|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
Recent | 14: Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: supportBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 09/25/2014 > 47 patent applications in 23 patent subcategories.
20140289505 - Boot partitions in memory devices and systems: The present disclosure includes boot partitions in memory devices and systems, and methods associated therewith. One or more embodiments include an array of memory cells, wherein the array includes a boot partition and a number of additional partitions. Sequential logical unit identifiers are associated with the additional partitions, and a... Agent: Micron Technology, Inc.
20140289504 - Computer with starting up keyboard: A computer includes a keyboard, a PCB, a south bridge chip, a BIOS chip, a buffer circuit, and a USB switch. The PCB includes a USB connector connected to the keyboard. The BIOS chip is connected to the south bridge. The USB switch includes a control pin and a first... Agent: Hong Fu Jin Precision Industry (wuhan) Co., Ltd.
20140289506 - Apparatus and method for updating a device: An apparatus for updating a device, includes: a card configured to include a first device; a controller configured to acquire first circuit data from the card and to update a second device by using the first circuit data; and a storage unit configured to store, from the card, second circuit... Agent: Fujitsu Limited
20140289507 - Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content: The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and... Agent: Bassilic Technologies LLC
20140289508 - Method, client and system of identity authentication: A method, client device and system of identity authentication are provided. The method may include detecting a login or registration operation, to a server, via a login interface on a user interface of an application client. In response, identity information and an identifier of the application client may be determined... Agent: Tencent Technology (shenzhen) Company Limited
20140289509 - System and method for delegating trust to a new authenticator: A system, apparatus, method, and machine readable medium are described for delegating trust to a new client device or a new authenticator on a trusted device. For example, one embodiment of a method comprises: implementing a series of trust delegation operations to transfer registration data associated with one or more... Agent:
20140289510 - Configuration profile validation on ios based on root certificate validation: An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and... Agent:
20140289511 - Configuration profile validation on ios using ssl and redirect: An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and... Agent:
20140289512 - Method for certificate generation and revocation with privacy preservation: Embodiments of the present invention are directed to methods and systems for generating and revoking, as well as validating, certificates used to protect communications within networks while maintaining privacy protection. In the context of a method, certificate generation and revocation with privacy preservation comprises determining a secret value to be... Agent: Industrial Technology Research Institute
20140289513 - Enabling comparable data access control for lightweight mobile devices in clouds: A new efficient framework based on a Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) approach. CCP-CABE assists lightweight mobile devices and storing privacy-sensitive sensitive data into cloudbased storage by offloading major cryptography-computation overhead into the cloud without exposing data content to the cloud. CCP-CABE extends existing attribute-based data access control... Agent: Arizona Board Of Regents On Behalf Of Arizona State University
20140289514 - Secure transfer and tracking of data using removable nonvolatile memory devices: A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as... Agent:
20140289515 - Digital rights management retrieval system: A digital rights management retrieval system is provided. In some embodiments, a digital rights management system includes receiving a first notification from a first client device of a first protected content transaction for a first user with a first content distributor, wherein the first notification includes a first network address... Agent: Adobe Systems Incorporated
20140289516 - Portable digital vault and lending of same: A portable digital vault and related methods are disclosed that can provide a digital equivalent to the physical act of lending copyrighted content (such as a book or CD) while also providing security to prevent copying of the content. The vault acts as a self-contained authority that contains permissions relating... Agent: Infosys Limited
20140289518 - Method and apparatus for privately and securely sharing information using public social or sharing network infrastructure: A method of securely storing and sharing information through social networking websites is disclosed. The method makes it possible to proscribe image data that retains information even through the JPEG compression process typically used in social networking sites. This embedding technique is coupled with encryption and information salting techniques to... Agent:
20140289517 - Methods and apparatuses for securing tethered data: Embodiments of a method and apparatus for securing and accessing files are generally described herein. In some embodiments, the method includes adding a communication portion to the file. The communication portion may communicate with an authentication agent on the first computing device. The method may include encrypting data of the... Agent:
20140289520 - Communication device, communication system, communication method, and computer program product: According to an embodiment, a communication device is connected to a first network and a second network. The communication device includes a generating unit and a converting unit. The generating unit is configured to generate a first set of route information that is route information of the first network. The... Agent: Kabushiki Kaisha Toshiba
20140289519 - Entities with biometrically derived keys: Techniques for introducing managed entities to management entities are provided. A presence notification message encrypted with a biometrically derived key may be sent by a managed entity. A management entity may receive the encrypted presence notification message and attempt to decrypt the message. The management entity may encrypt a command... Agent: Hewlett-packard Development Company, L.p.
20140289522 - Modular wireless communicator: A wireless communicator including a housing, wireless communication functionality located within the housing, native user interface functionality cooperating with the wireless communication functionality and including user interface surfaces located on at least one outer facing surface of the housing, and pouching responsive electrical interconnection functionality responsive to pouching orientation of... Agent: Google Inc.
20140289521 - Reoccurring keying system: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action... Agent: Comcast Cable Communications, LLC
20140289523 - Systems and methods for authenticating and protecting the integrity of data streams and other data: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least... Agent:
20140289524 - Methods and apparatuses for reducing or eliminating unauthorized access to tethered data: Embodiments of a method and apparatus for reducing or eliminating unauthorized access to secured files are generally described herein. In some embodiments, the method includes establishing a connection between a communication portion of the secured file and an authentication agent. The method may include requesting a decryption key from the... Agent:
20140289526 - Authenticator, authenticatee and authentication method: According to one embodiment, an authentication method between an authenticatee which stores key information having a data structure composed of a key transition record, secret information XY of a matrix form, and secret information XYE which is created by encrypting the secret information XY, and an authenticator which authenticates the... Agent:
20140289529 - Content data reproduction system and recording device: To exclude any unauthorized device from a system and thereby prevent illegal use of content data, a memory card 10 stores a service key Ksrv for encrypting content key data Kc in a hidden area 14. The memory card 10 stores answer data AC to be obtained when question data... Agent:
20140289527 - Encrypted communication device and method: An encrypted communication device includes: a pattern generation unit configured to judge whether or not a security association including as matching data a data portion whose data pattern matches between data in a packet targeted for processing and data in a sample packet is to be generated; a key information... Agent: Fujitsu Limited
20140289525 - System and method for decentralized management of keys and policies: Various embodiments of a system and method for decentralized management of keys and policies are described. Various embodiments may include a computer system configured to receive a request from a remote computer system associated with a recipient of content. Such request may include an encrypted content encryption key that is... Agent:
20140289528 - System and method for privacy-enhanced data synchronization: A system, apparatus, method, and machine readable medium are described for establishing a trust circle between multiple devices. For example, one embodiment of a method comprises: transmitting first data from a first device to a second device over a secure communication channel, the first data including at least one key... Agent:
20140289530 - Systems and methods for content delivery: A system, computer-readable storage medium storing at least one program, and computer-implemented method for content delivery is provided. A content sharing session is established between a user device and a content system. Content primitives are generated from a content item controlled by the content system. Each of the generated content... Agent: Netapp, Inc.
20140289531 - Communication system, relay device, and non-transitory computer readable medium: A communication system includes a first relay device connected to a first network accessible by any user, and a second relay device connected to a second network accessible by a specific user. The first relay device includes a first receiver, a first authentication information acquisition unit, and a first transmitter.... Agent: Fuji Xerox Co., Ltd.
20140289532 - Validity determination method and validity determination apparatus: A validity determination method includes having a receiving apparatus of electronic data identify a public key corresponding to an electronic signature attached to the received electronic data among one or more public keys having respective valid terms, send a resend-request of the electronic data if the identified public key is... Agent: Fujitsu Limited
20140289533 - Secure time functionality for a wireless device: The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated... Agent:
20140289534 - Systems, methods and apparatus for multivariate authentication: Systems, methods, and apparatus are disclosed for electronically sharing data using authentication variables, such as biometrics and contextual data. Example contextual data includes machine identifications (IDs) and data collected from sensors of computing devices.... Agent:
20140289535 - Cryptographic system and methodology for securing software cryptography: A cryptosystem having a secure Cryptographic Virtual Machine (CVM) protected by a Tamper-Proof Virtual Layer (TPVL) for performing cryptography in software is described. The CVM and TPVL allow software applications to store and process cryptographic keys and data in a secure and tamper-proof manner, without requiring the use of a... Agent: V-key Inc.
