless devices and/or dynamically reconfigure the wireless operation of one or more wireless... Agent: Motorola, Inc.
20100250994 - Data pattern detecting circuit and output driver including the same: Disclosed is an output driver capable of solving problems that occur when outputting the same data successively by using a data pattern detecting circuit. The data pattern detecting circuit includes a first data storage unit configured to receive data of a first line and store the received data until a... Agent: Ip & T Law Firm PLC
20100250995 - Split delay-line oscillator for secure data transmission: A split delay-line oscillator for secure data transmission is disclosed. In one embodiment, an apparatus for a split delay-line oscillator for secure data transmission includes a first modulator/demodulator block in a first device, the first modulator/demodulator block operable to insert a first variable delay to modulate a frequency of a... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100250997 - Integrated circuit having frequency dependent noise avoidance: An integrated circuit includes first, second and third circuits, a clock module and a rate adapting module. The first circuit causes frequency dependent noise and is clocked based on a clock signal. The second circuit is rate dependent and is clocked based on an operation dependent clock signal. The third... Agent: Garlick Harrison & Markison
20100250996 - Preventing hangs in a system with synchronized operation using stalls: This invention is a method of operating a system having multiple finite state machines where each finite state machine generating a ready signal when its operation is complete. This invention selects a set of the finite state machines to participate in an operation. If one or more of the finite... Agent: Texas Instruments Incorporated
20100250998 - Methods and apparatuses for controlling thread contention: An apparatus comprises a plurality of cores and a controller coupled to the cores. The controller is to lower an operating point of a first core if a first number based on processor clock cycles per instruction (CPI) associated with a second core is higher than a first threshold. The... Agent: Blakely, Sokoloff, Taylor & Zafman LLP
20100250999 - Switching among applications according to date-and-time of schedule item: An approach for switching from one application to another, according to time information of a schedule item and including converting data of the first application to data suitable for use in the other application, is provided.... Agent: Cooper & Dunham, LLP09/23/2010 > patent applications in patent subcategories. class, title,number
20100241836 - Remote configuration of computing platforms: An embodiment of the invention relates to a computing platform (10) having an attribute (241) that is configurable by a remote system (350), the computing platform (10) storing a first verifier (332) for verifying that a message is from a trusted remote source (360) and being operable to: acquire a... Agent: Hewlett-packard Company Intellectual Property Administration
20100241837 - Computer with bootable restoration: A bootable restoration computer includes: at least one mass storage device; at least two mass storage device partitions in the at least one mass storage device, including first and second partitions; a partition image restoration program; at least one partition image; at least one human interface device; a primary operating... Agent: James A. Concorso
20100241838 - Method and system for firmware updates:
20100241840 - System and method for resource assignment: A resource assignment system includes a driver on an option ROM mounted on a PCI (Peripheral Components Interconnect) device, arranged on a memory by a BIOS (Basic Input/Output System), and configured to perform hardware resources assignment under a Pre-Boot environment; and an OS driver arranged on the memory by the... Agent: Mr. Jackson Chen
20100241841 - System and method for securing executable code: A system and method for the secure storage of executable code and the secure movement of such code from memory to a processor. The method includes the storage of an encrypted version of the code. The code is then decrypted and decompressed as necessary, before re-encryption in storage. The re-encrypted... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100241842 - Method for command line interface restore points with support for an atomic sets of commands: The present invention introduces methods for controlling and configuring systems using a new command line interface (CLI) command. The CLI command allows a user to set a save point or a restore point of the configuration (e.g., setsavepoint). After the CLI command is executed, the user can continue issuing configuration... Agent: Connolly Bove Lodge & Hutz LLP
20100241843 - Server system, security improving method of server and computer program of the same: A server system is provided in which it is possible to avoid an improper operation or malicious operation on, for example, a power switch of a server. In such a system, both a management server and multiple servers are connected to a network. Each multiple server includes: an authentication key... Agent: Mr. Jackson Chen
20100241845 - Method and system for the confidential recording, management and distribution of meetings by means of multiple electronic devices with remote storage: A specific method is provided for recording, management and confidential distribution of meetings by means of multiple electronic devices, fitted with at least one microphone, mainly a mobile phone, an electronic agenda, or laptop. The method includes recording the meeting, sending this recorded data to the remote server, audio track... Agent: Klauber & Jackson
20100241846 - System and method for establishing a virtual private network: A system and method for establishing a virtual private network (VPN) between a client and a private data communication network. An encrypted data communication session, such as a—Secure Sockets Layer (SSL) data communication session, is established between a gateway and the client over a public data communication network. The gateway... Agent: Choate, Hall & Stewart / Citrix Systems, Inc.
20100241847 - Encrypted email based upon trusted overlays: Sending and receiving encrypted emails. At a web browser, user input is received requesting a compose email page user interface for a web-based email system. The compose email page user interface is requested from a server for the web-based mail system. Web page code is received from the server for... Agent: Workman Nydegger 1000 Eagle Gate Tower
20100241849 - Interoperable systems and methods for peer-to-peer service orchestration: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100241848 - System and method for securely communicating with electronic meters: An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa... Agent: Blake, Cassels & Graydon LLP
20100241850 - Handheld multiple role electronic authenticator and its service system: The present invention provides a handheld electronic authenticator and its service system that provide multiple dynamic authentication codes for authenticating with multiple service providers. The authenticator provides multiple dynamic authentication codes (e.g., including electronic signatures) for the multiple service providers, using an algorithm, secret key and dynamic variables chosen and... Agent: Scully Scott Murphy & Presser, PC
20100241852 - Methods for producing products with certificates and keys: The embodiments described herein provide methods for producing products with certificates and keys. In one embodiment, a requesting entity transmits a request for a plurality of certificates and corresponding keys to a certifying entity that generates the certificates and corresponding keys. The request preferably includes information for use by the... Agent: Brinks Hofer Gilson & Lione/sandisk
20100241851 - System and method for validating certificate issuance notification messages: To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification... Agent: Ridout & Maybee LLP
20100241857 - Authentication method, authentication system, in-vehicle device, and authentication apparatus: An authentication system is configured such that: an in-vehicle device generates an authentication key, and displays on a display unit, a two-dimensional code including the generated authentication key and a URL indicating a predetermined WEB page on a network; and a portable terminal device acquires the authentication key and the... Agent: Wenderoth, Lind & Ponack, L.L.P.
