Electrical computers and digital processing systems: support patents - Monitor Patents
FreshPatents.com Logo    FreshPatents.com icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents



USPTO Class 713  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14: Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |

Electrical computers and digital processing systems: support

Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
  
08/28/2014 > 71 patent applications in 24 patent subcategories.

20140244992 - Extensible firmware interface external graphic card, mainframe system, and extensible firmware interface bios booting method: A central processing unit of a mainframe system is configured to load a physical graphic card driver into a memory of the mainframe system for performing a display function when the mainframe system is not connected to an Extensible Firmware Interface (EFI) external graphic card. The central processing unit is... Agent: Silicon Motion Inc.

20140244990 - Method and apparatus for prefetching peripheral device drivers for smart phones and other connected devices prior to hlos boot: Apparatus and methods for booting a user equipment are described. A device boot of the user equipment may be performed. Peripherals and associated drivers for the user equipment may be configured. A high-level operating system (HLOS) may be booted. The configuring may occur before the booting of the HLOS. Apparatus... Agent: Qualcomm Incorporated

20140244993 - Method of updating the operating system of a secure microcircuit: A method of loading an operating program in a secure microcircuit, includes the steps of: downloading and installing in the microcircuit a boot program, which is launched upon activation of the microcircuit, loading into the microcircuit initialization data including a first public key, performing a mutual authentication procedure between the... Agent: Inside Secure

20140244994 - Method, apparatus and system for binding mtc device and uicc: A method for binding a Machine Type Communication (MTC) device and a Universal Integrated Circuit Card (UICC) is disclosed. The method includes: during a process of establishment of a shared key, a Network Application Function (NAF) acquires identity information of the MTC device and identity information of the UICC (101);... Agent: Zte Corporation

20140244991 - Patching boot code of read-only memory: The present disclosure describes apparatuses and techniques for patching boot code of read-only memory (ROM). In some aspects, execution of boot code from a ROM is initiated to start a boot process of a device. Execution of the boot code from the ROM is then interrupted to enable execution of... Agent: Marvell World Trade Ltd.

20140244989 - Peer-to-peer network booting: A technique for booting a computing device using a boot image that is downloaded from a distributed network booting system involves identifying a tracker computing device that manages a plurality of computing devices that store all or a portion of the boot image, receiving from the tracker computing device information... Agent: Vmware, Inc.

20140244988 - Self-healing of operating system components: Aspects of the subject matter described herein relate to operating system technology. In aspects, a mechanism is described that allows self-healing actions to correct operating system problems. The self-healing actions may be performed at virtually any time during the loading and executing of operating system components. Earlier placement of the... Agent: Microsoft Corporation

20140244995 - Adaptive media transmission processing: Provided are methods and systems for processing information. In one example method a first frame of a first group of frames of an information transmission can be processed. The first frame can be encoded without reference to other frames of the information transmission. Additionally, a second frame can be processed... Agent: Comcast Cable Communications, LLC

20140244996 - Private discovery of electronic devices: The disclosed embodiments provide a system that facilitates communication between a first electronic device and a second electronic device. During operation, the system uses the first electronic device to create a discovery request comprising a first group identifier (ID) associated with the first electronic device, wherein using the first electronic... Agent: Apple Inc.

20140244997 - Emergency mode for iot devices: Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT) device, an emergency secret key from a trusted authority source The method receives, at an IoT device, an emergency message from the... Agent: Qualcomm Incorporated

20140244999 - Network system, certificate management method, and certificate management program: A network system includes a management apparatus and multiple apparatuses. The management apparatus includes a preparation instruction unit to transmit an instruction to prepare a certificate request to the apparatuses; a collection unit to collect the certificate requests; a request unit to request issuance of certificates to a certificate authority;... Agent:

20140245000 - Secure message delivery using a trust broker: An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When... Agent: Microsoft Corporation

20140244998 - Secure publishing of public-key certificates: The current document is directed to methods and systems for secure provisioning, publication, distribution, and utilization of public-key certificates. These methods and systems employ domain name system (“DNS”) servers implementing the DNS security extensions (“DNSSEC servers”), a publisher component, and additional client-side and server-side functionalities. Public-key certificates provided by the... Agent: Secure64 Software Corporation

20140245001 - Decryption of content including partial-block discard: Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more... Agent: Adobe Systems Incorporated

20140245002 - Method and apparatus for secure data transmissions: An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote client, the request including a public Internet protocol address of the remote client, the request encrypted according to an initial encryption scheme, encrypting the requested... Agent: Ciphertooth, Inc.

20140245003 - Communications method: The present application relates to a method of providing connectivity to a vehicle. The method comprises, at a first device aboard the vehicle, establishing at least one first connection with at least one first network, the at least one first connection allowing communication with a second device remote from the... Agent: Nomad Spectrum Limited

20140245006 - Cryptographic accumulators for authenticated hash tables: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data.... Agent: Brown University

20140245005 - Cryptographic processing method and system using a sensitive data item: A cryptographic processing method using a sensitive data item in a cryptographic processing system including in memory a test making it possible to tell a human and a computer apart and a reference value obtained by applying a cryptographic function to a pair of values P and R, where P... Agent: Oberthur Technologies

20140245004 - Rule sets for client-applied encryption in communications networks: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across... Agent: Surfeasy, Inc.

20140245008 - Systems and methods for controlling email access: Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources.... Agent: Sky Socket, LLC

20140245007 - User authentication system: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically... Agent: Broadcom Corporation

20140245009 - Client control through content key format: Client control may be provided. First, content may be encrypted using an actual key. Then an identifier corresponding to a client device may be received and a transformation may be performed on the actual key and the identifier to produce a transmitted key. The transmitted key and the encrypted content... Agent: Cisco Technology, Inc.

20140245010 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245011 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245017 - Digital tachograph: A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the corresponding checksum are encoded using a secure private key and stored in the digital tachograph in a data format by the security module.... Agent:

20140245012 - Enhancing data security using re-encryption: A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling... Agent: Cellco Partnership (d/b/a Verizon Wireless)

20140245016 - Management system and methods for object storage system: The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. To facilitate creation and... Agent: Vmware, Inc.

20140245013 - Method for interworking with trustzone between normal domain and secure domain, and management method of trusted application download, management server, device and system using it: The present invention provides a trusted application download management, authentication, and execution method and system. A trusted application download management server according to the present invention includes a service loader, which accesses a device equipped with a trusted platform and establishes a data communication channel, and a service controller which... Agent: Sk Planet Co., Ltd.

20140245015 - Offline file access: In embodiments of the present invention improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in... Agent: Intralinks, Inc.

20140245014 - Remote control app for smart phones: Methods and apparatus for a Remote Control App for Smart Phones are disclosed. One embodiment of the present invention is a software application or “App” which may be downloaded to a conventional smart phone (12). Once downloaded to the smart phone (12) and to a remote computer, network or other... Agent: Pascal's Pocket Corporation

20140245019 - Apparatus for generating privacy-protecting document authentication information and method of performing privacy-protecting document authentication using the same: Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for generating the privacy-protecting document authentication information includes an electronic signature information generation unit, a multi-dimensional code generation unit, and a multi-dimensional code output unit. The electronic signature... Agent: Electronics And Telecommunications Research Institute

20140245018 - Systems and methods for media recognition: Certain embodiments described herein provide methods and systems for media recognition. One exemplary embodiment involves recognizing a piece of media in two steps. First, a watermark may be recognized that identifies that the media has a media identifying fingerprint. Second, that fingerprint is retrieved and used to recognize the media... Agent: Adobe Systems Incorporated

20140245020 - Verification system and method with extra security for lower-entropy input records: An authentication system for digital records has a hash tree structure that computes an uppermost, root hash value that may be digitally signed. A random or pseudo-random number is hashed together with hash values of the digital records and acts as a blinding mask, making the authentication system secure even... Agent: GuardtimeIPHoldings Limited

20140245021 - Storage system in which fictitious information is prevented: According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the secure storage by authentication processing, and which is used for encoding processing. The host... Agent: Kabushiki Kaisha Toshiba

20140245022 - Apparatus for verifying and for generating an encrypted token and methods for same: Embodiments show an apparatus for verifying a validity of an encrypted token associated to a product, wherein the apparatus has a decryptor for decrypting an encrypted token using a decryption key to obtain a decrypted token having information bits related to the product and structure bits. The apparatus further has... Agent:

20140245023 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245024 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245025 - System and method for storing data securely: Systems, methods, and media may provide secure data storage. A request may be transmitted for a requested container to a database, the request comprising a requested container identifier of the requested container. The database may comprise containers, wherein each container is identified by a container identifier and comprises at least... Agent: Spideroak Inc.