20140289536 - Device, system and method for securing and comparing genomic data: The present disclosure presents methods, systems, and devices for encrypting and comparing genomic data. The comparison of genomic data allows the owner of the data to ensure security of the data even when the party conducting the comparison is beyond the control of the owner of the data. The encryption... Agent: Genformatic, LLC
20140289537 - Encryption system and method of encrypting a device: An encryption system (10) and method for a computing device (100) having an encrypted operating system (50) is disclosed. The encryption system (10) includes a pre-operating system (20) and an encrypted start-up module (40). The pre-operating system (20) is executed on start-up of the computing device (100) and is configured... Agent: Becrypt Limited
20140289539 - Methods and systems for storage of large data objects: A storage service receives a binary large object (blob) for storage, and the service creates first and second sets of data chunks from the blob. The chunks in the first set together equal the blob, and the service uses one or more encryption keys to encrypt each of the data... Agent: Google Inc.
20140289538 - Semiconductor device: A semiconductor device in related art has a problem that security on confidential information stored is insufficient. A semiconductor device of the present invention has a unique code which is unique to a device and generates unique code corresponding information from the unique code. The semiconductor device has a memory... Agent: Renesas Electronics Corporation
20140289540 - Programmable power supply: The present invention provides a method of programming a programmable power supply. In the method, a requesting signal is generated in a device, and the requesting signal is received in the programmable power supply. Then, an output voltage of the programmable power supply is determined in accordance with a frequency... Agent: System General Corporation
20140289541 - Dynamic power control: Systems and methods are provided that facilitate power management in a processing device. The system contains a power management component and a coupled to the processing device. The power management component determines and input rate and target voltages and/or frequency. The power management component can scale voltages and/or frequencies based... Agent: Applied Micro Circuits Corporation
20140289542 - Electronic device controlling user setting depending on battery state, computer readable medium, and method for deciding permission/ prohibition of selection: An electronic device includes: a storage battery; a residual quantity detection section that detects an electrical storage residual quantity of the storage battery; a setting member for receiving an input of a user setting including a plurality of options; a permission/prohibition deciding member that decides whether or not selection of... Agent: Casio Computer Co., Ltd.
20140289543 - Estimating and preserving battery life based on usage patterns: Embodiments apply user-specific usage patterns to estimate and preserve remaining battery life on a computing device. An amount of battery drain and an execution context are determined and stored for a plurality of recurring time periods. The execution context identifies operations executed by the computing device, signal strength, and other... Agent:
20140289545 - Information processing apparatus and method of controlling information processing apparatus: An information processing apparatus includes a memory, and a processor coupled to the memory and configured to set an operating frequency of the processor at a first value in response to an occurrence of a first event, when a second event occurs after the occurrence of the first event, to... Agent: Fujitsu Limited
20140289544 - Methods and apparatuses for switch power down: The discussion makes reference to methods and apparatuses for message-driven switch power, power control, and central processing unit (CPU)-assisted full switch power-down. The link layer in computer networking can be used to save power in switching elements.... Agent:
20140289548 - Method of forming a detection circuit and structure therefor: In one embodiment, a power supply controller is configured to use a current to detect two different operating conditions on a single input terminal.... Agent: Semiconductor Components Industries, LLC
20140289547 - Microcontroller and method of controlling the same: A microcontroller includes a CPU (Central Processing Unit), a data input unit, and an oscillator that supplies a clock signal in response to operational modes of the microcontroller. The operational modes include a STOP mode, a SNOOZE mode and a RUN mode, in the STOP mode, the oscillator and the... Agent: Renesas Electronics Corporation
20140289546 - Power management using reward-based sleep state selection: Systems and methods may provide for conducting a reward determination for a plurality of sleep states to obtain a plurality of reward determinations with respect to a device. In addition, a sleep state may be selected for the device from the plurality of sleep states based at least in part... Agent:
20140289549 - Methods and apparatuses for computer power down: The discussion makes reference to methods and apparatuses for network controlled computer power down. The link layer in computer networking can be used to save power in computers.... Agent: Broadcom Corporation
20140289550 - Integrated clock architecture for improved testing: A computer system includes a first on-chip controller and a second on-chip controller, both connected to a control element. In normal operation, the first and second on-chip controllers operate in different clock domains. During testing, the control element causes each on-chip controller to generate a substantially similar clock signal. The... Agent: Lsi Corporation09/18/2014 > 218 patent applications in 45 patent subcategories.
20140281444 - Enabling alternate usage modes in an operating system: An embodiment provides an information handling device, including: a display panel and a base component connected by a hinge between the display panel and the base component, the hinge supporting a tent physical configuration and a stand physical configuration; one or more processors; an operating system; and instructions accessible to... Agent: Lenovo (singapore) Pte. Ltd.
20140281443 - Encrypted warranty verification and diagnostic tool: According to one embodiment of the present disclosure, an approach is provided in which a diagnostic system retrieves encrypted utilization data from an electronic system that were generated from utilization data corresponding to the electronic system's usage. The diagnostic system decrypts the encrypted utilization data and determines whether the decrypted... Agent: International Business Machines Corporation
20140281446 - Method for initializing expended modules in programmable logic controller system: A method for initializing expended modules in PLC (Programmable Logic Controller) system is provided in which an initialization request signal is generated and transmitted to a plurality of expended modules, when one basic unit initializes a plurality of expended modules, and an initialization completion signal is sequentially transmitted by the... Agent: Lsis Co., Ltd.
20140281445 - Processor having frequency of operation information for guaranteed operation under high temperature events: A processor is described having a semiconductor chip having non volatile storage circuitry. The non volatile storage circuitry has information identifying a maximum operational frequency of the processor at which the processor's operation is guaranteed for an ambient temperature that corresponds to an extreme thermal event.... Agent:
20140281447 - Single-chip virtualizing and obfuscating communications system for portable computing devices: A virtualizing and obfuscating communications firmware module may be incorporated into common, mass-market portable computing devices, such as smartphones and tablets, to provide this service. The disclosure encompasses authentication and obfuscation software components that may comprise trusted firmware whose operation is protected from the main portable device operating system that... Agent: Green Hills Software, Inc.
20140281466 - Boot sequencing for multi boot devices: A multi-boot device capable of booting from a plurality of boot devices, each storing a boot image. The multi-boot device determines which boot device to load based on sequence numbers assigned to each of the boot devices. Some embodiments will make this determination using only hardware operations. The multi-boot device... Agent:
20140281465 - Dual boot panel swap mechanism: A central processing unit with dual boot capabilities is disclosed comprising an instruction memory further comprising a first and second memory area which are configured to be individually programmable, wherein first and second memory area can be assigned to an active memory from which instructions are executed and an inactive... Agent:
20140281454 - Fast hot boot of a computer system: Apparatus and computer program products implement embodiments of the present invention that enable a computer that is executing a first operating system kernel to load a second operating system kernel and one or more software components to a region in a memory. Using functions incorporated in the kernel, the region... Agent: International Business Machines Corporation
20140281463 - Fast hot boot of a computer system: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer that is executing a first operating system kernel to load a second operating system kernel and one or more software components to a region in a memory. Using functions incorporated in the kernel, the... Agent: International Business Machines Corporation
20140281450 - Live initialization of a boot device: Apparatus and computer program products implement embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and upon reaching a boot level threshold for the software stack, the software stack is... Agent: International Business Machines Corporation
20140281459 - Live initialization of a boot device: Methods, apparatus and computer program products implement embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and upon reaching a boot level threshold for the software stack, the software stack... Agent: International Business Machines Corporation
20140281456 - Method and apparatus for implementing a secure boot using multiple firmware sources: Technologies for implementing a secure boot using multiple firmware sources are described. One or more fuses of a processing device can be configured. Based on such configuration, one or more keys can be generated. Based on the configuration of the various fuses, an operation of a firmware device can be... Agent:
20140281457 - Method for booting a heterogeneous system and presenting a symmetric core view: A heterogeneous processor architecture and a method of booting a heterogeneous processor is described. A processor according to one embodiment comprises: a set of large physical processor cores; a set of small physical processor cores having relatively lower performance processing capabilities and relatively lower power usage relative to the large... Agent:
20140281464 - Method of implementing magnetic random access memory (mram) for mobile system-on chip boot: A method of booting a system on chip (SoC) includes using an on-chip MRAM located in the SoC, to store a boot software that includes a start-up software, boot loaders, and kernel and user-personalized information in an on-chip magnetic random access memory (MRAM) located in and residing on the same... Agent: Avalanche Technology, Inc.