20100241856 - Communication devices and methods: A communication device, method and network are provided. The communication method comprises generating a first registration packet including first bio data, sending the first registration packet to a network, generating a content packet having second bio data and content data and sending the content packet to the network. The other... Agent: Workman Nydegger 1000 Eagle Gate Tower
20100241854 - Method and apparatus for low-power ap-assisted fast wireless roaming using optimized neighbor graphs: An embodiment of the present invention provides a method, comprising using optimized neighbor graphs for low-power access point assisted fast wireless roaming by a wireless station (STA) operating in a wireless network.... Agent: Intel Corporation C/o Cpa Global
20100241853 - System and method for generating a plaintext / cyphertext database for use in device authentication: Plaintext/cyphertext pairs are generated for use in authenticating a device. The device performs a secure authentication algorithm on a secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device... Agent: Kyocera International Inc. Intellectual Propery Department
20100241855 - Systems and methods for secure execution of code using a hardware protection module: Systems and methods for securely executing digital rights management software comprising content code are described. One method comprises receiving encrypted multimedia content and content code from a storage medium by a host processor, wherein the content code provides restricted content distribution by examining an environment in which a player application... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100241858 - Downloadable conditional access system, secure micro, and transport processor, and security authentication method using the same: A downloadable conditional access system (DCAS), a secure micro (SM), and a transport processor (TP), and a security authentication method using the same are provided. The DCAS provides a safe security environment through a security protocol which enables mutual authentication and secure channel establishment between the SM and the TP.... Agent: Rabin & Berdo, PC
20100241861 - Dhcp client server system, dhcp client device and dhcp server device: A conventional DHCP authentication method could not cope with a one-phase two-messages DHCP sequence involved in a Rapid-Commit option. Further, in the conventional DHCP authentication method, it is possible to replay attack at lease renewal timing and, when information used in a retransmission method between a client and a server... Agent: Juan Carlos A. Marquez C/o Stites & Harbison PLLC
20100241860 - Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device: In a key-insulated cryptosystem according to the present invention, a plurality of external devices are associated with a number of updates of a terminal secret key which has already been updated, and a different piece of secret information is stored in each of the external devices. In addition, a key-updating... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100241859 - Mode of information transmission and complex protection: The unified signal structure of stochastic q-ary (n, k, q, m)-code is used on the basis of any initial binary (n, k)-code with l-interleaving (q=2l) with m-fold repetition of blocks of the code (m=1, 2, . . . , mmax) with identical values of the data portion. Direct randomization of... Agent: Daniel N. Smith
20100241862 - Multidimensional identification, authentication, authorization and key distribution system for patient monitoring: A method, wireless system and a wireless device are described. The method, system and device provide multidimensional identification, authentication, authorization and key distribution providing secure communications at a deepest common security domain.... Agent: Philips Intellectual Property & Standards
20100241863 - Device for reproducing digital content, secure electronic entity, system comprising said elements and method for reproducing digital content: The invention concerns a method for reproducing digital content including the following steps: receiving (E222) an identifier (Id′) of the digital content from a secure electronic entity; extracting (E226) a digital watermark of the digital content; controlling (E232) the reproduction of the content based on a comparison between the extracted... Agent: Young & Thompson
20100241864 - Authenticating an integrated circuit based on stored information: Exemplary embodiments provide methods and systems of authenticating an integrated circuit (IC). The manufacturing location of an IC is authenticated by storing in the IC a local signature derived from a GPS signal that was received at the manufacturing location at the time of manufacture. A remote signature is derived... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100241865 - One-time password system capable of defending against phishing attacks: A one-time password system capable of defending against on-line phishing attacks. The one-time password system is composed mainly of a Java smart card, a pre-end password calculation module, a post-end password registration module, a post-end password verification module and a post-end database. In the system, a Java smart card is... Agent: Schmeiser Olsen & Watts
20100241866 - Computer system and method for storing data: A method is provided for generating a first key to encode and/or decode data and a first pointer, with said data stored and/or storable on a first data processing system in a memory area identified by said first pointer, comprising the following steps: recursive generating of said first key from... Agent: Gibson & Dernier LLP
20100241867 - System and method for encrypted smart card pin entry: A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by... Agent: Dimock Stratton LLP/research In Motion Limited
20100241868 - Method and apparatus for storing, managing, and securing personal information: Some embodiments of the invention work in conjunction with a portable device, which when attached to a computing device invokes operations for storing personal information on the portable device, retrieving personal information from the portable device, encrypting personal information on the portable device, and decrypting information from the portable device.... Agent: Sheppard, Mullin, Richter & Hampton LLP
20100241870 - Control device, storage device, data leakage preventing method: According to one embodiment, a control device controls a storage device configured to encrypt data based on an encryption key, store the data in a storage region, and decrypt the data stored in the storage region based on the encryption key. The control device includes an information generator and an... Agent: Knobbe Martens Olson & Bear LLP
20100241869 - Encryption by pixel property separation: A method of encrypting a digital file composed of a sequence of bytes, each byte defined by a relative position within the digital file and a value, the method comprising: using an encryption key to encode the relative position separately from the value of each byte; and producing an encrypted... Agent: Dla Piper LLP (us)
20100241871 - Method and apparatus for establishing usage rights for digital content to be created in the future: Usage rights for a digital work are established prior to creation of the corresponding content. The rights can be associated with the content after the content is created. A content creation, such as a video recorder or a still camera, device can store labels of the rights and can associate... Agent: Nixon Peabody, LLP
20100241872 - Partially reversible key obfuscation: Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is performed that encrypts a value stored in a first memory location using a value stored in the second memory location to produce an encrypted value and the... Agent: Merchant & Gould Scientific Atlanta, A Cisco Company
20100241873 - Installation of application package packaging plural applications: An application packaging device is provided, which comprises a decryption component configured to decrypt each of a plurality of applications, a replication component configured to replicate an end user license agreement included in each of the plurality of decrypted applications, and a component configured to package respective replicas of the... Agent: Fitzpatrick Cella Harper & Scinto
20100241875 - External storage device and method of controlling the same: The external storage device has a read-only section and a read/write enabled section in a storage section. In the read-only section there is stored an antivirus software detection program adapted to detect the presence of antivirus software installed on a host computer. When the external storage device is connected to... Agent: Beyer Law Group LLP
20100241874 - Method and apparatus to scramble data stored in memories accessed by microprocessors: A scrambler/descrambler module included in an integrated circuit device is operable for receiving a scrambling key and constant data that is unique to the integrated circuit device. The scrambler/descrambler module includes a first layer or circuit arrangement that uses a scrambling key to generate first scrambled data. The scrambler/descrambler module... Agent: Fish & Richardson P.C.
20100241877 - Ic card with parallel accessed memory blocks: Disclosed is an integrated circuit card which includes a central processing unit (CPU); a first memory block and a second memory block configured to operate responsive to a control of the CPU; and a high voltage generator block configured to generate a high voltage to be supplied to the first... Agent: Volentine & Whitt PLLC
20100241876 - Motherboard capable of detecting consumed power and detection method thereof: A motherboard capable of detecting consumed power and a method for detecting consumed power thereof are provided. The motherboard includes a VCC layer, a plurality of resistance elements, and a detecting module. A plurality of power traces are laid at the VCC layer, and each of the power traces conducts... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100241879 - Processor and switching power supply apparatus: A processor includes analog signal input ports, an A/D conversion unit, and an ALU in a stage subsequent to the A/D conversion unit, separately from a CPU. The ALU not only stores a comparison result in a RAM independently of the CPU, but also compares an output value of the... Agent: Murata Manufacturing Company, Ltd. C/o Keating & Bennett, LLP
20100241878 - System and method for mirroring power over ethernet registers in a physical layer device over a single isolation boundary: A system and method for mirroring power over Ethernet (PoE) registers in physical layer devices (PHYs) over a single isolation boundary. PHYs in a PoE system can be arranged in a master/slave configuration. In this configuration, a master PHY can be designed to communicate with the power source equipment controllers... Agent: Law Office Of Duane S. Kobayashi
20100241880 - Negotiating a transmit wake time: Includes receiving, from a link partner, a message specifying a link partner receive wake time and resolving to the lesser of the received link partner receive wake time and a local transmit wake time.... Agent: Intel Corporation C/o Cpa Global
20100241881 - Environment based node selection for work scheduling in a parallel computing system: A method, apparatus, and program product manage scheduling of a plurality of jobs in a parallel computing system of the type that includes a plurality of computing nodes and is disposed in a data center. The plurality of jobs are scheduled for execution on a group of computing nodes from... Agent: Wood, Herron & Evans, L.L.P. (ibm)
20100241882 - System and method for tunneling control over a mac/phy interface for legacy asic support: A system and method for tunneling control over a MAC/PHY interface for legacy ASIC support. Energy efficient Ethernet control or status information can be communicated over a MAC/PHY interface using control codes that are embedded in sequence ordered sets. These sequence ordered sets would not affect the data flow and... Agent: Law Office Of Duane S. Kobayashi