20140245026 - System and method for resource sharing across multi-cloud arrays: A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are distributed in one or more cloud storage arrays, and each storage resource comprises a unique object identifier that identifies location and structure... Agent: Twinstrata, Inc

20140245027 - Device and method for providing safety of data by using multiple modes in device: A device and method for providing the security of data by using multiple modes in the device are provided. The device includes a storage unit that includes a normal mode data area and a security mode data area which is isolated from the normal mode data area and access to... Agent: Samsung Electronics Co., Ltd.

20140245033 - Dynamic power management of context aware services: The disclosure is directed to modifying the operation of one or more hardware subsystems when a new context awareness service begins. An aspect determines a power budget for a plurality of operating context awareness services including the new context awareness service, wherein the power budget is based on a power... Agent: Qualcomm Incorporated

20140245036 - Electronic apparatus, charging control method, charging system, and data transmission system: A processing unit 103 has a first operation mode in which an operation is enabled using only external power from a feeding device 120 and a second operation mode in which the operation is enabled by feeding from a battery 102 in addition to the external power from the feeding... Agent: Sony Corporation

20140245030 - Method and apparatus for providing power to an electronic device: In an embodiment, set forth by way of example and not limitation a USB power converter for an electronic device includes a USB bus including VBUS power line, a D− data line and a D+ data line, a variable voltage converter, a processor clock, a USB transceiver coupled to the... Agent: Maxim Intergrated Products, Inc.

20140245034 - Multi-level cpu high current protection: Methods and apparatus relating to multi-level CPU (Central Processing Unit) high current protection are described. In one embodiment, different workloads may be assigned different license types and/or weights based on micro-architectural events (such as uop (micro-operation) types and sizes) and/or data types. Other embodiments are also disclosed and claimed.... Agent:

20140245035 - N+1 power supply system upgrade using dual output power supplies: A system may include a power module that includes a group of power supplies, particular ones of the group of power supplies being operable at a group of voltages ranging from a first voltage to a second voltage. The system may further include a controller coupled to the particular ones... Agent: Juniper Networks, Inc.

20140245031 - Optimized power over ethernet power distribution system: A power distribution system includes a manager provided on a network controller and an agent provided on a line module. The manager is operable to receive a configuration for a port on the line module. A connection to the port is then detected by the agent and communicated to the... Agent: Dell Products L.p.

20140245029 - System and method for managing a thermal policy of a receiving device that couples to a portable computing device: A method and system for managing a thermal policy of a receiving device that couples to a portable computing device (PCD) includes automatically detecting a presence of the PCD. After detecting the presence of the PCD, a command to deactivate a thermal sensor and to deactivate a power supply within... Agent: Qualcomm Incorporated

20140245028 - System and method for temperature driven selection of voltage modes in a portable computing device: Various methods and systems for minimum supply voltage level selection in a portable computing device (“PCD”) are disclosed. It is an advantage of the various embodiments that PCD designers may close timing at a certain minimum supply voltage and operating temperature threshold that is higher than the lowest end of... Agent: Qualcomm Incorporated

20140245032 - System and method for thermal management in a portable computing device using thermal resistance values to predict optimum power levels: Various embodiments of methods and systems for thermal energy management in a portable computing device (“PCD”) based on power level calculations are disclosed. An exemplary method includes tracking instantaneous operating temperatures and active power supply levels to one or more components. With an estimate or measurement of ambient temperature, the... Agent: Qualcomm Incorporated

20140245037 - System and method for utilizing standard four wire usb for multiple power modes and out of band state management: A cable for establishing electronic communication between a first device and a second device is described. One end of the cable comprises a standard USB device connector that has four electrical contacts; two for power (VBUS, GND) and two for differential data signals (D+ and D−). The other end of... Agent: Ikingdom Corp.

20140245038 - Electronic device, electronic system, and control method: According to one embodiment, an electronic device to which an AC adaptor is attachable includes a detecting module and a control module. The detecting module detects whether the AC adaptor is attached to the electronic device. The control module controls suppression and non-suppression of power consumption of the electronic device... Agent: Kabushiki Kaisha Toshiba

20140245039 - Information processing apparatus, device control method, and computer program product: According to an embodiment, an information processing apparatus includes: a first control unit to control a first device; and a second control unit to control a second device. The first control unit includes a first request processing unit, a notification unit, and a first execution unit. The second request processing... Agent: Kabushiki Kaisha Toshiba

20140245041 - Apparatus for hibernation control in a device: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com LLC

20140245046 - Communication node: When an ECU serving as a communication node is under sleep mode, a switch portion in a transceiver connects a data transmit port of a microcomputer to a memory controller. The microcomputer sends, to the memory controller, a code write-in request for writing a code while outputting a write data... Agent: Denso Corporation

20140245045 - Control device and computer program product: According to an embodiment, a control device includes a processor setting unit, a resumption data reading unit, and a resumption processing unit. The processor setting unit is configured to identify, among a plurality of processors included in an information processing system, each of which is connected to one or more... Agent: Kabushiki Kaisha Toshiba

20140245049 - Electronic control device and microcomputer control method: Provided are an electronic control device and a microcomputer control method not only enabling smooth transmission and reception of signals by using a plurality of microcomputers but also capable of achieving, with a simpler configuration, reduction of power consumed by the microcomputers. As a mode for reducing power consumption, the... Agent: Toyota Jidosha Kabushiki Kaisha

20140245047 - Information processing apparatus, operation state control method, and computer program product: According to an embodiment, an information processing apparatus that includes a processor, has a first control unit, a power storage unit, and a second control unit. The first control unit is configured to control execution of a process by the processor. The power storage unit is configured to store therein... Agent: Kabushiki Kaisha Toshiba

20140245048 - Lsi and information processing system: The controller LSI is connected to an SPI flash memory having a deep power down mode (DPM), and brings the SPI flash memory to the DPM and then brings itself to low power consumption mode (LPM) that volatilizes data in a RAM. This invention solves the problem that the controller... Agent: Renesas Electronics Corporation

20140245042 - Method for hibernation control based on battery capacity: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com LLC

20140245043 - Method for hibernation control based on charging efficiency: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com Iic

20140245044 - Method for hibernation control based on usage pattern: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com Iic

20140245040 - Systems and methods for managing data in a system for hibernation states: The present application is directed to systems and methods for managing data in a system for hibernation states. In one implementation, a memory device comprises a controller memory, a main memory, a buffer to the main memory and a controller comprising a processor. The processor is configured to manage data... Agent:

20140245053 - Distributed computer system: A local computer (20) and a remote I/O device (30) are interconnected on a network (40) through an upstream side bridge (21) and a downstream side bridge (31). The upstream side bridge (21) and the downstream side bridge (31) each include a register (216, 316) for referring to or writing... Agent: Nec Corporation

20140245051 - Driver circuit powered by two power supplies sequentially activated: A driver circuit including front and rear amplifiers each powered by the primary and secondary power supplies, where the latter power supply is generated from the former power supply. The rear amplifier includes a cascade transistor whose base bias is provided from the bias source. The bias source provides the... Agent: Sumitomo Electric Industries, Ltd.