20140281449 - Method of installing virtual service processor (vsp) to computing device and application of the same: Method, system, and storage media for remotely installing a virtual service processor (VSP) to a computing device are disclosed. The computer device initiates a preboot execution environment (PXE) client and receives a VSP installation file from a PXE server. The VSP installation file includes a VSP file, a universal plug... Agent: American Megatrends, Inc.
20140281455 - Multi-boot or fallback boot of a system-on-chip using a file-based boot device: A method includes initiating a boot of a system-on-chip coupled to a boot device. The boot is initiated from boot code stored in nonvolatile memory responsive to a power-on-reset. Under control of the boot code: a first register value is loaded into a register; a name string from the boot... Agent: Xilinx, Inc.
20140281469 - Providing a function of a basic input/output system (bios) in a privileged domain: A privileged domain includes a function of a Basic Input/Output System (BIOS). A request to access the function of the BIOS is routed to the privileged domain.... Agent:
20140281451 - Recovering from a defective boot image: Apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second memory... Agent: International Business Machines Corporation
20140281460 - Recovering from a defective boot image: Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second... Agent: International Business Machines Corporation
20140281453 - Self-healing using a virtual boot device: Apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer having a memory and a physical boot device failing to successfully load... Agent: International Business Machines Corporation
20140281462 - Self-healing using a virtual boot device: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer having a memory and a physical boot device failing to successfully... Agent: International Business Machines Corporation
20140281452 - Self-healing using an alternate boot partition: Apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures... Agent: International Business Machines Corporation
20140281461 - Self-healing using an alternate boot partition: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer... Agent: International Business Machines Corporation
20140281467 - System and method for execution of a secured environment initialization instruction: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads... Agent:
20140281458 - System and method for predicting and improving boot-up sequence: A method for optimizing a boot up sequence includes, during a host idle time or during data transfer: obtaining a predicted read address from the a prediction table, prefetching from the non-volatile data store, and saving the prefetched data in memory. Also included is receiving a current read command issued... Agent: Sandisk Technlogies Inc.
20140281448 - System and method to reduce service disruption in a shared infrastructure node environment: A method of reducing downtime in a node environment is disclosed. The method includes identifying an originating system board of a plurality of system boards that requires service where the originating system board includes a node operating on a processor. The method further includes identifying a target system board of... Agent:
20140281468 - Virtual bus device using management engine: A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is... Agent:
20140281470 - Electronic device mode detection: In embodiments of electronic device mode detection, a mode detection application, implemented on an electronic device, correlates an identifier of a wireless device and an activity of the electronic device based at least in part on multiple instances of detecting the identifier of the wireless device during the activity of... Agent: Motorola Mobility LLC
20140281475 - Method and system for provisioning a computing device based on location: A method and system for provisioning a computing device based on location is disclosed herein. The computing device may be provisioned with first content based on a first location. The method includes the step of detecting a first change in the location of the computing device such that the computing... Agent:
20140281473 - Minimizing switchover time in a hot swappable program memory: A method for hot swapping program code includes defining a predetermined range of new code from which to execute; identifying from the new code one or more system components which require a reinitialization or reset; reinitializing or resetting the one or more system components; and executing the new code.... Agent: Microchip Technology Incorporated
20140281476 - Particle counter with integrated bootloader: An airborne or liquid particle sensor with integrated bootloader. A particle sensor incorporating at least one bootloader for programming or retrieval of program or data in local memory.... Agent: Particles Plus, Inc.
20140281474 - System and method for unattended out of band job execution: Systems and method for providing unattended out of band job execution are disclosed. The systems and methods may include scheduling a job for execution by a host system, determining an attribute value, the attribute value associated a component of the host system, and determining a shadow attribute value, wherein the... Agent:
20140281471 - Systems, methods, and media for managing an entertainment system: Systems, methods, and media for managing an entertainment system are provided. In some implementations, systems for managing an entertainment system are provided, the systems comprising: at least one hardware processor configured to: detect a first instruction; select a component of the entertainment system; determine a first state of the component;... Agent:
20140281472 - Use case based reconfiguration of co-processor cores for general purpose processors: A wireless mobile device includes a configurable co-processor core(s). The wireless mobile device also includes a multi-core central processing unit coupled to a memory and the configurable co-processor core(s). The multi-core central processing unit may select from a set of hardware accelerators according to a user's use pattern. The wireless... Agent: Qualcomm Incorporated
20140281478 - Configuring secure wireless networks: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and... Agent: Oplink Communications, Inc.
20140281479 - Environmental measurement display system and method: Environmental measurement display systems that can be used in home and commercial environments are disclosed. The environmental measurement display system can include an environmental sensor array, signal-processing circuitry, a power supply, a display device, a communications system, a data storage system, and a remote data visualization system.... Agent: Leeo, Inc.
20140281477 - Secure cloud storage and encryption management system: An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to the storage system. The devices have secure out-of-band cryptoprocessors that conceal a private key. The private key corresponds to a public key that is... Agent:
20140281481 - Dlna/dtcp stream conversion for secure media playback: A process for converting a DTCP-IP transport stream into HLS format, comprising receiving an encrypted DTCP-IP transport stream comprising DTCP frames at a secondary device from a source device, with each of the plurality of DTCP frames comprising encrypted 16-byte portions, forming chunks from the DTCP frames by grouping encrypted... Agent: General Instrument Corporation
20140281482 - Secure storage and sharing of user objects: Information objects model real-world objects or concepts that may be associated with users, such as vehicles, homes, people, animals, accounts, places, and the like. The objects have a set of associated properties, which have corresponding required protection levels indicating a level of permission that another user must have to the... Agent: Low Gravity Innovation, Inc.
20140281480 - Systems and methods for providing secure communication: A client includes a security agent configured to create a client certificate that corresponds to one or more client identifiers. A server includes a server certificate and is in communication with the security agent. The server is configured to facilitate establishing an initial mutually authenticated transport layer security (TLS) session... Agent: Vmware, Inc.
20140281486 - Community-based de-duplication for encrypted data: Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and... Agent:
20140281485 - Efficient encryption, escrow and digital signatures: A network server is operated so as to facilitate legal eavesdropping by receiving, from the first user via a network, a session key (SK) encrypted with a second user's public key, kpubU2, and the SK encrypted with an escrow server's (ES) public key, kpubES. The kpubU2 key is the public... Agent: Authentify, Inc.
20140281489 - Security and key management of digital content: Managing access to digital content within a particular domain, including: receiving the digital content at a first client device; decrypting the received digital content at the first client device using a first key; transcoding the digital content to another format; re-encrypting the transcoded content using a second key, wherein the... Agent: Verimatrix, Inc.