20100241883 - Method for controlling power consumption of a usb mass storage, associated personal computer, and storage medium storing an associated usb mass storage driver: A method for controlling power consumption of a Universal Serial Bus (USB) Mass Storage is provided. The USB Mass Storage is electrically connected to a USB port. The method includes: monitoring at least one Test Unit Ready (TUR) command from an operating system (OS) to the USB Mass Storage; and... Agent: North America Intellectual Property Corporation
20100241885 - Method, system and apparatus for controlling power consumption of embedded system: Embodiments of the present disclosure disclose a method for controlling power consumption of an embedded system. The method obtains a data transmission index that is between a bus module and a bus, compares the obtained data transmission index with a preset numeric value range, and adjusts an operation frequency or... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20100241884 - Power adjustment based on completion times in a parallel computing system: A method, apparatus, and program product optimize power consumption in a parallel computing system that includes a plurality of computing nodes by selectively throttling performance of selected nodes to effectively slow down the completion of quicker executing parts of a workload of the computing system when those parts are dependent... Agent: Wood, Herron & Evans, L.L.P. (ibm)
20100241886 - Method and system of halting content delivery based on non-detection of user input: An approach is provided for determining if video content provided to a device is still being viewed, without disrupting the presentation of the content. A device is monitored for input from the user, wherein the device is configured to present content to the user. A determination is made whether the... Agent: Verizon Patent Management Group
20100241887 - Touch display system and control method thereof: A control method is applied to a touch display system. The touch display system includes a display module, a touch module, and a programmable circuit. The programmable circuit is electrically connected between the touch module and the display module for executing the control method. The method includes: the touch module... Agent: Bacon & Thomas, PLLC
20100241888 - Information processing apparatus and power-saving setting method: According to one embodiment, an information processing apparatus having a power-saving function includes a monitoring module and a power-saving setting presenting module. The monitoring module monitors a usage pattern of the information processing apparatus, and stores log information indicative of the usage pattern in a storage device. The power-saving setting... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100241889 - Power management system and method: In one embodiment, provided is a method that includes detecting disconnect of a link at a Universal Serial Bus (USB) device coupled to a USB host via a USB bus, disconnecting the USB device from the USB bus, and modifying a power state of the USB device to a reduced... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20100241890 - Power management methods and systems using an external power supply: A method for managing power to an information handling system (IHS) is disclosed wherein the method includes providing a battery and an external power supply operable to supply power to the IHS. The method also includes providing an application programming interface (API) to the IHS, wherein the API is configured... Agent: Garrana Tran LLP09/16/2010 > patent applications in patent subcategories. class, title,number
20100235614 - Industrial control device configuration and discovery: The subject disclosure pertains to the communications configuration of programmable logic controller modules in an industrial automation environment. Systems and methods are provided that automatically enables a programmable logic controller module to operate on a communications network once communicatively coupled thereto. Other control modules, a personal computer, or the like... Agent: Rockwell Automation For Turocy & Watson LLP
20100235615 - Method and system for discovery of a root file system: A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader, a location of the boot image having a predefined value matching the tag, loading a kernel of the operating system retrieved from... Agent: Osha Liang LLP/oracle
20100235616 - Method and system for displaying information on installed units: An exemplary embodiment of the present invention provides a method for providing information about units installed in a computing device. The method includes identifying an installed unit prior to an initialization of an operating system and obtaining information about the installed unit, wherein the information comprises a regulatory identification number,... Agent: Hewlett-packard Company Intellectual Property Administration
20100235618 - Start-up of computing systems: A computing device is provided that includes a computing unit, which has a working memory and a processing unit, and a boot memory having control instructions for operating the computing device. The control instructions are stored in boot memory and are to be transferred to the computing unit at start-up... Agent: The Eclipse Group LLP
20100235617 - System recovery method and embedded system with automatic recovery function: A system recovery method and an embedded system with an automatic recovery function used between a network and a server are introduced. The embedded system includes a nonvolatile memory storing a first part program code and a processor electrically connected to the nonvolatile memory and the network. The method includes... Agent: Morris Manning Martin LLP
20100235619 - Image processing apparatus, communication system, control method thereof, and storage medium: An apparatus connected to a network via a network interface device and capable of executing encrypted communication with an external device on the network requests that a first algorithm to be used in the encrypted communication with the external device is changed to a second algorithm included in the network... Agent: Canon U.s.a. Inc. Intellectual Property Division
20100235620 - Method and arrangement for deciding a security setting: The present invention relates to a method and arrangements in a mobile telecommunications network including a plurality of access points (203), a plurality of 5 network gateway devices (204). The method comprising the steps of: deciding a security setting needed for a dedicated bearer signal by a network component, communicating... Agent: Coats & Bennett, PLLC
20100235621 - Method of securely pairing devices with an access point for an ip-based wireless network: A wireless access point and method of using a wireless access point to allow a user to use a pre-determined security key provided with the access point or a personal security key that is provided by the user. The access point is purchased with a pre-determined security key. A user... Agent: Perkins Coie LLP Patent-sea
20100235622 - Transfer device for sensitive material such as a cryptographic key: Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element... Agent: Sheridan Ross PC
20100235624 - Method and apparatus for protecting the transfer of data: According to one embodiment, a conditional access (CA) control system comprises circuitry that is adapted to: (i) transmit information including a unique identifier assigned to a digital device and mating key generator values to the remote source, (ii) receive a mating key from the remote source, the mating key being... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100235623 - Methods and systems for identity verification: The present invention relates to methods and systems for identity verification. The method includes transmitting from a customer system to a customer connector server an identity verification request containing identification information for an individual. At the customer connector server, at least one verification service required for the request is identified... Agent: Fasken Martineau Dumoulin LLP
20100235626 - Apparatus and method for mutual authentication in downloadable conditional access system: A mutual authentication apparatus in a Downloadable Conditional Access System (DCAS) includes an announce protocol processor to authenticate SecurityAnnounce information using an Authentication Proxy (AP) and to transmit the authenticated SecurityAnnounce information to a Secure Micro (SM), a keying protocol processor to relay KeyRequest information and KeyResponse information between a... Agent: Ladas & Parry LLP
20100235627 - Securing communications sent by a first user to a second user: A computer-implemented method of securing communications sent by a first user to a second user may include receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user,... Agent: Brake Hughes Bellermann LLP
20100235625 - Techniques and architectures for preventing sybil attacks: Techniques and architectures for preventing Sybil attacks are provided. A node authenticates to a local certificate authority associated with a social networking group. The local certificate authority issues an encrypted certificate with a secret to the node. The node then makes a request to participate in another external group via... Agent: Schwegman, Lundberg & Woessner/novell
20100235628 - System and method for accessing keys for secure messaging: Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity... Agent: Jones Day (rim) - 2n
20100235629 - Information storage medium, authentication data generation method, and medium authentication system: An authentication data generation method includes receiving an authentication command from an authentication device, determining a communication protocol with the authentication device, changing encryption key reference information contained in the authentication command based upon the determination result of the communication protocol with the authentication device, selecting a target encryption key... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20100235630 - System and method for providing key-encrypted storage in a cloud computing environment: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and... Agent: Haynes And Boone, LLPIPSection
20100235631 - Digital rights management handler and related methods: A system and method of providing universal digital rights management system protection is described. One feature of the invention concerns systems and methods for repackaging and securing data packaged under any file format type, compression technique, or digital rights management system. Another feature of the invention is directed to systems... Agent: Axios Law Group, PLLC / Realnetworks, Inc
20100235632 - Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages: According to an embodiment of the invention, a system for processing a plurality of service requests in a client-server system includes a challenge server for: presenting a cryptographic challenge to the client; initializing a trust cookie that encodes a client's initial priority level after the client correctly solves the cryptographic... Agent: Michael Buchenhorner, P.A.
20100235633 - Authentication and encryption utilizing command indentifiers: A data processing system, recording device, data processing method and program providing medium are provided to execute authentication processing and content storing processing between apparatuses. Program localization is employed to restrict access to program content. A plurality of key blocks store key data for authentication processing. Key block designation information... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100235638 - Identification and authentication of devices in a network: A method of distributing a network access key to devices in a network comprises the steps of generating a network access key, and generating a plurality of distinct key shares for the network access key. A device requires a predetermined number of distinct key shares to generate the network access... Agent: Pepper Hamilton LLP
20100235639 - Information processing apparatus, communication system, method of controlling them, and storage medium: An information processing apparatus connected to a network via a network interface device and capable of performing encrypted communication with an external apparatus on the network. When the information processing apparatus is operating in a normal power mode, a sleep control module thereof detects whether a condition under which the... Agent: Rossi, Kimms & Mcdowell LLP.