20140245052 - Method and device for storing an item of wake-up information in users of a can bus system: A device for connecting a user station to a CAN bus, the user station in the active state being able to exchange messages with other user stations via the CAN bus using the device, according to the standard ISO 11898; the user station in the at-rest state being able to... Agent: Robert Bosch Gmbh

20140245050 - Power management for host with devices assigned to virtual machines: A system and method of removing power from a device assigned to a virtual machine running on a host machine includes receiving a request, by a notification module, from the virtual machine to remove power from the device, and receiving, by the notification module, an indication from the virtual machine... Agent: Red Hat Israel,ltd.

20140245055 - Phase-based operation of devices on a polyphase electric distribution system: In one embodiment, a device in a computer network monitors an alternating-current (AC) waveform of an electrical power source at the device, where the power source is part of a polyphase power source system. Once the device determines a particular phase of the polyphase power source system at the device,... Agent: Cisco Technology, Inc.

20140245054 - Power over ethernet dynamic power allocation system: A power allocation system includes a manager provided on a network controller. An agent is provided on a line module coupled to the network controller. The agent is operable to detect a connection of a powered device to a port on the line module and communicate that to the manager.... Agent: Dell Products L.p.

20140245056 - Systems, apparatus and methods capable of shelf management: A method according to one embodiment may include discovering, by software, at least one variable from at least one component populated on a shelf system. The method may also include performing, by the software, at least one shelf management function based on at least one variable. Of course, many alternatives,... Agent:

20140245057 - Multi-processor synchronization using time base counters: A multi-processor system includes a first processor that includes a first time base counter that outputs a first time base count, a second processor that includes a second time base counter that outputs a second time base count, and a communication bus. The first and second processors exchange the first... Agent: Hamilton Sundstrand Corporation

20140245058 - Multi-processor system and method for internal time synchronization and event scheduling of multiple processors: Embodiments of a multi-processor system and method for synchronization and event scheduling of multiple processing elements are generally described herein. In some embodiments, timing marks are provided to the processing elements and a start-timer command is broadcasted to the processing elements after an initial timing mark. The start-timer command instructs... Agent: Raytheon Company

  
08/21/2014 > 66 patent applications in 20 patent subcategories.

20140237221 - Application execution environment setting apparatus and method for mobile terminal: An apparatus and method for application execution environment setting in a mobile terminal are provided. The application execution environment setting apparatus configures application execution environment variables on a per application basis in consideration of variable values assigned by the user in the past.... Agent: Samsung Electronics Co., Ltd.

20140237220 - Configuring a trusted platform module: A method includes storing configuration data for a Trusted Platform Module (TPM) in a pre-boot environment such as Unified Extensible Firmware Interface (UEFI), reading the configuration data, and automatically configuring the TPM based upon the configuration data. The configuring includes storing values of TPM parameters in non-volatile memory of the... Agent: Dell Products, Lp

20140237222 - Multi-model modes of one device: A portable media player may provide multi-modes for a user. Each mode may define different features and content that are customized for a particular mode. Based a selected mode, the media player may provide access to only content, features, hardware, user interface elements, and the like that the user wishes... Agent: Apple Inc.

20140237225 - Information processing apparatus, control method for information processing apparatus, and program: An information processing apparatus includes a first processing unit, a second processing unit which is different from the first processing unit, a supply unit configured to supply a clock to the first processing unit and the second processing unit, and a control unit configured to control the supply unit in... Agent: Canon Kabushiki Kaisha

20140237224 - Network boot system: [SOLVING MEANS] Network boot system 100 includes server 10 and terminal 20 having recording device 22a connecting each other through network 30. The terminal includes a read cache mechanism that stores a cache in a read cache region by a read cache driver. The read cache mechanism includes a mapping... Agent:

20140237226 - Option read-only memory use: Example embodiments disclosed herein relate to altered option read-only memory. A copy of an option read-only memory is stored. The copy is used during a boot process based on a determination that the option read-only memory has been altered.... Agent:

20140237223 - System boot with external media: Various aspects of the present disclosure provide for a system that is able to boot from a variety of media that can be connected to the system, including SPI NOR and SPI NAND memory, universal serial bus (“USB”) devices, and devices attached via PCIe and Ethernet interfaces. When the system... Agent: Applied Micro Circuits Corporation

20140237227 - Processing device, array-type processing device, control method thereof, and information processing system: This invention provides an array-type processing device which can reduce power consumption and can also reduce a processing performance drop caused by switching of configuration information. An array-type processing device, which includes a first domain and a second domain, the device comprises a plurality of processing units which are allocated... Agent: Canon Kabushiki Kaisha

20140237228 - Smart card renewal: A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for use in the renewal process. The data may comprise a certificate. The smart card may... Agent: Dell Products, Lp

20140237229 - Bluetooth device as security access key: This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the... Agent: Apple Inc.

20140237230 - Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method: A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in... Agent: Compugroup Medical Ag

20140237231 - Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method: A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program. The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in... Agent: Compugroup Medical Ag

20140237234 - Enhanced system security: Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data can be encrypted on an internal network of the organization and sent to the third party database system for storage. The third party database system... Agent: Salesforce.com, Inc.

20140237235 - Information processing device, information storage device, server, information processing system, information processing method, and program: Content usage control is realized on condition of the establishment of user authentication without having to communicate with a server or the like. An information storage device such as a memory card stores an encrypted content, a converted title key obtained by converting a title key which is an encryption... Agent: Sony Corporation

20140237233 - Method and apparatus for providing content: Methods and systems for enabling content to be securely and conveniently distributed to authorized users are provided. More particularly, content is maintained in encrypted form on sending and receiving devices, and during transport. In addition, policies related to the use of, access to, and distribution of content can be enforced.... Agent:

20140237232 - Selective shredding in a deduplication system: Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a segment that is used when reconstructing a target file. The directory manager file is modified by deleting a reference... Agent: Emc Corporation

20140237242 - Compact security device with transaction risk level approval capability: The present invention relates to the field of securing electronic transactions and more specifically to systems to indicate and verify the approval of the risk level of a transaction and to systems for generating transaction risk level approval codes.... Agent: Vasco Data Security, Inc.

20140237238 - Document authentication data embedding method and apparatus: A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired. The image is decomposed into a hierarchy of images having a top level and one or... Agent: Adsensa Ltd.

20140237241 - Mapping a glyph to character code in obfuscated data: In a font applying device on a client side in a computer system composed of the client and a server, an obfuscated font storing section stores an obfuscated font in which a character different from a character identified by the server based on a character code and having the same... Agent: International Business Machines Corporation

20140237237 - Message authentication using a universal hash function computed with carryless multiplication: A method for authenticating a message by a wireless device is described. The wireless device obtains the input message. The wireless device generates a keystream. The wireless device computes a message authentication code using the keystream and a universal hash function. The universal hash function is computed using carryless multiplication.... Agent: Qualcomm Incorporated

20140237243 - Method and system for secure over-the-top live video delivery: A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content... Agent: Azuki Systems, Inc.