20140281483 - System and method for enabling a scalable public-key infrastructure on a smart grid network: A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored... Agent: Silver Spring Networks
20140281488 - System and method for offloading cryptographic functions to support a large number of clients in a wireless access point: The present disclosure discloses a method and network device for offloading cryptographic functions to support a large number of clients. Specifically, a network device receives a packet corresponding to a client device via an interface, and determines whether a first hardware module that performs cryptographic operations on a per-client basis... Agent: Aruba Networks, Inc.
20140281484 - System and method to securely transfer data: Various embodiments of the invention achieve optimal data security by adding a security layer to data at the point of generation. Some embodiments add a security feature to data that controls or configures a device at a physical interface.... Agent: Maxim Integrated Products, Inc.
20140281487 - Systems and methods for cryptographic security as a service: A system and a computer-based method for providing bundled services to a client application in a service call to a service system in a service provider computer system includes receiving a message defining an API service request comprising at least a parameter portion and a payload portion, determining at the... Agent: Mastercard International Incorporated
20140281494 - Access control method and mobile terminal which employs an access control method: An access control method for accessing an embedded system includes: performing a first access control operation for an access system by a first authentication subject, wherein the first access control operation includes performing a first authentication for the access system; when the first access control operation is passed, receiving at... Agent: Samsung Electronics Co., Ltd.
20140281491 - Identity escrow management for minimal disclosure credentials: The subject disclosure is directed towards identity escrow management where anonymous online users can be de-anonymized if certain conditions are met. An auditor is configured to control a user's anonymity using a prime-order cryptographic group based encryption scheme. Via an authentication component, the auditor verifies that a pseudonym corresponding to... Agent: Microsoft Corporation
20140281495 - Method and apparatus for performing authentication between applications: A method performed by a first application in a client apparatus to authenticate a second application in the client apparatus is provided. The method includes, when the first application receives an execution request from the second application, requesting authentication information of the second application from an authentication server, obtaining the... Agent: Samsung Electronics Co., Ltd.
20140281490 - One-touch device personalization: Technologies for one-touch device personalization include at least two mobile computing devices configured to communicate with a personalization server. The first mobile computing device tracks changes to device personalization data and backs up the personalization data to the personalization server. The personalization server associates the personalization data to authenticated user... Agent:
20140281492 - Prevention of forgery of web requests to a server: Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication... Agent:
20140281493 - Provisioning sensitive data into third party: A method for providing identity data to network-enabled devices includes receiving a request for identity data from a network-enabled device that is deployed to an end-user. The network-enabled device is pre-provisioned with a PIN, a global key pair, a user-accessible first device identifier, and a second device identifier usable by... Agent: General Instrument Corporation
20140281496 - Secure user authentication in a dynamic network: A method, apparatus and/or computer program provides secure user authentication in a network having a dynamic set of services. The method comprises a client authenticating with an edge service and generating a query key. The edge service issues a request to the dynamic set of services. The request comprises (i)... Agent: International Business Machines Corporation
20140281501 - Application access control method and electronic apparatus implementing the same: A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in... Agent: Samsung Electronics Co., Ltd.
20140281498 - Identity authentication using credentials: A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be... Agent:
20140281499 - Method and system for enabling communications between unrelated applications: A method and system of enabling communications among unrelated applications is described herein. The method includes the step of identifying a paste memory element in an environment of a computing device that restricts communications among unrelated applications. The method also includes the step of imposing a file system on the... Agent:
20140281497 - Online personalization update system for externally acquired keys: A method is provided for updating identity data on network-enabled devices. The method provides for providing certificate signing requests and/or device identifiers to an external trust authority, which in response generates digital certificates and/or key pairs. The generated digital certificates and/or key pairs can be provided to a network-enabled device... Agent: General Instrument Corporation
20140281500 - Systems, methods and apparatuses for remote attestation: The systems, methods and apparatuses described herein provide a system for attesting a computing device. In one aspect, the computing device may comprise a secure zone configured to execute a task. The task may have executable code and data. The secure zone may be further configured to obtain a private... Agent: Ologn Technologies Ag
20140281503 - Certificate grant list at network device: A certificate grant list is provided. The certificate grant list may be stored in a memory, at the network device. The certificate grant list may store information associated with a client-device certificate, where the client-device certificate permits the client-device access to a secure service.... Agent: Hewlett-packard Development Company, L.p.
20140281502 - Method and apparatus for embedding secret information in digital certificates: A method and system is provided for embedding cryptographically modified versions of secret in digital certificates for use in authenticating devices and in providing services subject to conditional access conditions.... Agent: General Instrument Corporation
20140281505 - Augmenting name/prefix based routing protocols with trust anchor in information-centric networks: An apparatus comprising a memory, a processor coupled to the memory, wherein the memory contains instructions that when executed by the processor cause the apparatus to receive an information centric network (ICN) name prefix announcement message comprising a message prefix specific to a publisher, a public key certificate specific to... Agent: Futurewei Technologies, Inc.
20140281504 - Authorizing use of a test key signed build: Methods, apparatuses, and computer program products for authorizing use of a test key signed build are provided. Embodiments include transmitting to an update provider system, unique data associated with a target system; receiving from the update provider system, a signed update capsule file; determining, by the target system, that a... Agent: International Business Machines Corporation
20140281506 - Soft token system: Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a method is provided for soft token management. A mobile device of a user of a secure network resource receives and installs a soft token application. A unique... Agent: Fortinet, Inc.
20140281507 - Techniques for detecting incorrect wep key for open authentication: Techniques for detecting reason for connection attempt failure for DHCP with an Open Key authentication (WEP) protocol are discussed.... Agent: Barnesandnoble.com LLC
20140281508 - Changing group member reachability information: In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network... Agent: Cisco Technology, Inc.
20140281510 - Decryption of data between a client and a server: Technologies for securing communication may include monitoring a secured network connection between a client and a server. The secured network connection may be secured using a symmetric cryptographic key. The technologies may also include detecting a transmission of secured information between the client and the server, copying the transmission, forwarding... Agent:
20140281511 - Secure data processing on sensitive data using trusted hardware: The subject disclosure is directed towards using trusted hardware to achieve secure data processing over a network. For a given set of data store operations, some operations are directed to sensitive data (e.g., encrypted data fields). These operations are compiled into a set of expressions invoking trusted hardware code configured... Agent: Microsoft Corporation
20140281509 - Techniques for secure data extraction in a virtual or cloud environment: Techniques for secure data extraction in a virtual or cloud environment are presented. Desired data from a Virtual Machine (VM) or an entire VM is extracted and encrypted with a key. This key is sealed to a machine or a group of machines. The encrypted data is then migrated and... Agent:
20140281516 - Automatic file decryption: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281514 - Automatic file encryption: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281513 - Block encryption: A method of storing a file is provided. The method includes splitting the file into a plurality of file chunks and encrypting each file chunk of the plurality of file chunks. The method also includes generating a first security key that decrypts a first encrypted file chunk of the plurality... Agent: Unsene, Inc.
20140281519 - Encrypted file backup: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281515 - Encrypted file presentation: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281517 - File backup with selective encryption: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281521 - Method, system, network server and storage medium for anonymous dating: In a method, system, network server and storage medium for anonymous dating, the system obtains dating information transmitted by a dating information sender; encrypts an account of the dating information sender; performs random pairing for the dating information sender in the system for anonymous network dating; determines information of a... Agent: Tencent Technology (shenzhen) Company Limited
20140281518 - Multi-tier file restoration: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281520 - Secure cloud data sharing: A system and method for sharing an encrypted file stored on a cloud server is disclosed. In certain embodiments, the method includes generating a file key associated with the encrypted file stored in the cloud server; generating a share message, the share message including the generated file key and identifying... Agent: Mymail Technology, LLC
20140281512 - Secure query processing over encrypted data: The subject disclosure is directed towards secure query processing over encrypted database records without disclosing information to an adversary except for permitted information. In order to adapting semantic security to a database encryption scheme, a security model for all query processing is specified by a client and used to determine... Agent: Microsoft Corporation
20140281538 - Accelerated signature verification on an elliptic curve: A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to intermediate steps in the computations performed by the recipient.... Agent: Certicom Corp.