20100235636 - Method for delivering web content and applications to the user via email or other communication channels: A method of enabling enriched content of an electronic message including embedding instructions within the electronic message for rendering the content of the message correctly on a recipient system. That may be protected by a firewall, anti virus or anti-spam program, the method comprising the steps of transforming the message... Agent: Robert G. Lev
20100235635 - Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween: Methods for transferring a set of data from a first processing device to a second processing device are provided. Pursuant to these methods a secure shell (“SSH”) authentication is performed to authenticate a first user that is logged onto the first processing device to a second user that is logged... Agent: At&t Legal Department - Mb Attn: Patent Docketing
20100235634 - Security considerations for the lte of umts: A method for providing message protection includes generating a ciphered message based upon a first counter, a message, and a ciphering key. The method further includes generating an unciphered message authentication code (MAC) based upon the first counter, an integrity protection key, and either the message or the ciphered message,... Agent: Lee, Hong, Degerman, Kang & Waimey
20100235640 - Information processing apparatus, method of mutual authentication, mutual authentication program, and storage medium: An information processing apparatus and a counterpart apparatus supporting data communications are devised. The information processing apparatus is connected to the counterpart apparatus via a communication network. The information processing apparatus and the counterpart apparatus supporting data communications use mutual authentication using a certificate file. The information processing apparatus includes... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100235641 - Security techniques for cooperative file distribution: Security techniques are provided for cooperative file distribution. An encryption key or a nonce (or both) are generated for a package containing one or more files that are to be sent in a cooperative file distribution system. Random access encryption techniques can be employed to encrypt a package containing one... Agent: Ryan, Mason & Lewis, LLP
20100235642 - Apparatus, system, and method of setting a device: A device setting apparatus performs setting operation with respect to a counterpart apparatus using secure communication even when the counterpart apparatus is not previously provided with information required for secure communication. The device setting apparatus detects an error when the error occurs during the setting operation, and executes a browser... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100235643 - Authentication of an object: A system for authenticating an object is disclosed. The system includes an optical sensing device and a processor. The optical sensing device senses coded data provided on a surface associated with the object. The coded data is indicative of a position on the surface, an identity associated with the object,... Agent: Silverbrook Research Pty Ltd
20100235644 - Method and system for a recursive security protocol for digital copyright control: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a... Agent: SprinkleIPLaw Group
20100235645 - Apparatus and method for limiting access to model specific registers in a microprocessor: A microprocessor having a control register to which the manufacturer of the microprocessor may limit access. The microprocessor includes a manufacturing identifier that uniquely identifies the microprocessor and that is externally readable from the microprocessor by a user. The microprocessor also includes a secret key, manufactured internally within the microprocessor... Agent: Huffman Law Group, P.C.
20100235646 - Verification method and system thereof: A verification method and a verification system are disclosed. The verification method is applicable to an electronic device including a system memory and a BIOS memory provided with a Pre-Boot Authentication (PBA) application and prescribed biometric data. In one embodiment, the verification method comprises the steps of executing a BIOS... Agent: Hudak, Shunk & Farine, Co., L.p.a.
20100235647 - Hardware security for software processes: A system and method for secure processing is provided, wherein a monitor application is injected into a secure application binary within the security perimeter of a secure processor. The components of the monitor application are injected into different portions of the application binary utilizing a seed value. In this manner,... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100235648 - Methods and systems for binding a removable trusted platform module to an information handling system: Methods and systems for binding a removable trusted platform module (TPM) subsystem module to an information handling system to provide a core root of trust for the information handling system without requiring soldering down or other hard and permanent (non-removable) attachment of a TPM device to the information handling system... Agent: O'keefe, Egan, Peterman & Enders LLP
20100235650 - Methods and systems for encoding and protecting data using digital signature and watermarking techniques: Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100235649 - Portable secure data files: A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received, one or more records in the metadata portion are accessed to determine whether the current user... Agent: Microsoft Corporation
20100235651 - Secure operation of processors: Secure operation of processors is disclosed. A cell processor receives a secure file image from a client device at a processor of a host device (host cell processor), wherein the secure file image includes encrypted contents.... Agent: Joshua D. Isenberg Jdi Patent
20100235656 - Device, method, and computer program product for computing electric power consumption: A disclosed electric power consumption computation device includes an acquisition unit configured to acquire apparatus information from an apparatus connected to the electric power consumption computation device via a predetermined data communication path, and a computation unit configured to compute electric power consumption of the apparatus based on information on... Agent: Harness, Dickey & Pierce, P.L.C
20100235655 - Method and apparatus for implementing a limited functionality embedded universal serial bus (usb) host controller on a fully functional downstream usb port: A method and apparatus for allowing a limited functionality Universal Serial Bus (USB) host controller to manage specific USB peripheral devices on a downstream facing USB port is provided. The port is also capable of dynamically interfacing to any USB compliant peripheral device, even one not supported directly by the... Agent: The Hecker Law Group
20100235653 - Method and system for transmit queue management for energy efficient networking: Aspects of a method and system for queue management for energy efficient 1networking are provided. In various embodiments of the invention a network device may determine whether to transition into or out-of an energy-saving mode of operation, and arm an EEN trigger by buffering the EEN trigger in a queue... Agent: Mcandrews Held & Malloy, Ltd
20100235657 - Method of and apparatus for controlling system according to power feeding of terminal: An apparatus and method for controlling a terminal having two modules connected to a network at power feeding in dual modes. A first power supply feeds main electric power via a main current limiting unit to a first controller and a second controller. The first controller controls a first wireless... Agent: Cha & Reiter, LLC
20100235654 - Methods of achieving cognizant power management: A system and method of increasing the efficiency of overall power utilization in data centers by integrating a power management approach based on a comprehensive, dynamic model of the data center created with integrated environmental and computational power monitoring to correlate power usage with different configurations of business services utilization,... Agent: Gibbons P.C.
20100235652 - Power supply identification using a modified power good signal: Method, system and apparatus enabling a computing system to automatically identify the capabilities of a power supply coupled to the computing system. The power supply includes a controller that sends an identification code to a computing system prior to sending a power good signal to the computing system. The identification... Agent: Streets & Steele - IBM Corporation
20100235658 - Data processing apparatus: A data processing apparatus 100, to reduce power consumption for processing and wirelessly transmitting continuous data to a data reproducing apparatus 200, comprises a first signal processing unit 120 processing data stored in a data storage unit 110, a first wireless communication unit 140 wirelessly transmitting the processed data to... Agent: Pearne & Gordon LLP
20100235660 - Low power computer with main and auxiliary processors: An architecture for a computer includes a primary processor that consumes power at a first rate, that is operated when the computer is in an high power mode and that is not powered when the computer is in a low power mode. A primary graphics processor communicates with the primary... Agent: Harness, Dickey & Pierce P.L.C
20100235659 - System and method for controlling use of power in a computer system: In one embodiment, a power adapter comprises a power supply to output power for powering a powered device. The power adapter outputs information indicative of an amount of power output by the power supply for use by the powered device to control the amount of power used by the powered... Agent: Hewlett-packard Company Intellectual Property Administration
20100235661 - Electronic device and power management method for audio control system thereof: An audio control system and method of an electronic device receives audio streams, but does not play the audio streams when one or more applications are in a mute mode. The system and method mixes the one or more of the audio streams if the volume of the one or... Agent: Altis Law Group, Inc. Attn: Steven Reiss
20100235662 - Server power manager and method for dynamically managing server power consumption: A server power manager and method for dynamic server power management are generally described herein. The server power manager is configured to implement one or more server management policies that identify target server power consumption and/or target functionality for the server system. The server power manager determines an amount of... Agent: Schwegman, Lundberg & Woessner, P.A.