20140237240 - Method and systems for the authentication of a user: A computer security system used to identify and authenticate a user. In one aspect, a method for identifying and authenticating a user is provided. The method includes establishing a trust between a server machine and an agent on a user machine. The method further includes establishing a session key to... Agent:

20140237236 - Mobile security fob: c

20140237239 - Techniques for validating cryptographic applications: Disclosed are various embodiments for validating cryptographic applications. A cryptographic application is transmitted to a client device. Subsequently, a communication link is established with the transmitted cryptographic application as it executes in the client device. A round-trip time for communications with the transmitted cryptographic application is measured. Validation data and... Agent:

20140237244 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237245 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237246 - Generating a symmetric key to secure a communication link: A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed... Agent: Blackberry Limited

20140237248 - Mobile communication system implementing integration of multiple logins of mobile device applications: In existing mobile implementations, there is a disconnect between the mobile device accessing the network and the applicative services inasmuch as the entity responsible for network access, such as the VPN Gateway, differs from the entity governing access to applications, such as email servers and SharePoint repositories. Therefore existing solutions... Agent:

20140237247 - System and method for provisioning and authenticating via a network: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods... Agent:

20140237249 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237250 - Registration and network access control: In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a... Agent:

20140237253 - Cryptographic devices and methods for generating and verifying commitments from linearly homomorphic signatures: A processor of a device generates a cryptographic commitment by receiving a vector {right arrow over (m)}, a public verification key of a homomorphic signature scheme, and a tag; choosing a signature σ in the signature space; generating a commitment c by running the verification algorithm of the homomorphic signature... Agent: Thomson Licensing

20140237254 - Cryptographic devices and methods for generating and verifying linearly homomorphic structure-preserving signatures: and outputting the signature σ comprising the signature elements (z, r, u). The signature is verified by verifying, in a processor that (M1, . . . , Mn)≠(, . . . , ) and that (z, r, u) satisfy the equalities =e(gz, z)·e(gr, r)·Πi=1ne(gi, Mi), =e(hz, z)·e(h, u)·Πi=1ne (hi, Mi);... Agent: Thomson Licensing

20140237251 - Digital signature system: A message signing system including a processor operative to receive a seed S0 and a number N from an authority providing permission to digitally sign up to N messages for a client device, successively apply a one-way function to the seed S0 yielding a chain having a plurality of values... Agent:

20140237252 - Techniques for validating data exchange: Disclosed are various embodiments for confirming transactions between cryptographic applications. A transaction confirmation is generated using metadata for ciphertext data. The transaction confirmation is signed using a private key of a temporary key pair. The signed transaction confirmation and a public key of the temporary key pair are converted into... Agent:

20140237255 - Decryption and encryption of application data: Examples disclose providing a decryption, validation and encryption process. Specifically, disclosure includes decrypting a first encrypted application data to then validate its integrity. Disclosure also includes encrypting the decrypted application data using a technique different from that used to provide the first encrypted application data and then storing the encrypted... Agent:

20140237256 - Method for securing data using a disposable private key: A method for securing data uses a unitary device to obtain a biometric reading from a user, and to generate a new key pair corresponding to the user's biometrics. The unitary device uses a private key from the key pair to encrypt data or voice, sends the encrypted data or... Agent:

20140237258 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237261 - Process authenticated memory page encryption: A memory controller encrypts contents of a page frame based at least in part on a frame key associated with the page frame. The memory controller generates a first encrypted version of the frame key based at least in part on a first process key associated with a first process,... Agent: Rambus Inc.

20140237257 - Scalable precomputation system for host-opaque processing of encrypted databases: A method, system, and computer program product to generate results for a query to an encrypted database stored on a host are described. The method includes generating indexes from the encrypted database, each index identifying records of the encrypted database associated with a range of data for at least one... Agent: International Business Machines Corporation

20140237262 - System and method for establishing perpetual trust among platform domains: A method may include generating a first shared secret for a present boot session of the information handling system and determining if a second shared secret existed for a prior boot session of the information handling system. If the second shared secret existed for the prior boot session, the method... Agent:

20140237259 - Systems/methods of encryption: Encryption is provided via an algorithm that maps a block of N input bits onto a block of M output bits, wherein M≧N. Encryption also may be provided in accordance with bit/bandwidth expansion, wherein M>N. At least one bit of the block of M output bits may be pseudo-randomly generated... Agent: Eices Research, Inc.

20140237260 - Telecommunications device security: A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment and a secure execution environment The mobile terminal enables the software of the terminal in the secure execution environment to be updated. The terminal may be provided with minimal software initially in the... Agent:

20140237264 - Authentication method: According to one embodiment, an authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in... Agent: Kabushiki Kaisha Toshiba

20140237265 - Logical-to-physical address translation for a removable data storage device: A method for making memory more reliable involves accessing data stored in a removable storage device by translating a logical memory address provided by a host digital device to a physical memory address in the device. A logical memory address is received from the host digital device. The logical memory... Agent: Imation Corp.

20140237263 - Nonvolatile semiconductor memory device and memory system using the same: According to one embodiment, a nonvolatile semiconductor memory device includes a memory cell array and an encryption arithmetic module. The memory cell array includes a first storage area and a second storage area. The first storage area is inhibited from being written into and read from and stores secret key... Agent: Kabushiki Kaisha Toshiba

20140237266 - Secure memory system with fast wipe feature: A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data pages, including loading each data page into a data shuffling buffer in a sequential order relative to other data pages in the page stripe, and... Agent: International Business Machines Corporation

20140237271 - Controlling energizing range of mobile electronic device: An energization range of a laptop PC is controlled for safety component replacement. An EC can communicate with a battery unit to control a FET of the battery unit. In a power-off state, a PWC receives electricity from the battery unit or an AC/DC adapter. In the power-off state, a... Agent: Lenovo (singapore) Pte.ltd.

20140237267 - Dynamically controlling a maximum operating voltage for a processor: In an embodiment, a processor includes voltage calculation logic to calculate a plurality of maximum operating voltage values each associated with a number of active cores of the plurality of cores, based at least in part on a plurality of coefficient values. In this way, the processor can operate at... Agent:

20140237269 - Estimating power usage in a computing environment: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.... Agent: International Business Machines Corporation

20140237268 - Moisture shutdown control: Aspects of shutdown control of a device in the presence of moisture are described. In one embodiment, a moisture detection signal is received from a moisture detector. In turn, certain parameters associated with the moisture detector are identified. For example, the location of the moisture detector may be identified. Additionally... Agent: Broadcom Corporation

20140237270 - Power supply control apparatus, power supply control system and power supply control method: A power supply control apparatus is disclosed. The power supply control apparatus includes a positional-information-obtaining unit configured to obtain positional information of a communication terminal; a process-information-obtaining unit configured to obtain process information requested by a user of the communication terminal; a distance-determination unit configured to, based on positional information... Agent: Ricoh Company, Ltd.

20140237273 - Information processing apparatus, information processing method, and program: An information processing apparatus includes: a wakeup-target identifying section configured to identify a wakeup target in response to a wakeup trigger; and a wakeup processing section configured to wake up the wakeup target identified by the wakeup-target identifying section.... Agent: Sony Corporation

20140237274 - Method for controlling information processing apparatus and information processing apparatus: A method of controlling an apparatus including a processor including a plurality of cores, the method includes, when a number of the cores to be activated is M, determining whether or not a first power consumed by the M activated core is within a range of a second power to... Agent: Fujitsu Limited

20140237272 - Power control for data processor: A data processor includes a data processor core, and a power controller. The data processor core is adapted to control an external memory system and to perform a task by accessing the external memory system, where the task has an associated computation rate, and the data processor is adapted to... Agent: Advanced Micro Devices, Inc.