20140281535 - Apparatus and method for preventing information from being extracted from a webpage: An apparatus and method that prevents unauthorized extraction of content on a webpage is provided. The apparatus includes a server that provides data representing at least one webpage via a communication network to at least one requesting user, the data including source code, the source code having at least one... Agent: Munibonsoftware.com, LLC
20140281527 - Detecting fraud using operational parameters for a peripheral: A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to withdraw the authentication and terminate the secure communications with any peripheral when operating parameters for the peripheral indicate that there is a security threat associated with the peripheral. A... Agent: Ncr Corporation
20140281534 - Ehf secure communication device: A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely high frequency (EHF) communication. The communication device and the computing device periodically initiate a discovery operation mode, whereby the devices periodically transmit identifying information about the respective devices... Agent: Waveconnex, Inc.
20140281530 - Enhanced ipsec anti-replay/anti-ddos performance: A method for authenticating an Internet Protocol Security (IPsec) packet, wherein the method comprises, receiving the IPsec packet via an input port, performing a Sequence-Integrity Check Value (SEQ-ICV) check that validates a sequence number within the IPsec packet, and performing an Integrity Check Value (ICV) check that validates a checksum... Agent:
20140281532 - Information delivery system with advertising mechanism and method of operation thereof: An information delivery system includes: a control unit configured to: generate an anonymous identity for concealing client information of an anonymous client from a provider, generate a comparison result for determining whether a client encryption data of the anonymous identity matches with a provider encryption data of the provider, obtain... Agent:
20140281529 - Key refresh between trusted units: Encryption logic to identify a particular session key, where the particular session key is one of a plurality of session keys for use in encrypting content to be sent from a first device. The encryption logic is to encrypt particular content with the particular session key to obtain encrypted particular... Agent:
20140281522 - Method and apparatus for establishing a secure communication link between a mobile endpoint device and a networked device: A method, non-transitory computer readable medium, and apparatus for establishing a secure communication link between a mobile endpoint device and a networked device are disclosed. For example, the method scans an optical code, wherein the optical code contains configuration information and an encryption key, configures the mobile endpoint device in... Agent: Xerox Corporation
20140281525 - Minimal disclosure credential verification and revocation: The subject disclosure is directed towards credential verification for accessing a service provider. A user may prove to the service provider the validity of the credential by communicating a non-revocation component that is based upon a prime-order cryptographic group without a bilinear pairing. In order to authenticate the user, a... Agent: Microsoft Corporation
20140281537 - Protection of control words employed by conditional access systems: In accordance with a method for communicating a control word (CW) from a client such as an encryptor to a server such as the entitlement control message generator (ECMG) of a conditional access system (CAS), communication is established between the client and server over a secure connection. A control word... Agent: General Instrument Corporation
20140281528 - Secure end-to-end permitting system for device operations: A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command.... Agent: Silver Spring Networks, Inc.
20140281539 - Secure mobile framework with operating system integrity checking: Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided. Various embodiments provide mechanisms of securitizing data and communication between mobile devices and end point services accessed from a gateway of responsible authorization, authentication, anomaly detection, fraud... Agent: Goldman, Sachs & Co.
20140281526 - Secure network storage: This invention includes apparatus, systems, and methods to secure data in a remote storage device where an end-point device does not have direct access to the storage device to secure the data, or the end-point device does not trust the storage device to adequately secure the data, comprising securing an... Agent:
20140281536 - Secured embedded data encryption systems: Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets.... Agent: Willow, Inc.
20140281523 - System and method of secure remote authentication of acquired data: A computer-implemented method and an according system of secure remote authentication of acquired data is provided to allow a more secure and verifiable acquisition of digital data. The method may comprise exchanging between a user device and a security managing device seed information and generating synchronized random number time stamps... Agent:
20140281533 - Systems and methods for providing secure services: Systems and methods for providing one or more secure services are disclosed. One method can comprise authenticating and/or authorizing a user device to receive a security token. A request for information can be processed using the security token to facilitate the secure provision of services to the user device.... Agent: Comcast Cable Communications, LLC
20140281524 - Systems, methods, and computer program products for recording service status of applications: A method for use in a system with multiple processor-based devices, the method including: running a first application on a first processor-based device; maintaining a second application in a standby mode on the first processor-based device; and providing a service to each of the first and second applications on the... Agent: Genband US LLC
20140281531 - Trusted data processing in the public cloud: Generally, this disclosure describes a system and method for trusted data processing in the public cloud. A system may include a cloud server including a trusted execution environment, the cloud server one of a plurality of cloud servers, a cloud storage device coupled to the cloud server, and a RKM... Agent:
20140281541 - Authentication for relay deployment: Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the coverage of access point hotspots or other similar access point use cases. According to one aspect, a relay incorporates an... Agent: Qualcomm Incorporated
20140281540 - Keychain syncing: Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one... Agent:
20140281542 - Systems and methods for secure workgroup management and communication: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split or share a data set into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or... Agent: Security First Corp.
20140281551 - Data recording device, and method of processing data recording device: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the... Agent: Kabushiki Kaisha Toshiba
20140281550 - Distributed storage network and method for storing and retrieving encryption keys: A method begins by a distributed storage (DS) managing unit receiving an encryption key to store. The method continues by determining an encryption method and encrypting the encryption key with the determined encryption method to produce an encrypted key. The method continues by encoding and storing the encrypted key in... Agent: Cleversafe, Inc.
20140281546 - Hedi-hopping-enabled dynamically-secured intercommunication (aka sockhop): In one embodiment, a secure client-server socket-based Internet communication system uses socket hopping to distribute communication channels per session to a large number of randomly-selected socket ports.... Agent: Eolas Technologies, Inc.
20140281543 - Host device configured for authentication with memory device: A host device connected to a data recording device, includes a holding unit for holding a host device key and a host device certificate, an authentication/key exchange process unit configured to perform an authentication/key exchange process with the data recording device using the host device key and the host device... Agent:
20140281548 - Intra-computer protected communications between applications: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving,... Agent: Oracle International Corporation
20140281549 - Methods and apparatus for securing user input in a mobile device: The present invention secures user data throughout its lifecycle—(1) when entering data into the mobile device, (2) when storing the data in the mobile device, and (3) when transmitting data from the mobile device. In accordance with a first aspect of the invention, the invention features a methodology for encrypting... Agent: Strikeforce Technologies, Inc.
20140281545 - Multi-layer embedded encryption: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether... Agent: Commvault Systems, Inc.
20140281544 - Trusted security zone containers for the protection and confidentiality of trusted service manager data: Embodiments relate generally to systems and methods for providing access to a trusted security zone container within a trusted security zone of a mobile device. An application may receive trusted service manager validation data from a trusted service manager. The application may also receive a trusted security zone master key,... Agent: Sprint Communications Company L.p.
20140281547 - Wireless pairing of personal health device with a computing device: Systems and methods for the wireless pairing of a personal health device (PHD) (e.g., blood glucose monitor) with a computing device (e.g., smartphone) are disclosed herein. In an embodiment, the PHD communicates a private key to the computing device via a first communication medium (e.g., light signal, audio signal, pattern).... Agent: Nipro Diagnostics, Inc.