20100235664 - Adaptive power saving: A device may enter a first active state associated with a device, exit the first active state and entering a sleep state associated with the device when user input is not received within a inactivity period, receive a first user input at the device during the sleep state, measure an... Agent: Snyder, Clark, Lesch & Chung, LLP
20100235663 - Data interface power consumption control: Apparatus and techniques relating to data interface power consumption control are disclosed. Components of a data transfer module may be selectively moved between their normal operating states and reduced power states at times when the data transfer module is not to be used for transferring data. Decisions as to particular... Agent: Turocy & Watson, LLP
20100235668 - Method and apparatus for implementing a sleep proxy for services on a network: One embodiment of the present invention provides a system for implementing a sleep proxy. The system starts by receiving a request at the sleep proxy for information pertaining to a service provided by a device. In response to this request, the system determines if the device is a member of... Agent: Pvf -- Apple Inc. C/o Park, Vaughan & Fleming LLP
20100235666 - Method for determining switching of sleep mode, computer program product for performing the method, and recording medium for the computer program product: A method for determining switching of the sleep mode for a device is provided. The device and a base station have several connections therebetween. In the determining method, one of the connections is first provided and it is determined whether the connection is realtime or non-realtime. It is then determined... Agent: Jianq Chyun Intellectual Property Office
20100235667 - Motion sensor data processing using various power management modes: Systems and methods for processing motion sensor data using various power management modes of an electronic device are provided. Power may be provided to a motion sensor during a first power mode of the device. In response to the motion sensor detecting a motion event with a magnitude exceeding a... Agent: Kramer Levin Naftalis & Frankel LLP
20100235665 - System and method for enabling fallback states for energy efficient ethernet: A system and method for enabling fallback states for energy efficient Ethernet (EEE). EEE devices can be designed to support multiple power saving states that impact layers higher than the PHY layer. Typically, these higher levels of power savings would require a greater period of time to accommodate a return... Agent: Law Office Of Duane S. Kobayashi
20100235670 - Fast l1 flush mechanism: In one embodiment, a processor comprises a data cache configured to store a plurality of cache blocks and a control unit coupled to the data cache. The control unit is configured to flush the plurality of cache blocks from the data cache responsive to an indication that the processor is... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20100235669 - Memory power consumption reduction system, and method and program therefor: Disclosed is a memory power consumption reduction system that includes a memory allocation section, which allocates an area of a plurality of physical memories included in a physical information processing device to a process of a virtual machine when the virtual machine is to be controlled with a VMM; a... Agent: Mr. Jackson Chen
20100235671 - Backup power system and method: Various embodiments of a backup power system and method may include a transfer switch, connections to primary and secondary power sources, a stored energy component, and an interconnected controller with a processor and memory. The transfer switch may provide power to an external load from a selected one of the... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20100235672 - Multi-core processor, its frequency conversion device and a method of data communication between the cores: A multi-core processor and a frequency conversion device thereof as well as a method of communication between the cores are disclosed. Each processor core of the multi-core processor includes a frequency conversion device, which includes a multi-bit state changing means, a multiple selector, a frequency conversion coefficient register, a multi-input... Agent: Occhiuti Rohlicek & Tsao, LLP
20100235673 - Simplified receiver for use in multi-wire communication: An encoder encodes data into a series of parallel codewords. Each codeword is expressed two sets of logic values (e.g., a set of logic 0s and a set of logic 1s) on output nodes. The encoder selects a current codeword from a group of codewords in a codespace which does... Agent: Pvf -- Rambus, Inc. C/o Park, Vaughan & Fleming, LLP
20100235675 - Non-blocking address switch with shallow per agent queues: In one embodiment, a switch is configured to be coupled to an interconnect. The switch comprises a plurality of storage locations and an arbiter control circuit coupled to the plurality of storage locations. The plurality of storage locations are configured to store a plurality of requests transmitted by a plurality... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20100235674 - Systolic merge sorter: A sorter system includes a clock continuously generating a series of clock signals, a systolic array circuit, and control circuitry in communication with serial access memory that stores data items of a sequence to be sorted and with the systolic array circuit to supply thereto data items as input and... Agent: Guerin & Rodriguez, LLP09/09/2010 > patent applications in patent subcategories. class, title,number
20100228958 - Information processing apparatus, method for controlling information processing apparatus and computer readable medium: An information processing apparatus includes a first circuit configuration section, a second circuit configuration section and a circuit configuration controller. The first circuit configuration section includes a first circuit configuration configured by a plurality of first calculation units. Each of the first calculation units has a circuit being configured to... Agent: Oliff & Berridge, PLC
20100228959 - Communication device and method for starting up the communication device: A method for starting up the communication device includes searching a non-volatile storage unit of the communication device for start up data of the communication device according to a predetermined identifier of the start up data, loading the start up data into a volatile storage unit of the communication device,... Agent: PCe Industry, Inc. Att. Steven Reiss
20100228960 - Virtual memory over baseboard management controller: Embodiments of the present invention generally relate to techniques for updating a BIOS image stored in a computer system. The BIOS image is stored in a flash memory and updated over an embedded system, such as a baseboard management controller (BMC). In one embodiment, a method for updating a BIOS... Agent: Patterson & Sherldan - Aten
20100228961 - Hierarchical secure networks: Systems and methods for creating hierarchical network communications between trusted domains are described herein. An illustrative system includes a first, second, and third network. The first and second networks each include a plurality of routers, each router capable of establishing a secure data path with another router in the respective... Agent: Conley Rose, P.C. David A. Rose
20100228963 - Methods of placing advertisments, interstitials and toolbars in a web browser: The present invention provides methods and systems that can render INE content to a web browser. Various methods and approaches are disclosed that when implemented would enable an INE to place some of INE's contents in a web browser of a user. The INE content can be in the form... Agent: Fitch, Even, Tabin & Flannery
20100228962 - Offloading cryptographic protection processing: Some embodiments are directed to processing packet data sent according to a security protocol between a first computer and a second computer via a forwarding device. The forwarding device performs a portion of the processing, and forwards the packet data to a third computer, connected to the forwarding device, for... Agent: Wolf Greenfield (microsoft Corporation) C/o Wolf, Greenfield & Sacks, P.C.
20100228964 - Ethernet phy level security: A system and method are provided for securing links at the physical (PHY) layer in an IEEE 802.3 Ethernet communication system. A local device (LD) receives an electrical waveform representing link partner security information from a network-connected link partner (LP) via unformatted message pages. The LD accesses predetermined LP reference... Agent: Law Office Of Gerald Maliszewski
20100228965 - System and method for using a streaming protocol: An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application... Agent: Fish & Richardson P.C.
20100228966 - Control device, communication apparatus, control system, control method and storage medium: A control system which can control a function of a device depending on the result of authentication of an external device that exists outside the device and prevent others from using the device without permission is provided. The control system includes a control device (100) which controls at least one... Agent: Mr. Jackson Chen
20100228967 - Method of establishing security association in inter-rat handover: A method of establishing security association during handover between heterogeneous networks in a radio access system is disclosed. A method of establishing security association before handover with a target base station included in a heterogeneous radio access network is performed comprises transmitting a request message to a service base station,... Agent: Lee, Hong, Degerman, Kang & Waimey
20100228969 - Customizable public key infrastructure and development tool for same: A public key infrastructure comprises a client side to request and utilize certificates in communication across a network and a server side to administer issuance and maintenance of said certificates. The server side has a portal to receive requests for a certificate from a client. A first policy engine to... Agent: Rim
20100228970 - Public key certificate issuing system, public key certificate issuing method, digital certification apparatus, and program storage medium: A public key certificate issuing system is disclosed which comprises a certificate authority for issuing a public key certificate used by an entity, and a registration authority which, on receiving a public key certificate issuance request from anyone of entities under jurisdiction thereof, transmits the received request to the certificate... Agent: Rader Fishman & Grauer PLLC
20100228968 - Split termination of secure communication sessions with mutual certificate-based authentication: A method and apparatus are provided for split-terminating a secure client-server communication connection when the client and server perform mutual authentication by exchanging certificates, such as within a Lotus Notes environment. When the client submits a certificate to the server, an intermediary device intercepts the certificate and submits to the... Agent: Riverbed Technology Inc. - Pvf C/o Park, Vaughan & Fleming LLP
20100228971 - Methods for broadcasting and receiving a scrambled multimedia programme, network head, terminal, receiver and security processor for these methods: A method of broadcasting a scrambled multimedia programme, by way of a broadband network, in which before transmitting a license key: —a network head carries out a step of authenticating a terminal, and—if the terminal has been successfully authenticated, the network head sends the terminal a license transmission message containing... Agent: Stites & Harbison PLLC
20100228972 - System and method for content distribution with broadcast encryption: The claimed invention relates to system and method for providing encrypted content via a distribution network 630 with efficient key distribution and distribution network assignment. The claimed invention assigns users to content-specific distribution network in which the content is broadcast. This makes the content access much more efficient by conducting... Agent: The H.t. Than Law Group
20100228977 - Communications hub for use in life critical network: Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software implemented by a communications device. The communications device provides for detecting, using a multiplicity of disparate communication protocols, presence of entities requesting a network connection and determining whether or not... Agent: Hollingsworth & Funk
20100228973 - Electronic data communication system: There is described a key server which is connected to a local area network, and an encryption authority transfers private keys for clients of the local area network to the key server. In an embodiment, the key server encrypts outgoing emails using public keys for the recipients and decrypts internal... Agent: Patent Docket Administrator Lowenstein Sandler PC