20140237275 - Multiple critical paths having different threshold voltages in a single processor core: A processor having a multi-Vt critical path is provided that includes both low-Vt devices and high-Vt devices. If the processor is operating in a high performance mode, the multi-Vt critical path is controlled so as to use the low-Vt devices. Conversely, if the processor is operating in a low power... Agent: Qualcomm Incorporated

20140237278 - Controlling power management in micro-servers: Systems and methods of enabling power management in a micro server include providing multiple cores, a power management module coupled to the cores, and one or more peripherals coupled to the power management module. The power management module may be configured to cause the one or more peripherals to delay... Agent:

20140237281 - Data processing system: A data processing apparatus is provided comprising first processing circuitry, second processing circuitry and shared processing circuitry. The first processing circuitry and second processing circuitry are configured to operate in different first and second power domains respectively and the shared processing circuitry is configured to operate in a shared power... Agent: Arm Limited

20140237277 - Hybrid performance scaling or speech recognition: Aspects of the present disclosure describe methods and apparatuses for executing operations on a client device platform that is operating in a low-power state. A first analysis may be used to assign a first confidence score to a recorded non-tactile input. When the first confidence score is above a first... Agent:

20140237276 - Method and apparatus for determining tunable parameters to use in power and performance management: Various method and apparatus embodiments for selecting tunable operating parameters in an integrated circuit (IC) are disclosed. In one embodiment, an IC includes a number of various functional blocks each having a local management circuit. The IC also includes a global management unit coupled to each of the functional blocks... Agent: Apple Inc.

20140237280 - Power supply system and control method: A power supply system includes a plurality of power supply circuits connected to a common output node and a control unit that controls outputs of the plurality of power supply circuits such that an output value at the output node follows an output target value at the output node. The... Agent: Toyota Jidosha Kabushiki Kaisha

20140237279 - Priority based application event control (paec) to reduce power consumption: Methods and apparatus relating to Priority Based Application Event Control (PAEC) to reduce application events are described. In one embodiment, PAEC may determine which applications (and their corresponding sub-system(s)) may cause a processor or platform to exit a low power consumption state. In an embodiment, PAEC may determine which applications... Agent:

20140237282 - Usb peripheral and method of reducing transmission power thereof: Disclosed are a USB peripheral apparatus capable of reducing transmission power of a transmission terminal circuit by significantly increasing resistance values of terminations provided at the transmission terminal circuit and a reception terminal circuit as compared with a specific impedance value of a transmission line, and a transmission power reduction... Agent:

20140237283 - Estimating power usage in a computing environment: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.... Agent: International Business Machines Corporation

20140237284 - Masking power usage of co-processors on field-programmable gate arrays: Technologies are generally described for masking power usage of co-processors on field-programmable gate arrays. In some examples, one or more moat brick circuits may be implemented around a co-processor loaded on a held-programmable gate array (FPGA). The moat brick circuits may be configured to use negative feedback and/or noise to... Agent: Empire Technology Development, LLC

20140237285 - Single-pin command technique for mode selection and internal data access: A single pin is used to control an operating mode of an integrated circuit and to supply serial data to a host controller. The internal operating mode can be changed by changing a static level on an input/output terminal and maintaining that static level longer than a first time threshold.... Agent: Silicon Laboratories Inc.

  
08/14/2014 > 35 patent applications in 20 patent subcategories.

20140229723 - Random access to signal values of an fpga at runtime: A method for accessing a signal value of an FPGA at runtime, including the steps of loading an FPGA hardware configuration into the FPGA, executing the FPGA hardware configuration in the FPGA, requesting a signal value of the FPGA, sending status data from a functional level of the FPGA to... Agent: Dspace Digital Signal Processing And Control Engineering Gmbh

20140229722 - Systems and methods for calibrating the elements of a quantum processor: Systems and methods for improving calibration procedures in a quantum processor architecture are described. For example, a dedicated calibration signal source is built into the architecture of the quantum processor for use during calibration. A single calibration signal source is communicatively coupled to many devices in the quantum processor architecture... Agent: D-wave Systems Inc.

20140229727 - Method and apparatus for fast booting of user device: A method of fast booting of a user device is provided. The method includes detecting a movement of the user device in a power-off state, generating energy corresponding to the movement of the user device, changing the power-off state to a sleep mode state by the generated energy, partly performing... Agent: Samsung Electronics Co., Ltd.

20140229724 - Method and electronic device of file system prefetching and boot-up method: A method of file system prefetching is provided. The method is applicable to an electronic device including a volatile storage, a non-volatile storage, and multiple processors with multiple operating systems. The method includes the following steps. When a first static backup table in the non-volatile storage is not empty, copy... Agent: Htc Corporation

20140229725 - Systems and methods for metadata-driven command processor and structured program transfer protocol: Systems and methods for facilitating on-demand delivery and processing of one or more programs and program-compatible applications on a plurality of different machines. In an embodiment, a metadata-driven command processor on a machine sends a request for a booting program and application to an agent. In response to the request,... Agent: Automatic Data Capture Technologies Group, Inc.

20140229726 - Systems and methods for metadata-driven command processor and structured program transfer protocol: Systems and methods for facilitating on-demand delivery and processing of program(s) and program-compatible application(s) on a plurality of different machines. In an embodiment, a metadata-driven command processor on a machine sends a request for a booting program and application to an agent. In response to the request, the agent invokes... Agent: Automatic Data Capture Technologies Group, Inc.

20140229728 - Data processing device, operation mode switching method and data displaying method thereof: In a method for switching an operation mode of a data processing device, a switching instruction is obtained; and the data processing device is switched to a first operation mode or a second operation mode based on the switching instruction. The second operation mode is a multi-user operation mode.... Agent:

20140229729 - Data security service: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed... Agent: Amazon Technologies, Inc.

20140229730 - Implicit certificate scheme: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data... Agent:

20140229731 - Systems and methods for a cryptographic file system layer: The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies (e.g., by encrypting) data to be stored in a designated directory. The cryptographic file system layer can be used in combination with one or more cryptographic approaches to provide... Agent: Security First Corp.

20140229732 - Data security service: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed... Agent: Amazon Technologies, Inc.

20140229734 - Data management apparatus, power usage calculation system, and data management method: According to an embodiment, a data management apparatus includes a first receiver, a generator, a second receiver, a convertor, and a transmitter. The first receiver is configured to receive first values from at least one power meter, the first values being acquired by encrypting power usage amounts collected by the... Agent: Kabushiki Kaisha Toshiba

20140229733 - System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions: Aspects of the disclosure pertain to a system and method for key wrapping via a storage system to allow secure access to media of the system by multiple authorities with modifiable permissions. The keys used to encrypt ranges of the drive are not stored in plaintext and are recoverable using... Agent: Lsi Corporation

20140229736 - Hierarchical attribute-based encryption and decryption: A domain authority 13 for use in a hierarchy of domain authorities in a hierarchical cryptographic system. The domain authority 13 comprises a user secret key generator 21 for generating a user secret key based on a domain secret key and one or more attribute representations, to obtain a user... Agent:

20140229735 - Managing device ownership and commissioning in public-key encrypted wireless networks: A mobile commissioning device for assisting in the commissioning of wireless public-key encrypted networks, the device being provided with: means for reading the public key from a network node to be integrated in the wireless network, the channel for reading the public key being physically different to the wireless network... Agent: Tridonic Gmbh & Co Kg

20140229737 - Federated key management: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information... Agent: Amazon Technologies, Inc.

20140229738 - Timestamping system and timestamping program: A timestamping system including a plurality of time servers and a timestamping device, the timestamping device including a dividing processing unit dividing an electronic document into a plurality of divided data items by a secret sharing scheme, a distributing processing unit transmitting the divided data items to different servers, respectively,... Agent: Nomura Research Institute, Ltd.