20140281552 - Recording medium: A recording medium is attachable to and detachable from an apparatus body, and is supplied with power from the apparatus body when it is attached to the apparatus body. This recording medium includes: an encryption/decryption control unit performing encryption and decryption of data transmitted from the apparatus body; an authentication... Agent: Panasonic Corporation
20140281553 - Secure communications kit and client device for securely communicating using the same: A secure communication kit is disclosed. The secure communication kit may include a plurality of tangible security tokens; each security token storing one or more cryptographic keys and a group identifier. A first cryptographic key stored on each security token may correspond to one of the cryptographic key(s) stored on... Agent:
20140281554 - Generating keys using secure hardware: A client device that is coupled to a host device sends a parent public key and an associated certificate to the host device. The parent public key, the certificate and a corresponding parent private key are stored in secure persistent storage included in a secure device associated with the client... Agent: Atmel Corporation
20140281557 - Digital rights tagging system and method: A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user,... Agent: Motorola Mobility LLC
20140281555 - Generalized certificate use in policy-based secure messaging environments: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a user. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a... Agent: International Business Machines Corporation
20140281558 - Generalized certificate use in policy-based secure messaging environments: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a user. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a... Agent: International Business Machines Corporation
20140281556 - Media presentation description verification: Methods and systems are described for verifying the source and integrity of a media presentation description (MPD) defined by the Dynamic Adaptive Streaming over HTTP (DASH) protocol. A streaming client receives an MPD from an MPD publisher. The MPD can include addresses associated with one or more media servers and/or... Agent: Qualcomm Incorporated
20140281559 - Systems and methods for distributing, displaying, viewing, and controlling digital art and imaging: System and method for displaying digital content on a display device comprising at least one digital content item, configured to be displayed on the display device, a service cloud, comprising a server, memory, and processor, configured to store the digital content item as one or more encrypted slices, and a... Agent:
20140281560 - Secure zone on a virtual machine for digital communications: An apparatus implementing a secure zone on one or more virtual machines may be provided. In one aspect, the apparatus may comprise a peripheral device, a security-enhancing chip and a computer processor. The chip may comprise a non-volatile storage for storing an encryption key and a first configuration digest, and... Agent: Ologn Technologies Ag
20140281561 - Registration and authentication of computing devices using a digital skeleton key: A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing device including transmitting a registration information request to the computing device, receiving at least one device fingerprint of the at least one user-selected fingerprintable device accessible by... Agent: Uniloc Luxembourg, S.a.
20140281562 - System and method for unified passcode processing: A system and method for unified password processing is provided. According to an aspect, a device can receive a unified passcode. The unified passcode can be a passcode for unlocking access to the device, or can be the basis for generating additional passwords or both. The unified passcode can also... Agent:
20140281565 - Configurable personal digital identity device responsive to user interaction: A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The... Agent:
20140281563 - Memory device authentication process: An authentication process for a memory device that stores a host identification key and a host constant, includes generating a first key based on the host constant, decrypting encrypted secret identification information read from the external device using information generated with the host identification key to generate a secret identification... Agent:
20140281564 - Method of authenticating access to memory device: A method of authenticating access to a memory device that stores a host identification key and a host constant, includes generating a first key based on the host constant, decrypting a family key block read from an external device using the host identification key to generate a family key, decrypting... Agent:
20140281566 - Personal digital identity device with motion sensor: A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The... Agent:
20140281569 - Biometric authentication method and computer system: A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating... Agent: Hitachi, Ltd.
20140281567 - Method for authenticating an encryption of biometric data: A method authenticates an encryption of a probe vector of biometric data based on an encryption of an enrolment vector of the biometric data using consistency of discriminative elements of the biometric data. The method determines an encryption of a first distance between discriminative elements of an enrolment vector stored... Agent:
20140281568 - Using biometrics to generate encryption keys: An electronic device may be used to support user authentication based on biometric readings. In this regard, a unique identification parameter may be generated for each user associated with the electronic device. The unique identification parameter may comprise a user identification input parameter (e.g., alphanumerical password) combined with a set... Agent:
20140281573 - Asymmetrically masked multiplication: Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods... Agent:
20140281576 - Information providing system, information processing apparatus, computer readable medium, and information providing method: An information providing system includes first and second apparatuses. The first apparatus includes a memory storing a shared random number Ri and shared information, a providing unit providing the second apparatus with encrypted information e(Ki, Fi) obtained by encrypting information Fi with an encryption key and an encrypted key Yi... Agent: Fuji Xerox Co., Ltd.
20140281570 - Method of performing an authentication process between data recording device and host device: A method of performing an authentication process between a data recording device and a host device includes generating second controller identification information based on the first controller identification information, performing an authentication/key exchange process using the encrypted medium device key, the medium device key certificate, the host device key and... Agent:
20140281574 - Multi-ring encryption approach to securing a payload using hardware modules: Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key derived from a password, such that each subsequent ring of protection is protected by a key derived from the key used to encrypt the... Agent:
20140281575 - Pre-boot authentication using a cryptographic processor: An apparatus for cryptographic pre-boot authentication includes a cryptographic processor configured to perform cryptographic operations. The cryptographic processor includes a portion dedicated to the boot interface. The apparatus also includes a storage device storing machine readable code and a processor executing the machine readable code. The machine readable code includes... Agent: Lenovo (singapore) Pte, Ltd.
20140281572 - Privacy preserving statistical analysis on distributed databases: Aggregate statistics are securely determined on private data by first sampling independent first and second data at one or more clients to obtain sampled data, wherein a sampling parameter substantially smaller than a length of the data. The sampled data are encrypted to obtain encrypted data, which are then combined.... Agent: Mitsubishi Electric Research Laboratories, Inc.
20140281580 - Rewarding system: An information processing method of convenience and an information processing system are disclosed. In some embodiments, the system includes acquiring a 1st attribute information from a person with a personal digital assistant that contains a 2nd attribute information; acquiring the 2nd attribute information from two or more personal digital assistants;... Agent: Kabushiki Kaisha Toshiba
20140281577 - System and method for managing and diagnosing a computing device equipped with unified extensible firmware interface (uefi)-compliant firmware: A computing device equipped with UEFI-compliant firmware is provided with added functionality via an extended firmware interface. The variable interface is called with special parameters, which redirect handling of firmware service calls. Embodiments use authenticated variables to provide security properties to the special interface, use the firmware interface to provide... Agent: Insyde Software Corp.
20140281578 - System and method for secure database queries: Disclosed are a system and method of performing secure computations on a protected database. Embodiments of the method provide, in a secure processor, a database of cryptographically hashed values based on a database of cleartext values, receive a cryptographically hashed query value as input into the secure processor wherein the... Agent: Northrop Grumman Systems Corporation
20140281579 - Systems and methods for decrypting digital art and imaging for display of the same: System and method for securing digital content comprising one or more display devices, each comprising a processing controller, a first memory, and a display screen, and configured to display digital content, an application, configured to run on a computer with a second memory and second processor, and configured to communicate... Agent:
20140281571 - Systems, methods, and devices for encrypted data management: Key management for and automount of encrypted files, including recovering a master vault key file from an encoded vault key file, storing the vault key file within a previously mounted crypto key management virtual drive so as to provide a secure scratch pad area for temporary storage of the master... Agent:
20140281581 - Storage device: A storage device includes a storage area and connected to a computer for causing a file system to operate. The file system causes a data area for storing contents of a plurality of files and a management area for managing the plurality of files to be secured in the storage... Agent: Genusion, Inc.
20140281584 - Apparatus and method to protect digital content: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within... Agent:
20140281585 - Compression of state information for data transfer over cloud-based networks: Aspects of the present disclosure describe systems and methods for compressing a set of RAM data that may have some portions duplicated in a set of ROM data. The ROM data may be divided into a plurality of data chunks and hashed to obtained unique key values. Then a second... Agent: Sony Computer Entertainment Inc.
20140281588 - Generating efficient reads for a system having non-volatile memory: Systems and methods are disclosed for generating efficient reads for a system having non-volatile memory (“NVM”). A read command can be separated by a host processor of the system into two phases: a) transmitting a command to a storage processor of the system, where the command is associated with one... Agent: Apple Inc.