20100228976 - Method and apparatus for providing secured network robot services: At least one client robot in a domain are connected to a domain security management unit and a root security management unit is connected to at least one external server outside the domain and the domain security management unit via a network. A method for providing secured network robot services... Agent: Lowe Hauptman Ham & Berner, LLP
20100228975 - Method, system and software product for transferring content to a remote device: The present invention relates to a method for transferring content to a device, the method including the steps of: receiving a request for content from the device; delivering a uniquely identifiable, ephemeral player to the device; and transferring content to the device, for presentation on the device by the player.... Agent: Greer, Burns & Crain
20100228979 - Terminal device, system and computer readable medium: A second terminal device is used in a system including a server, a first terminal device, and the second terminal device. The second terminal device includes: a first command transmission unit configured to transmit a first command to the first terminal device via the server; a storage control unit configured... Agent: Banner & Witcoff, Ltd. Attorneys For Client No. 016689
20100228978 - Terminal device, system, connection management server, and computer readable medium: A second terminal device is used in a system including a connection management server, a first terminal device, and the second terminal device. The second terminal device includes: a local address obtaining unit configured to obtain a first local IP address and first authentication information of the first terminal device... Agent: Banner & Witcoff, Ltd. Attorneys For Client No. 016689
20100228974 - Vlan tagging over ipsec tunnels: In accordance with a nonlimiting example, a network device transfers communications data along a communications channel within an Internet Protocol (IP) network. A communications module includes a signal input connected to the communications channel of the IP network and receives an Ethernet packet having an Ethernet header and IP data.... Agent: Allen, Dyer, Doppelt, Milbrath & Gilchrist
20100228981 - Communication method, mesh netwrok system and communication terminal: A communication method in which an operation, such as authentication, required when a new communication terminal participates in a mesh network is carried out in a more efficient manner. A second communication terminal that has already established an adjacent communication link with at least two first communication terminals, out of... Agent: Rabin & Berdo, PC
20100228980 - Method and arrangement for providing a wireless mesh network: A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node which is already present in the mesh network and which has a link to the AAA... Agent: Siemens Corporation Intellectual Property Department
20100228982 - Fast-reconnection of negotiable authentication network clients: Modern network communications often require a client application requesting data to authenticate itself to an application providing the data. Such authentication requests can be redundant, especially in the case of stateless network protocols. When a full authentication is performed, a conversation identifier and one or more encryption keys can be... Agent: Microsoft Corporation
20100228985 - Content management method and apparatus in intelligent robot service system: A content management method in an intelligent robot service system includes: generating a key to distribute the key to a content generation node and a content execution node; generating a signature for a content using the distributed key in the content generation node; providing the content and the signature to... Agent: Ampacc Law Group
20100228984 - Full-rights local playback of digital content: A method of playing a digital content item includes downloading the digital content item from a removable data-holding medium to a local data-holding medium of a media playing system, and sending a licensing request to a network-accessible, digital-content service. The method further includes receiving a full-rights license for the digital... Agent: Microsoft Corporation
20100228983 - Third-party watermarking: A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party... Agent: At & T Legal Department - Slusky
20100228986 - Authentication system and method using electronic tags: An authentication method of a prover device by a verifier device by means of cryptographic coupons is provided for, wherein a coupon comprises, on one hand, a pseudo-random number ri, where i is an index for labeling the coupon, and, on the other hand, a reduced-coupon xi such that xi=ƒ(ri),... Agent: Drinker Biddle & Reath LLP Attn: Patent Docket Dept.
20100228987 - System and method for securing information using remote access control and data encryption: The invention relates to a system and method for enhancing the security of information by decoupling the user authentication from the data storage and access. User information, stored by a service provider, is encrypted using a hashed password and access to the encrypted user information is protected by a separate... Agent: Rader Fishman & Grauer PLLC
20100228988 - Method and device for visual code transaction verification: A method and device for visual code transaction verification enables more secure electronic transactions. The method includes generating a window having a first pattern of elongated segments. A second pattern of elongated segments is then generated, wherein a dynamic visual code is produced when the window and the first pattern... Agent: Brooks Kushman P.C.
20100228989 - Access control using identifiers in links: Methods, systems, and computer-readable media are disclosed for access control. A particular method receives a resource access identifier associated with a shared computing resource and embeds the resource access identifier into a link to the shared resource. The link to the shared resource is inserted into an information element. An... Agent: Microsoft Corporation
20100228991 - Using hidden secrets and token devices to control access to secure systems: A system for using an encrypted version of a password or access code which is stored in the open on a computer or other device, which utilizes a hardware token to decrypt the password or access code utilizing a secure secret which is stored inside the device, and which never... Agent: Roger E. Billings
20100228990 - Using hidden secrets and token devices to create secure volumes: A system for encrypting Secure Volumes using an encryption key which is saved in the open after being encoded inside a hardware token device utilizing a secure secret which is stored inside the device, and which never leaves the device. The encrypted volume can be accessed again only after a... Agent: Roger E. Billings
20100228992 - Cryptographic method and apparatus for enhancing computation performance of a central processing unit: A cryptographic method for enhancing computation performance of a central processing unit involves the execution of a conversion function of the cryptographic method by the central processing unit. The conversion function computation requires the use of a plurality of substitution boxes. The method comprises the steps of: (A) detecting a... Agent: Greenblum & Bernstein, P.L.C
20100228998 - Method and apparatus for secure data mirroring a storage system: A secure data mirroring capability in a storage system includes encrypting data blocks in a primary volume in preparation for a data mirroring operation. The encrypted data blocks are mirrored to a secure secondary volume. Host systems provide keys from which encryption keys are produced for encrypting the data blocks.... Agent: Mattingly & Malur, P.C.
20100228997 - Method and apparatus for verifying authenticity of initial boot code: A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100228994 - Security method of keyboard input directly controlling the keyboard controller: Disclosed herein is a method of securing keyboard input information by directly controlling a keyboard controller of a keyboard. The keyboard includes the keyboard controller, an interrupt controller, an input information processing module and a keyboard security module. The method includes a status information checking step of enabling the input... Agent: Ipla P.A.
20100228996 - Systems and methods for secure transaction management and electronic rights protection: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information.... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100228999 - Trusted storage systems and methods: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100228995 - Universal serial bus data encryption device with the encryption key delivered by any infrared remote handheld controller where the encryption key is unreadable by the attached computer system: The user may deliver an encryption key via any infrared remote controller to a computer data encryption controller external to the computing system but connected to the aforementioned computer system via the Universal Serial Bus (USB) port. The infrared delivered key may be combined with the computer system supplied key... Agent: William Eugene Jacobus
20100228993 - Usb interface apparatus and usb packet transmitting/receiving method: A USB interface apparatus is provided in electronic equipment on a USB packet transmission side, and includes a conversion unit for converting CRC object data which is data contained in a field subjected to CRC calculation in a USB packet, based on a predetermined rule corresponding to reverse conversion of... Agent: Mcginn Intellectual Property Law Group, PLLC
20100229001 - Nonvolatile memory device and operating method: Disclosed is an operating method of a non-volatile memory device which comprises randomizing data to store the randomized data; erasing the randomized data; and outputting erase data according to information of a flag cell of the non-volatile memory device at a read operation.... Agent: Volentine & Whitt PLLC
20100229000 - Software copyright protection and licensing system using rfid: The present invention provides a software copyright protection and licensing system (200) using RFID. A RFID tag (110) is supplied with a software package (100). During installation of the software package in a computer, a RFID reader (158) interrogates the RFID tag (110) for a product installation and licensing key... Agent: Lawrence Y.d. Ho & Associates Pte Ltd
20100229002 - Systems and methods for watermarking software and other media: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100229005 - Data whitening for writing and reading data to and from a non-volatile memory: Systems, apparatuses, and methods are provided for whitening and managing data for storage in non-volatile memories, such as Flash memory. In some embodiments, an electronic device such as media player is provided, which may include a system-on-a-chip (SoC) and a non-volatile memory. The SoC may include SoC control circuitry and... Agent: Kramer Levin Naftalis & Frankel LLP
20100229006 - Memory for protecting data, memory system including the memory, and method of driving the memory: A memory for protecting data includes a first storage area storing N-number of encryption keys, where N is a natural number, a second storage area receiving the N-number of encryption keys from the first storage area and storing again the received N-number of encryption keys, and a selection unit selecting... Agent: F. Chau & Associates, LLC
20100229003 - Method, system and computer program for securely storing data: m
20100229007 - Nonvolatile memory device and operating method thereof: An operating method of a non-volatile memory device includes randomizing source data to form randomized source data, storing the randomized source data, generating a seed based on an address, generating a random data sequence based on the seed, and de-randomizing the randomized data using the random data sequence. Related nonvolatile... Agent: Myers Bigel Sibley & Sajovec
20100229004 - Protection of security parameters in storage devices: Security parameters used to encrypt data stored on a storage device may be protected using embodiments of systems and methods described herein. During a resize operation, data stored on a memory unit in the storage device may be altered prior to communicating an updated partition size to a host computer.... Agent: Dorsey & Whitney LLP Intellectual Property Department
20100229008 - Sound effect power supply configuration: A sound effect power supply configuration includes a USB power supply source, an external audio source, a sound effect unit and an external speaker, wherein the USB power input terminal provides sound effect unit USB power source, for the sound effect unit after obtaining USB power source may receive the... Agent: Lin & Associates Intellectual Property, Inc.