20140229739 - Delayed data access: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information... Agent: Amazon Technologies, Inc.

20140229740 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140229741 - Dual composite field advanced encryption standard memory encryption engine: A different set of polynomials may be selected for encryption and decryption accelerators. That is, different sets of polynomials are used for encryption and decryption, each set being chosen to use less area and deliver more power for a memory encryption engine. This is advantageous in some embodiments since memory... Agent:

20140229742 - Methods and devices for protecting digital objects through format preserving coding: To code a digital object, a sender encrypts its data to obtain a bitstream that is converted into a set of points that are then packaged and the coded object is output. A receiver receives and unpacks the coded object to obtain the set of points, converts the set of... Agent:

20140229744 - Enabling a software application to be executed on a hardware device: The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence of the hardware circuit, while preventing the execution of a binary copy of the application in another hardware device. Challenge data originating from the... Agent: Irdeto B.v.

20140229743 - Malware and tamper resistant computer architecture: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated... Agent: Raytheon Bbn Technologies Corp.

20140229745 - System and method for updating read-only memory in smart card memory modules: A storage device contains a smart-card device and a memory device, both connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it may he used to store a relatively large amount of data in various partitions. One of these... Agent: Micron Technology, Inc.

20140229746 - Authentication method: According to one embodiment, a authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in... Agent: Kabushiki Kaisha Toshiba

20140229748 - Apparatus and method for optimizing use of nvdc chargers: A method includes detecting removal or depletion of a power supply associated with a powered device. The powered device is configured to receive power from a power adapter via a narrow-voltage direct current/direct current (NVDC) charger and from the power supply. The method also includes, in response to the detection,... Agent: Texas Instruments Incorporated

20140229747 - Automatic classification change in power over ethernet device: In one implementation, a classification resistance of a powered device is adjusted passively. The powered device is configured to receive a classification voltage from a network device and, in response, is configured to send a first current indicative of a first classification resistor to the network device. The first current... Agent: Cisco Technology, Inc.

20140229749 - Method and system for discovery, validation and delivery of power through a universal power center: A system and method of discovery, validation and delivery of power to an electronic device through a universal power center is provided. The method comprises providing a power tip for an electronic device with a unique identification and broadcasting the unique identification to a power center. The method further includes... Agent: International Business Machines Corporation

20140229750 - Method and apparatus for per core performance states: A method and apparatus for per core performance states in a processor. Per Core Performance States (PCPS) refer to the parallel operating of individual cores at different voltage and/frequency points. In one embodiment of the invention, the processor has a plurality of processing cores and a power control module that... Agent:

20140229753 - Communication system and communication node: A main body ECU as a slave node includes a switch. The switch is under OFF state when a prohibition signal is outputted from a verification ECU as a master node and under ON state when the prohibition signal is not outputted. The switch is inserted in a reception path... Agent: Denso Corporation

20140229751 - Network interface with low power data transfer and methods for use therewith: A network interface includes a physical layer device coupled to a network link. A media access control module communicates with a link partner over the network link. An energy controller monitors a link utilization level of the network link and transitions, in response to the monitoring, the media access control... Agent: Broadcom Corporation

20140229752 - User device and operation method thereof: An operation method of an electronic device includes performing a sleep mode and at least one function that is allowed during the sleep mode, if at least one preset condition is satisfied.... Agent: Samsung Electronics Co., Ltd.

20140229754 - Power telemetry remote monitoring: Embodiments disclosed herein generally relate to the collection and correlation of power consumption data for mobile devices. Power consumption data for a mobile device is collected and correlated with system activity by monitoring what processes are being run on the CPU and measuring the power being consumed within the mobile... Agent: Nvidia Corporation

20140229755 - Pulse width modulation load share bus: Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (PWM) signals represent output loading of each of the power supply modules over the single wire load share bus. The PWM load share signal width (time... Agent: Microchip Technology Incorporated

20140229756 - Compound universal serial bus architecture providing precision synchronisation to an external timebase: A method of synchronising a compound SuperSpeed USB device, comprising: providing data communication between a host computing device and the compound SuperSpeed USB device across the SuperSpeed USB communication channel; establishing a SuperSpeed USB communication channel to a SuperSpeed USB function of the compound USB device; establishing a non-SuperSpeed synchronisation... Agent: Chronologic Pty. Ltd.

  
08/07/2014 > 70 patent applications in 30 patent subcategories.

20140223152 - Configuring operating system administration capabilities using an embedded workflow engine: Embodiments include methods, systems and computer program products for executing a workflow having a plurality of steps to configure an operating system. The method includes assigning, with a workflow engine operated by a processing device, an owner to each of the plurality of steps and receiving a notification of acceptance... Agent: International Business Machines Corporation

20140223153 - Power mode register reduction and power rail bring up enhancement: Aspects of power mode register reduction and power rail bring up enhancements are described. In one embodiment, an operating parameter for a first power rail is set by power management circuit according to a predetermined programmed setting. In connection with a wait time, the power rail is enabled, and a... Agent:

20140223158 - Booting display control method and related processor chip: A booting display control method and a processor chip are disclosed in the present invention. The processor chip includes at least a first processor, a second processor and a display control module. The second processor is coupled to the first processor. The display control module is coupled to the first... Agent: Mediatek Singapore Pte. Ltd.

20140223159 - Booting method and electronic device: A booting method is provided. In the booting method, a basic input/output system (BIOS) is activated to check a first set value. When the first set value corresponds to a fast boot mode, the BIOS performs a fast boot process, in which the fast boot process is interrupted when the... Agent: Wistron Corporation

20140223154 - Computer system: A computer system is disclosed. The computer system comprises a near field communication (NFC) tag and a computer. The computer comprises a flash read only memory (ROM), a chipset, an NFC module and a central processing unit (CPU). The flash ROM stores a basic input/output system (BIOS) having a default... Agent: Quanta Computer Inc.

20140223157 - Computer system having voice-control function and voice-control method: The invention discloses a computer system having voice-control function. The computer system includes a voice-recognition module, a shared memory, a microcontroller, a power-management module and a central processing unit. The voice-recognition module receives an external voice signal via a microphone and determines whether the external voice signal corresponds to an... Agent: Via Technologies, Inc.

20140223161 - Electronic device and booting method thereof: An electronic device includes: a clock divider configured to divide a received main clock signal and generate a plurality of divided clock signals; a storage configured to store booting data; and a controller which, upon supply of power, is configured to generate the main clock signal and output the main... Agent: Samsung Electronics Co., Ltd.

20140223160 - Electronic device and firmware upgrading method thereof: A firmware upgrading method for an electronic device is provided. The electronic device includes a storage section which stores a firmware image and a controller which executes a boot loader of the electronic device to determine whether the firmware image is damaged, performs a restoration function for the firmware image... Agent: Samsung Electronics Co., Ltd.

20140223155 - Fast learning to train learning machines using smart-triggered reboot: In one embodiment, a triggered reboot of a field area router (FAR) of a computer network is initiated, and gathered states of the FAR are saved. The nodes in the computer network are informed of the triggered reboot, and then feedback may be collected from the nodes in response to... Agent:

20140223156 - Method and apparatus to support separate operating systems in partitions of a processing system: A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to... Agent: Intel Corporation

20140223163 - Secure recovery apparatus and method: A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether... Agent: Google Inc.