20140281582 - Protecting visible data during computerized process usage: Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is identified, a physical page key (PPK) is generated (e.g., a unique PPK may be generated for each page of data) and stored in at... Agent: International Business Machines Corporation
20140281589 - Secure database searching: Method and system for securely storing data in a database comprising: receiving data to be stored. Dividing the data into a plurality of elements. Encrypting each element of the plurality of elements with an encryption function. Combining the encrypted elements to form a data attribute. Storing the data attribute in... Agent:
20140281583 - Storing encrypted contents in digital archives: A digital archive for storing encrypted content includes a header section and a body. The header section includes real headers, wherein at least a portion of each real headers is encrypted, and fake headers, wherein each of the fake headers is filled with cryptographically random bytes, wherein the fake headers... Agent: Appsense Limited
20140281586 - Systems and methods for secure access modules: Various embodiments of the invention provide a strong logical link between a SAM and a secure terminal to combat SAM counterfeiting and misuse. The link is based on mutual validation methods using firmware and cryptographic protocols. Once the SAM is removed from a terminal that it has been tied to,... Agent:
20140281587 - Systems, methods and apparatuses for using a secure non-volatile storage with a computer processor: The systems, methods and apparatuses described herein provide a system for accessing data stored securely external of a computer processor. In one aspect, the computer processor may comprise a central processing unit (CPU) and a memory controller. The memory controller may comprise a storage to store a key, a first... Agent: Ologn Technologies Ag
20140281594 - Application processor and driving method: In a system including a power management integrated circuit (PMIC) and a memory device, an application processor obtains control information for a memory device, the control information defining in part at least a first power supply voltage and operating clock frequency for the memory device. A memory control unit (MCU)... Agent: Samsung Electronics Co., Ltd.
20140281590 - Battery power management for electronic device: In one embodiment a controller comprises logic to receive a temperature indicator for an electronic device to be coupled to a first battery and implement a selected power management routine when a temperature parameter derived from the temperature indicator is below a threshold. Other embodiments may be described.... Agent:
20140281595 - Continuous power leveling of a system under test: Power leveling a system under test (SUT). An input signal is provided at an initial power level to the SUT. Multiple iterations are performed, each including measuring, over a specified measuring interval, power of a signal produced by the SUT in response to the input signal, and dynamically adjusting the... Agent: National Instruments Corporation
20140281591 - Dynamic response improvement of hybrid power boost technology: Methods and apparatus relating to improving dynamic response of hybrid power boost technology are described. In one embodiment, two or more levels of charger over-current are used for AC adapters/chargers during transition from charging (e.g., one or more battery packs) to boosting platform performance (e.g., by increasing the operating frequency... Agent:
20140281596 - Frequency adjustment system and method: A frequency adjustment system includes a phase-locked loop (PLL) circuit, an adjusting circuit, and a voltage regulator module (VRM). The PLL circuit outputs a trigger signal when a communication frequency of a chip changes. The adjusting circuit adjusts a clock frequency of the adjusting circuit to receive communication data. The... Agent: Hong Fu Jin Precision Industry (shenzhen) Co., Ltd
20140281592 - Global efficient application power management: A method, system and computer-readable medium for allocating power among computing resources are provided. The method calculates an activity level of a first computer resource. When the activity level is less than a threshold value, the method increases the power allocation to a second computing resource. When the activity level... Agent: Advanced Micro Devices, Inc.
20140281593 - Partitioned switch mode power supply (smps) interface: A single-wire interface of an application processor that communicates with another single-wire interface of a power management unit (PMU) via a control signal line. The control signal line can be a single signal path. Further, the single-wire interfaces can communicate with each other only via the control signal line. The... Agent:
20140281597 - Communication and control for powered devices: A first device (such as a power supply) may detect a power anomaly and provide a warning to a second device that is powered by the first device. For example, if there are conditions indicating an increased likelihood of a power outage (e.g., a brownout period, one or more voltage... Agent: Comcast Cable Communications, LLC
20140281598 - System and method for improving accuracy of measurements of a network of intelligent power distribution units through time synchronization: In an energy management system for a data center, intelligent power distribution units are synchronized by a time server. Measurements carried out by the intelligent power distribution units are commenced and stopped synchronously. Each intelligent power distribution unit carries out a calculation based upon the Unix Epoch Time of receipt... Agent: Raritan Americas, Inc.
20140281600 - Apparatus and method to provide near zero power devslp in sata drives: Apparatus and methods of reducing power consumption in solid-state disks (SSDs) that can reduce power levels in SSDs below levels achievable in known SSD reduced power states. The apparatus is a power management subsystem operative to detect whether an SSD subsystem has been enabled to enter a reduced power state,... Agent:
20140281604 - Autonomous power sparing storage: Power saving logic in a data storage system with multiple data storage devices is distributed from a central controller to each individual device. Power saving logic, including algorithms used to conserve power when the data storage device is not needed, are stored and executed on each individual data storage device.... Agent:
20140281608 - Battery usage throttling for mobile devices: A computing device may be configured to determine a power supply usage rate of the computing device based on operations of applications and power-consuming components of the computing device. The computing device may be configured to obtain a target power supply depletion rate. Based on the power supply usage rate... Agent: Google Inc.
20140281602 - Controlling processor consumption using on-off keying having a maximum off time: In an embodiment, a processor includes a logic to cause at least one core to operate with a power control cycle including a plurality of on times and a plurality of off times according to an ON-OFF keying protocol, where the off times each correspond to a maximum off time... Agent:
20140281606 - Data storage power consumption threshold: A power consumption threshold is implemented to manage power consumed by a plurality of devices. A power consumption threshold may be selected for a data storage system having multiple drives. Policies may control operation of storage devices such as hard disk drives to ensure the power consumption threshold is not... Agent: Silicon Graphics International Corp.
20140281609 - Determining parameters that affect processor energy efficiency: An example process for controlling a processor may include: (i) obtaining parameters associated with operation of a processor, where each of the parameters has a different time scale; (ii) performing an iterative process to identify ones of the parameters that achieve a particular energy efficiency in the processor, where the... Agent: Arizona Board Of Regents For And On Behalf Of Arizona State University
20140281607 - Method and apparatus for displaying a predetermined image on a display panel of an electronic device when the electronic device is operating in a reduced power mode of operation: A display controller for use within an electronic device includes a dedicated memory and a low power display processor for displaying information when the electronic device is operating in a reduced power mode of operation (e.g., sleep mode). The memory stores display data for a predetermined image and the display... Agent: Motorola Mobility LLC
20140281599 - Nand page buffer based volatile state store: Apparatus and methods of reducing power consumption in solid-state storage devices such as solid-state disks (SSDs) that can reduce idle power levels in an SSD, while maintaining low resume latency upon exiting a reduced power state. By arranging a storage controller and at least one NAND flash package of the... Agent:
20140281601 - Power boundary cell operation in multiple power domain integrated circuits: Embodiments of an apparatus are disclosed that may allow for the isolation of power domains. The apparatus may include a first power switch, a second power switch, and a boundary switch. The first power switch may be coupled between a global power supply and a first local power supply, and... Agent: Apple Inc.
20140281605 - Power management for a computer system: Embodiments include a method for managing power in a computer system including a main processor and an active memory device including powered units, the active memory device in communication with the main processor by a memory link, the powered units including a processing element. The method includes the main processor... Agent: International Business Machines Corporation
20140281603 - System, method, and computer program product for allowing a head to enter a reduced power mode: A system, method, and computer program product are provided for allowing a head to enter a reduced power mode. A first processor having a first head is provided. Additionally, a second processor having a second head is provided. Furthermore, a link is provided, coupled between the first head of the... Agent: Nvidia Corporation
20140281610 - Exploiting process variation in a multicore processor: A disclosed method includes accessing characterization data indicating first and second sets of performance characteristics for first and second processing cores of a processor; determining, based on a performance objective and the characterization data, a first power state for the first processing core and a second power state for the... Agent: Intel Corporation
20140281613 - Frequency control device and frequency control method: For every application, a storage unit stores performance information which indicates processing performance required for processing of the application. A derivation unit derives processing performance required for processing of an application executed in a processor on the basis of the performance information. A frequency control unit controls an operation frequency... Agent: Fujitsu Limited
20140281612 - Measurement of performance scalability in a microprocessor: A scalability algorithm causes a processor to initialize a performance indicator counter, operate at an initial frequency of the first clock signal for a first duration, and determine, based on the performance indicator counter, an initial performance of the first processing core. The algorithm may then cause the processor to... Agent:
20140281611 - Power management for a memory device: An improved method and apparatus for performing power management in a memory device is disclosed.... Agent: Silicon Storage Technology, Inc.