20100229009 - Applying power to a network interface: A host device capable of communicating with an external network. The host device may comprise a power-application unit and a network interface. The power-application unit may receive from a power-supply unit a first power-supply output having a first voltage level and a second power-supply output having a second voltage level.... Agent: Hewlett-packard Company Intellectual Property Administration
20100229010 - Computer system, method for controlling the same, and program: A computer system 10 includes a plurality of nodes, a main memory device 41 and an input-output device 42 which both are shared between the nodes and which connect with any of the nodes, and a power control circuit 45. The plurality of nodes include a specific node 30 which... Agent: Mr. Jackson Chen
20100229012 - Microprocessor that performs adaptive power throttling: A microprocessor that performs adaptive power throttling includes a calculation unit that calculates an average power consumed by the microprocessor over a most recent predetermined sample time and determines whether the average power is less than a predetermined maximum power value. A power management unit controls the microprocessor to conditionally... Agent: Huffman Law Group, P.C.
20100229011 - Power reduction in microcontrollers: The disclosed implementations provide for power reduction in microcontrollers by reactivating a clock in the microcontroller for one or more peripheral modules in response to an internal or external trigger event, thus allowing the one or more peripheral modules to respond to events while operating in a low-power sleep mode.... Agent: Fish & Richardson P.C.
20100229015 - Method and apparatus of power management: A power management system for home entertainment networks having three power states. The network controller is empowered to move nodes within the home entertainment network between the power states.... Agent: Entropic Communications, Inc.
20100229013 - Method and system for implementing energy efficient ethernet techniques in a macsec enabled phy: Aspects of a method and system for implementing energy efficient Ethernet techniques in a MACSec enabled PHY are provided. In this regard, an Ethernet PHY comprising memory may be operable to perform packet processing functions comprising MACSec protocol processing and energy efficient Ethernet (EEE) processing. In this regard, the memory... Agent: Mcandrews Held & Malloy, Ltd
20100229014 - Monitoring a computer: A computer implemented method of monitoring the operational state of a computer, comprises running on the monitored computer a monitoring program configured to monitor a set of parameters. The set of monitored parameters comprises for example the name(s) of any process(es) running on the computer, together with i) the values... Agent: Knobbe Martens Olson & Bear LLP
20100229016 - Assessing conditions of power consumption in computer network: A network system forms a computer network, and includes: a collecting unit; a calculating unit; and a display unit. The collecting unit collects power consumption information from a connecting device. The power consumption information shows power consumption of the connecting device. The calculating unit calculates power consumption of the computer... Agent: Antonelli, Terry, Stout & Kraus, LLP
20100229017 - In-vehicle power supply apparatus: Provided is an in-vehicle power supply apparatus which supplies power to both a high-power load such as an actuator, and the CPU for controlling the high-lower load, and which is capable of preventing reduction in voltage of the CPU even when voltage of the in-vehicle power supply is momentarily reduced... Agent: Oliff & Berridge, PLC
20100229018 - Three stage power up in computer storage system: Embodiments for operation of a storage system following a power loss are provided. The system switches to the local power supply, prevents the receipt of input/output commands and copies the content of cache memory to a local storage device. On detecting resumption of external power, the system charges a local... Agent: Griffiths & Seaton PLLC (ibm)
20100229019 - Method of controlling spread-spectrum clock generation: A method of controlling spread-spectrum clock generation is disclosed. A first-in first-out (FIFO) buffer is first monitored. When the FIFO buffer is determined to be abnormal, an associated spread-spectrum clock generator (SSCG) is turned off or its spread range is decreased.... Agent: Stout, Uxa, Buyan & Mullins LLP
20100229020 - Processing system with interspersed processors using selective data transfer through communicaton elements: A processing system comprising processors and the dynamically configurable communication elements coupled together in an interspersed arrangement. The processors each comprise at least one arithmetic logic unit, an instruction processing unit, and a plurality of processor ports. The dynamically configurable communication elements each comprise a plurality of communication ports, a... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20100229021 - Microprocessor performance and power optimization through inductive voltage droop monitoring and correction: A voltage droop monitoring and correcting circuit for a microprocessor includes: a monitor circuit configured to monitor voltage droops of the microprocessor and perform a temporary clock-skipping technique to compensate for the voltage droops. A method for monitoring and correcting voltage droops of a microprocessor includes: monitoring voltage droops of... Agent: Osha Liang LLP/oracle09/02/2010 > patent applications in patent subcategories. class, title,number
20100223451 - Boot control method and apparatus: A boot control method of a program in an information processing apparatus to which a device can be connected, the method including a search step of searching for a running program that is running on the information processing apparatus when the device is connected, a determination step of determining whether... Agent: Fitzpatrick Cella Harper & Scinto
20100223452 - Central processing unit capable of multi-boot using desjoint memory spaces: A central processing unit capable of multi-boot using disjoint memory spaces. The central processing unit comprises a plurality of internal registers communicably coupled to each of a plurality of disjoint memory spaces. The internal registers may be configured to designate one or more of the memory spaces as an active... Agent: Connolly Bove Lodge & Hutz, LLP
20100223453 - Integrated circuit for validating and decrypting software data: An integrated circuit is provided. The IC runs a boot program that verifies programs before the programs can be loaded onto, or run by, the IC by verifying whether the programs are signed with a boot key, verifies, with the boot program, a developmental boot program signed with the boot... Agent: Silverbrook Research Pty Ltd
20100223454 - Method and apparatus for removable device modification of system configuration: A method and apparatus for updating the system configuration settings of a computer system. Embodiments include a remote system configuration system that enables a user to update the system configuration of a target machine from a server machine over a network or similar communications system. Another embodiment includes a system... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100223455 - Encrypted-traffic discrimination device and encrypted-traffic discrimination system: An encrypted-traffic discrimination device includes an input interface, a flow discrimination section, a data accumulation section, a selective data calculation section, a calculation result determination section, and an output interface. The flow discrimination section discriminates the input traffic into separate flows based on at least a transmission origin address and... Agent: Rabin & Berdo, PC
20100223457 - Generation and/or reception, at least in part, of packet including encrypted payload: An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an encrypted payload. The at least one field may include, at least in part, a first key and/or at least one value.... Agent: The Law Offices Of Christopher K. Gagne C/o Cpa Global
20100223456 - Security implementation within a browser: Techniques for implementing security within a browser of a data processing system are described herein. According to one embodiment, first data representing a user interaction with a Web page presented by a browser application is encrypted at an application level by a cipher module communicatively coupled to the browser application... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100223458 - Pair-wise keying for tunneled virtual private networks: In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an attacker who compromises one of the devices in a VPN cannot use the keys gained by that compromise to decrypt the packets from the... Agent: Tucker Ellis & West LLP
20100223459 - Key distribution: Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.... Agent: Schwegman, Lundberg & Woessner/novell
20100223460 - System and method for requesting and issuing an authorization document: A device and method for supporting the issuing of an authorization document (6) to an applicant; the said device comprising: a computer (10(i)) comprising a first processor and a first memory containing stored first data and instructions to allow the first processor to execute a first defined program, a clerk... Agent: Fliesler Meyer LLP
20100223461 - Secure data transfer on a handheld communications device: A handheld communications device comprises a display device, and a data processor that is in communication with the display device. The data processor is configured to generate an encryption key, and vary a visual output of the display device in accordance with a bit sequence of the encryption key. The... Agent: Heenan Blaikie LLP
20100223462 - Method and device for accessing services and files: The present invention relates to a method and device for accessing services and files on a computer (4) in a home network (1) from a stationary or mobile device (8, 9) outside said local network Said local network is equipped with a networked file system, and said stationary or mobile... Agent: Schneck & Schneck
20100223463 - Communication system, key managing/distributing server, terminal apparatus, and data communication method used therefor, and program: To provide a mobile communication system that can prevent unauthorized use of an encryption key otherwise caused by loss thereof and that can securely perform a direct communication between terminals using the encryption key. A portable terminal apparatus 1-1 transmits a P2P communication trigger to a portable terminal apparatus 1-n... Agent: Mr. Jackson Chen