20140223162 - System and method for an access controller assisted boot: Systems and methods for reducing problems and disadvantages associated with network boots are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor, a memory communicatively coupled to the processor, and an access controller communicatively coupled to the processor. The access controller has... Agent:

20140223164 - Computer system and remote control method for computer device: A computer system and a remote control method for a computer device are provided. The computer system includes a computer device and a remote device. The computer device includes a network communication unit and an ID table. Before the computer device enters into a power-saving state, the computer device reads... Agent: Acer Incorporated

20140223165 - Data-capable band management in an integrated application and network communication data environment: Techniques for data-capable band management in an integrated application and network communication data environment are described, including storing in memory a first operational mode and a second operational mode, the first operational mode being associated with a parameter and being configured to operate on an input received from one or... Agent: Aliphcom

20140223166 - Dynamic core selection for heterogeneous multi-core systems: Dynamically switching cores on a heterogeneous multi-core processing system may be performed by executing program code on a first processing core. Power up of a second processing core may be signaled. A first performance metric of the first processing core executing the program code may be collected. When the first... Agent: Intel Corporation

20140223167 - Programmable multimedia controller with flexible user access and shared device configurations: In one embodiment, a programmable multimedia controller that is capable of interfacing with and controlling audio, video, telephony or heating ventilation, and air conditioning (HVAC) devices. A first mobile device and a second mobile device of a same type are configured to communicate with the programmable multimedia controller. The first... Agent: Savant Systems, LLC

20140223168 - Testing a configuration change: An approach is provided for testing a change (i.e., configuration change) in a configuration of a computing environment. First configurable attributes of a user identifier (ID) of a user are determined. The user ID was received from an administrative user having an administrative user ID providing the administrative user with... Agent: International Business Machines Corporation

20140223169 - Tcp/ip-based communication system and associated methodology providing an enhanced transport layer protocol: A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a payload of a transport layer protocol, such as TCP or UDP. By employing this enhanced transport layer, a cryptograph... Agent: Into Co., Ltd.

20140223170 - System and method for electronic secure obfuscation network: Described are a secure obfuscation network (SON) and ingress nodes, transit nodes and egress nodes used in such a network. Also described is a method for implementing such a network.... Agent: Chickasaw Management Company, LLC

20140223171 - Methods and apparatus to certify digital signatures: Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the... Agent: At&t Intellectual Property I, L.p.

20140223173 - Information recording device: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the... Agent: Kabushiki Kaisha Toshiba

20140223172 - System, method, server and computer-readable medium for real-time verification of a status of a member of an organization: A method, system, server and computer-readable medium enable verification of a member of an organization and the generation of a session-specific certificate for the member upon receipt of a status report indicating that the member is in good standing with the organization. When the member logs in, the member's credentials... Agent: Clawd Technologies Inc.

20140223174 - Securing a computing device accessory: Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device... Agent: Microsoft Corporation

20140223175 - System, design and process for easy to use credentials management for online accounts using out-of-band authentication: The invention provides an easy to use credential management mechanism for multi-factor out-of-band multi-channel authentication process to protect a large number of documents without the need to remember all the document passwords. When opened, the secure document application generates a multi-dimensional code. The user scans the multi-dimensional code and validates... Agent:

20140223176 - Automating the creation and maintenance of policy compliant environments: Embodiments of the present invention provide for a method, system, and apparatus for creating a policy compliant environment on a computer. In an embodiment of the invention, an encrypted file can be loaded into memory of a computing. The encrypted file can define a security policy for the computing device.... Agent: Steelcloud, LLC

20140223177 - Electronic data sharing device and method of use: An electronic data sharing device configured to exchange a first tag with a corresponding tag from a further electronic data sharing device, wherein the first and second tags provide information that enables respective users of the electronic data sharing devices to share information via a server enabled internet-connected software system... Agent: Blendogy Limited

20140223179 - Computer network system for preventing logging of input data: A computer network system for preventing logging of input data has a client side host computer and a data input and encryption device linked with the host computer for data transmission. The data input and encryption device is fitted with a data input interface for inputting textual data and also... Agent:

20140223181 - Management of group secrets by group members: A method of adding a new device (121) to a device group (110), wherein the device group comprises at least one device (111) that hosts a trusted module (151), the method including: generating keys of the trusted modules (151, 153) and devices (111, 112, 113, . . . , 11N)... Agent: Koninklijke Philips N.v.

20140223180 - Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads: A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a filter may route an encrypted content stream and associated information to a secure partition having a trusted computing component for decryption. Upon decryption, the trusted computing... Agent:

20140223178 - Securing communication over a network using user identity verification: A method for securing communication over a network is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a first encrypted user identifier from a trust... Agent:

20140223182 - Methods and devices for authentication and key exchange: One feature pertains to a content accessing device for securing content. The content accessing device is provisioned with a cryptographic algorithm, and generates a symmetric key also known to a content storage device. The content accessing device sends a first authentication challenge to the content storage device, where the first... Agent:

20140223183 - Apparatus and method for securing digital data with a security token: A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts messages to the secured device, decrypts messages from the secured device and coordinates the encryption and decryption of data on the secured device.... Agent: Redporte, Inc.

20140223185 - Action verification methods and systems: The present invention relates to a method of verifying that an action is authorised by a user, including receiving a request from a first user device to a remote service via a first communications channel to perform an action at the remote service, receiving a user identifier from the first... Agent: Emue Holdings Pty Ltd.

20140223184 - Method and system for authenticating an accessory: A method, system, and connector interface for authenticating an accessory. the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated.... Agent: Apple Inc.

20140223187 - Method for authenticating key information between terminals of a communication link: With the help of a key management protocol, the transmitted key information is authenticated by at least one certificate signed by the terminals, and at least one fingerprint of the public keys or certificate, which were used for authenticating the key information, is added to the useful part of an... Agent: Unify Gmbh & Co. Kg

20140223186 - System and method for verifying digital signautes on certificates: A system and method for verifying a digital signature on a certificate, which may be used in the processing of encoded messages. In one embodiment, when a digital signature is successfully verified in a signature verification operation, the public key used to verify that digital signature is cached. When a... Agent: Blackberry Limited

20140223188 - Device: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in... Agent: Kabushiki Kaisha Toshiba

20140223189 - Method and device for unlocking screen: A method for unlocking a screen of a device, including: detecting an inputting operation on the device for inputting an unlock password, the inputting operation causing one character to be inputted to the device; performing, in response to the detecting, a comparison to determine whether all input characters corresponding to... Agent: Xiaomi Inc.

20140223190 - Web-based security authentication: A method and system for performing a security authentication. A name of a user, N sequences of digits, and encrypted values respectively corresponding to the digits in the N sequences are transmitted to a destination device. Each sequence includes a same M unique digits and begins with a different digit,... Agent: Softlayer Technologies, Inc.

20140223191 - Communication system and authentication card: One of the objects of the present invention is to provide a communication system in which biometrics can be utilized without leaking to a third person so that a strict personal authentication can be conducted. The communication system includes, storing a correspondence table in a card, storing a reference password... Agent: Semiconductor Energy Laboratory Co., Ltd.