20100223468 - Method and device for authenticating request message: A method for authenticating request messages is disclosed. An authentication service device performs centralized allocation and management for authentication random numbers; when a User Equipment (UE) uses a protected service, the key negotiation process needs to be performed only once, whereupon the authentication is performed with multiple Application Servers (ASs)... Agent: Docket Clerk/htcl
20100223465 - Method for lending out electronic key and communication terminal: The present invention aims at providing an electronic key lending method capable of ensuring the high security by a relatively easy method. An electronic key lending method of the present invention of lending an electronic key (7) that unlocks or locks an electronic lock (8) from a first communication terminal... Agent: Pearne & Gordon LLP
20100223467 - Methods and systems for sharing database content: Mechanisms and methods for sharing database content stored by a first organization with a third party are provided. A network address is provided to the third party, which can enable control of the access to the content and tracking of the views of the content. For example, the network address... Agent: Townsend And Townsend And Crew, LLP
20100223464 - Public key based device authentication system and method: Provided is a public key based device authentication server including a server authenticator identifying a device in which a service list is registered and acquiring a certificate of the device issued by a certificate authority (CA); and an encryption key generator generating a public key and a private key for... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100223466 - Shared scalable server to control confidental event traffic among recordation terminals, analysis engines, and a storage farm coupled via a public network: A highly secure event server receiving and storing encrypted assets and references to those assets over a public wide area network. A system for selectively decrypting and transmitting references to analysis clients such as authenticated mutually unconscious users, and retrieving, decrypting and transmitting certain assets from high-volume storage, distributed storage,... Agent: Patentry
20100223469 - Method, system and computer program product for certifying software origination: The disclosed embodiments present a method, system and computer program product for certifying software origination. The method for certifying software origination comprises generating at least one certificate of originality for a software artifact, generating a key for authenticating the certificate of originality, incorporating the key into the certificate of originality,... Agent: Ibm Corp. (aus) C/o Munsch Hardt Kopf & Harr, P.C.
20100223470 - Secure instant messaging system: A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a... Agent: Glenn Patent Group
20100223471 - Cookie verification methods and apparatus for use in providing application services to communication devices: In one illustrative example, a method in a communication device adapted for communications using Hypertext Transport Protocol (HTTP) involves setting, at the communication device, an HTTP cookie which includes a user identification of a user of the communication device and a message portion which is signed with a digital signature... Agent: John J. Oskorep, Esq. LLC One Magnificent Mile Center
20100223472 - Method and system for legally sharing files: The invention relates to a method and a system for distributing a content item, which has been divided into a plurality of blocks of data. A control unit creates at least one watermark block. This watermark block is unique for the client and the content item to be distributed and... Agent: Renner Otto Boisselle & Sklar, LLP
20100223473 - Systems and methods for network management using secure mesh command and control framework: Embodiments relate to systems and methods for network management using a secure mesh command and control framework. A network management server can communicate with a set of supervisory hosts, which in turn communicate with an underlying set of targets. The set of targets can have associated digital certificates which can... Agent: Mh2 Technology Law Group (cust. No. W/red Hat)
20100223474 - Method and apparatus for managing confidential information: The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information using biometric keys to lock data storage devices, a secure data input/output device and authorization procedures to facilitate identity rights management; and/or data querying techniques to preserve the anonymity of disclosed personal... Agent: Hughes Law Firm, PLLC
20100223477 - Content reproducing device, content reproducing method, recording medium, and integrated circuit: A content playback apparatus (digital watermark detection apparatus) comprises: a detection unit operable to detect a digital watermark from audio data having a plurality of blocks, the audio data being contained in a content which is to be played back along a playback time-line; a detected block storage unit for... Agent: Wenderoth, Lind & Ponack L.L.P.
20100223475 - Low-level code signing mechanism: Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with... Agent: Ridout & Maybee LLP
20100223476 - Single pin communication mechanism: A method and device include a power pin, a ground pin, and a communications pin. A communications module receives power from the power pin and utilizes an edge counting communication protocol over the communication pin.... Agent: Schwegman, Lundberg & Woessner / Atmel
20100223478 - System and method for performing exponentiation in a cryptographic system: There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and then removed subsequent to the completion of the CRT algorithm. In another embodiment, fault injection attacks, such as the gcd attack, can... Agent: Blake, Cassels & Graydon LLP
20100223479 - Method for protection of a chip card from unauthorized use, chip card and chip card terminal: A method for protection of a chip card from unauthorized use includes: inputting a first identification into a chip card terminal, producing a cipher of at least one first communication parameter using a first symmetric key derived from the first identification, a protected first communication channel being definable between the... Agent: Gibson & Dernier LLP
20100223481 - Computer system: A computer system including a power supply, a plurality of mainboards, and a power controller is provided. Each of the mainboards corresponds to a standby voltage, respectively. The power supply generates a standby power, and generates a main power according to a power enabling signal. The power controller is coupled... Agent: J C Patents
20100223480 - Power sharing among portable electronic devices: A portable electronic device is operative to facilitate power sharing with at least a second electronic device coupled thereto. The portable electronic device includes a battery power source, a first port adapted for connection to a first network connection and a second port adapted for connection to a second network... Agent: Ryan, Mason & Lewis, LLP
20100223482 - Protocol and interface between a lan on motherboard (lom) and a powered device (pd) for a personal computing device (pcd): A Power-over-Ethernet (PoE) communication system dynamically provides power and data communications over a communications link. In a computing environment made up of one or more personal computing devices (PCD) and/or one or more powered devices (PD), power source equipment (PSE) determines an allocated amount of power to be supplied to... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100223483 - Information processing apparatus, operation control method and operation control program storage medium: An information processing apparatus having a processing circuit to execute a program by operating at a set operating frequency, including: a measuring section that measures an elapsed time from the user's last operation; a notification section that notifies operation allowing frequencies in the processing circuit and instructs, in response to... Agent: Staas & Halsey LLP
20100223484 - Dark wake: Exemplary embodiments of methods, apparatuses, and systems for powering up select components of a computer from a sleep state, maintaining a network state, and powering down the select components of the computer to return the computer to the sleep state are described. For one embodiment, a network interface and a... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLP
20100223485 - Computer system and operating method thereof: A computer system includes a power supply, a timing control circuit including a delay module, and a south bridge chip. The power supply outputs necessary voltages to the computer system and a first power good signal. The necessary voltages include a system voltage. The timing control circuit generates a second... Agent: PCe Industry, Inc. Att. Steven Reiss
20100223486 - Method and system for i2c clock generation: I2C clock generators are implemented using a variety of methods. Using one such method, a method is implemented using logic circuitry arranged in a state machine to control the clock signal (110) on the I2C bus. A first state (202) of the state machine determines whether to effect a clock... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100223488 - Storage apparatus and method of controlling storage apparatus: A storage apparatus includes: a plurality of storage sections each of which corresponds to each of a plurality of addresses; a read pointer register that outputs a read pointer indicating an address of a storage section from which data is read; a write pointer register that outputs a write pointer... Agent: Staas & Halsey LLP
20100223487 - Time synchronization of master and slave devices: A time synchronized measurement system has a master device and a slave device. The master device and the slave device each have a time measurement device for assigning a corresponding time of sending and/or receiving a piece of measurement information. The master device also has a reference clock pulse-generating device... Agent: Fogarty, L.L.C.
20100223489 - Overclocking control device and overclocking control method: An overclocking control method cooperates with an overclocking application of a computer system when the overclocking application is started. The overclocking control method includes the steps as follows. A BIOS enters an overclocking mode according to an executing state of the overclocking application. The BIOS receives a first triggering signal... Agent: Muncy, Geissler, Olds & Lowe, PLLCPrevious industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.47078 seconds