20140223194 - Cryptographic system of symmetric-key encryption using large permutation vector keys: A method for use in encrypting data using a computer. The method comprises receiving data to be encrypted, defining a set of byte codes comprising user byte codes, storing a transformation vector defined from the set of byte codes, retrieving the transformation vector from the memory, transforming a block of... Agent:

20140223192 - Method for protecting the integrity of a fixed-length data structure: One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by... Agent: Qualcomm Incorporated

20140223193 - Signature verification apparatus, signature verification method, program, and recording medium: A signature verification apparatus including a signature acquisition unit configured to acquire a digital signature including first information generated based on a pair of multi-order multivariate polynomials F=(f1, . . . , fm) defined in a ring K, a signature key s which is an element of a set Kn,... Agent: Sony Corporation

20140223195 - Encrypted storage device for personal information: An encrypted storage device for personal information has a control module, a plug and play interface and a storage unit. The Control module has an encryption module and a processing module electrically connected the encryption module and driving the encryption module to perform an encryption/decryption operation. The plug and play... Agent:

20140223197 - Method and apparatus for memory encryption with integrity check and protection against replay attacks: A method and apparatus to provide cryptographic integrity checks and replay protection to protect against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator.... Agent:

20140223196 - Methods and systems for storing and retrieving data: Through use of the technologies of the present invention, one is able to store and to retrieve data efficiently. One may realize these efficiencies by coding the data and storing coded data that is of a smaller size than original data.... Agent:

20140223198 - Secure replay protected storage: Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various... Agent:

20140223199 - Adaptive temperature and power calculation for integrated circuits: Methods, apparatus, and fabrication processes relating to thermal calculations of an integrated circuit device are reported. The methods may comprise determining a power consumption by a power entity of an integrated circuit, the power entity comprising at least one functional element of the integrated circuit; determining a temperature of a... Agent: Advanced Micro Devices, Inc.

20140223200 - Charger detection and optimization prior to host control: Aspects of charger detection and optimization prior to host control are described herein. In various embodiments, a condition of whether reverse current is present on a system bus is detected. When the condition for reverse current is present, reverse current is sunk by one or more of various reverse current... Agent:

20140223202 - Electronic device and starting up method thereof: An electronic device includes a read only memory (ROM), a processing unit coupled to the ROM, a first sensing area coupled to the processing unit and a second sensing area coupled to the processing unit. The processing unit starts up when the first sensing area and the second sensing area... Agent: Hon Hai Precision Industry Co., Ltd.

20140223204 - Power supply apparatus, image forming apparatus, power supply method, and storage medium: A power supply apparatus includes a charging mode information receiving unit configured to receive, from each of a plurality of power receiving apparatuses each including a secondary battery, charging mode information indicating whether each of the power receiving apparatuses requests normal charging of the secondary battery or fast charging of... Agent: Canon Kabushiki Kaisha

20140223203 - System and method for creating high powered emc compliant power supply for industrial and military applications: The present invention is an apparatus and method for provisioning a compact power filter connection to a well-grounded connector in such a way as to include a capacitive and inductive circuit connection, extremely near the connector and filter, such that EMC compatibility is created in a space roughly 30% of... Agent:

20140223201 - Techniques for solar cell management for computing devices: Embodiments of an apparatus, system and method are described for managing one or more solar cells for a mobile computing device. An apparatus may comprise, for example, a power management module operative to manage a power output received from a plurality of solar cells and an interface management module operative... Agent:

20140223208 - Cognitive power management for memory dominated wireless communication systems: A power management technique utilizing a method for accurately and rapidly estimating the change in the statistical distribution of data at each block in a communication system leading to or originating from a memory that is experiencing voltage scaling induced errors is disclosed. An appropriate memory supply voltage that maximizes... Agent: The Regents Of The University Of California

20140223209 - Media content caching: A playback device includes tangible storage configured to receive transfer of media content from a remote communications device to the playback device while the remote communications device is operating in a high power mode. Interface logic is coupled to the tangible storage and configured to signal the remote communications device... Agent: Seagate Technology LLC

20140223205 - Multiple voltage identification (vid) power architecture, a digital synthesizable low dropout regulator, and apparatus for improving reliability of power gates: Described is an apparatus comprising: first and second processing cores; and a PCU which is operable to: generate a first VID for an off-die regulator external to the apparatus, the first VID resulting in a first power supply for the first processing core; and generate a second VID different from... Agent:

20140223207 - Power control device and power control method: The present invention provides a power control device, a machine comprising the same and a power control method. The device is used for an integrated machine comprising a thin client and a display and comprises: a current detecting unit for detecting the current flowing through a port in the thin... Agent: 3m Innovative Properties Company

20140223206 - System and method for power reduction by sequestering at least one device or partition in a platform from operating system access: In some embodiments, the invention involves a system and method relating to managing power utilization in systems having multiple processing elements. In at least one embodiment, the present invention is intended to control the sleeping/wakefulness of processing elements, as necessary, to maintain a preferred level of power utilization in the... Agent:

20140223211 - Regulating the activity of a core: It is proposed a method for regulating the activity of a core running at a given clock rate. The method comprises: monitoring (S100) a value of a parameter of the core, the parameter being a critical parameter for a safe operating of the core; determining whether the monitored value reaches... Agent: St-ericsson Sa

20140223210 - Tunable sector buffer for wide bandwidth resonant global clock distribution: A wide bandwidth resonant clock distribution comprises a clock grid configured to distribute a clock signal to a plurality of components of an integrated circuit and a tunable sector buffer configured to receive the clock signal and provide an output to the clock grid. The tunable sector buffer is configured... Agent: International Business Machines Corporation

20140223212 - Power management circuit, power management method, and computer system: A power management circuit is provided. The power management circuit includes a power switch, a current/voltage detector, a current setting unit, and a control unit. The power switch is coupled to a power supply of the computer system. When the power switch is turned on, it supplies an output current... Agent: Nuvoton Technology Corporation

20140223214 - Dynamic power mode switching per rail: Aspects of dynamic power mode switching per rail based on power profiling are described. In one embodiment, an amount of current supplied by at least one of a plurality of power rails is sensed with a current sense circuit. The amount of current is profiled over a period of time... Agent:

20140223213 - Memory system: According to one embodiment, a memory system includes a nonvolatile memory, a controller configured to control an operation of the nonvolatile memory, a connector electrically connected to a host device, a power supply circuit configured to electrically connect the connector to the controller and the nonvolatile memory, and a power... Agent:

20140223216 - Power management of low power link states: A method and apparatus for intelligent power management for low power link states. Some embodiments include methods, apparatuses, and systems for a device coupled to a controller via a link; a link power management engine to alter a power state of the link based on a transaction and some knowledge... Agent:

20140223215 - System and method for power management of storage resources: A system and method for power management of storage resources are disclosed. A method may include detecting an occurrence of an event associated with a storage resource disposed in an array of storage resources. The method may further include transitioning the storage resource into a specified power state in response... Agent:

20140223217 - Power and system management information visibility: Aspects of power and system management information visibility are described. In various embodiments, a system parameter of a system is measured. The system parameter may include one or more parameters such as system voltages, temperatures, options, or conditions of the system. The system parameter may be evaluated by a power... Agent:

20140223218 - Power meter with effective measurements: A power monitoring system includes a plurality of current sensors suitable to sense respective changing electrical current within a respective conductor to a respective load and a conductor sensing a respective voltage potential provided to the respective load.... Agent:

20140223219 - Clock frequency controller for a processor and method of operation thereof: A clock frequency controller for a processor and a method of operation thereof. The clock frequency controller may be embodied in a processor, including: (1) a processing core operable at a clock frequency to undertake a processing of a graphics application, and (2) a clock frequency controller coupled to the... Agent: Nvidia Corporation

20140223220 - Clock selection circuit and method: The invention provides a clock select circuit and method which uses feedback arrangements between latches in different branches, with each branch for coupling an associated clock signal to the circuit output. An override circuit is provided in one of the feedback arrangements for preventing a latching delay in that feedback... Agent: Nxp B.v.

20140223221 - Approach to clock frequency modulation of a fixed frequency clock source: A modulated clock device is provided that includes an update device for updating a phase of the modulated clock device. In one example, the update device includes an update phase multiplexer coupled to an output phase multiplexer of an output clock generator and configured to receive an input clock signal... Agent: Nvidia Corporation

Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery


######

RSS FEED for 20140828: xml
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.

######

Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.



Results in 1.34301 seconds

PATENT INFO