20140281614 - System and method of rack management: A rack management method and system is disclosed. The method includes detecting the presence of a computing device releasably mounted in a frame, the detecting based on an electrical connection established between a configuration bar disposed in a rear portion of the frame and the computing device, and determining a... Agent: Rackspace Us, Inc.
20140281628 - Always-on low-power keyword spotting: The invention relates to an electronic device that includes a wake-up system that operates at a substantially low power level and is applied to wake up the electronic device from a sleep mode. The wake-up system comprises a sound transducer that converts a received sound signal to an electrical signal... Agent: Maxim Integrated Products, Inc.
20140281620 - Control system for power control: A power control system for saving power by powering on enough application servers to satisfy the current load workload as well as any required reserve capacity based on administrative settings is disclosed. As the load increases, more servers are powered on. As the load decreases some servers are powered off.... Agent: Tso Logic Inc.
20140281634 - Controlling power supply unit power consumption during idle state: Methods and apparatus relating to controlling power consumption by a Power Supply Unit (PSU) during idle state are described. In one embodiment, a power supply unit enters a lower power consumption state (e.g. S9) based on power state information, corresponding to one or more components of the platform, and comparison... Agent:
20140281627 - Device sleep partitioning and keys: A data storage device includes a device sleep state pin and device sleep state logic to allow the data storage device to store security keys and necessary device sleep state logic together in a volatile logical data storage element. The volatile logical data storage element may be on-chip or off-chip.... Agent: Lsi Corporation
20140281632 - Electronic apparatus that measures power during power saving state, method of controlling the same, and storage medium: An electronic apparatus capable of accurately measuring an amount of electric power consumed during a power saving state while reducing an amount of electric power necessary for electric power measurement in the power saving state to a minimum. The apparatus is equipped with a power saving function for switching an... Agent: Canon Kabushiki Kaisha
20140281630 - Electronic device with two driving structures: An electronic device with two driving structures is capable of switching between a standby state and a working state. The electronic device includes a power supply, a processor and a driving circuit. The power supply is capable of outputting a first driving voltage or a second driving voltage. The processor... Agent: Hon Hai Precision Industry Co., Ltd.
20140281631 - Electronic device, power control method and storage medium storing program thereof: In an electronic device, a first sensor detects a detection target on a first region. A second sensor detects a detection target on a second region. A third sensor detects a detection target on a third region. A power control unit turns on the second sensor in a case where... Agent: Canon Kabushiki Kaisha
20140281633 - Magnet key: A device for affecting a sleep mode of an electronic device includes an elongate member and a magnet. The magnet is disposed within the elongate member, and the elongate member and the magnet are shaped and sized to activate a magnetic sleep sensor of the electronic device in response to... Agent: Lilitab LLC
20140281622 - Method, apparatus, and system for improving resume times for root ports and root port integrated endpoints: A device is determined to be in a low power state. A transition from the low power state to an active state is initiated, where a fixed minimum recovery time is defined for transitions from the low power state to the active state. A capability of the device is identified... Agent:
20140281636 - Mobile systems with seamless transition by activating second subsystem to continue operation of application executed by first subsystem as it enters sleep mode: A computer system includes two or more subsystems. In one example, a first subsystem is executing a multimedia application using data stored in a first storage device. A copy of the data is also stored in a second storage device associated with a second subsystem. The second subsystem may be... Agent:
20140281626 - Phy based wake up from low power mode operation: Apparatus and method for supplying electrical power to a device. A system on chip (SOC) integrated circuit includes a first region having a processing core and a second region characterized as an always on domain (AOD) power island having a power control block with an energy detector coupled to a... Agent:
20140281616 - Platform agnostic power management: In an embodiment, a processor includes at least one functional block and a central power controller. The at least one functional block may include at least one block component and block power logic. The block power logic may be to: receive a first request to initiate a first reduced power... Agent:
20140281624 - Power management device: A power management device is adapted to reduce power consumption, particularly in battery-powered applications such as within a node in a utility network (e.g., in a gas, water, or other utility application). In one example, a low-current voltage regulator provides power to a processor during low-power “sleep” states. A high-current... Agent: Itron, Inc.
20140281629 - Power management for a computer system: Embodiments include a method for managing power in a computer system including a main processor and an active memory device including powered units, the active memory device in communication with the main processor by a memory link, the powered units including a processing element. The method includes the main processor... Agent: International Business Machines Corporation
20140281617 - Preventing sleep mode for devices based on sensor inputs: A data processing device may receive, from an application running on the data processing device, an indication that one or more sensors may be associated with a user input for the application. Based on sensing information collected from the one or more sensors, a characteristic of the user input may... Agent: Google Inc.
20140281635 - Reducing power consumption during idle state: Methods and apparatus relating to power consumption reduction during idle state(s) are described. In one embodiment, logic transfers control of a power state of a device to one or more general purpose input output signals. The logic generates a signal to control the power state of the device via a... Agent:
20140281621 - Stealth power management in storage array: Increased power savings is provided by powering down idle storage devices and emulating storage device responses to host requests which do not require data access. A virtual target emulates the hard disk drive, has information associated with the hard disk drive, and provides information in response to host requests to... Agent:
20140281625 - Storing system data during low power mode operation: Apparatus and method for operating a device in a low power mode. In accordance with some embodiments, the apparatus comprises a memory and a system on chip (SOC) integrated circuit. The SOC has a first region with a processing core and a second region electrically isolated from the first region... Agent:
20140281619 - Systems and methods for modifying power states in a virtual environment: Systems, methods, and software are described herein for operating a power management system including identifying a virtual machine load in a virtual machine environment, identifying a power state for at least one real machine in the virtual machine environment based on the virtual machine load, and modifying the power state... Agent: Snapvolumes, Inc.
20140281618 - Systems and methods for providing auxiliary reserve current for powering information handling sytems: Systems and methods are disclosed for providing auxiliary reserve current to power a system load of an information handing system using an auxiliary energy storage power source as an energy cache to selectably provide auxiliary reserve current to at least partially supplement the normal operating power supply (e.g., battery pack,... Agent:
20140281615 - Techniques for power saving on graphics-related workloads: Various embodiments are generally directed to an apparatus, method and other techniques for monitoring a task of a graphics processing unit (GPU) by a graphics driver, determining if the task is complete, determining an average task completion time for the task if the task is not complete and enabling a... Agent:
20140281623 - Wireless device including system-on-a-chip having low power consumption: A wireless station is disclosed that may quickly enter and/or exit a sleep state and that may reduce power consumption associated with waking up from the sleep state to perform selected low power operations by performing such operations using a set of first instructions stored within an internal memory of... Agent: Qualcomm Incorporated
20140281638 - Application of normally closed power semiconductor devices: A power source delivers power from a main power source using switching by a normally on transistor. A driver switches on and off the normally on transistor under a control signal by a controller during regular operation. A housekeeping power supply delivers auxiliary power to the driver. The driver switches... Agent: Freescale, Inc.
20140281639 - Device power management state transition latency advertisement for faster boot time: Methods and apparatus relating to device power management state transition latency advertisement for faster boot time are described. In some embodiments, a storage unit stores a value corresponding to a requisite transition delay period for a first agent to exit from a low power consumption state. The first agent writes... Agent:
20140281637 - Memory state management for electronic device: In one embodiment a controller comprises logic to determine whether an electronic device is operating in a low power state and in response to a determination that the electronic device is operating in a low power state, implement a memory state management routine which reduces power to at least a... Agent:
20140281640 - Intelligent front panel: The front panel includes intelligence for controlling power, reset and power down functions for a storage enclosure having multiple servers, service processors, and enclosure management devices. The front panel may display information pertaining to system power state, disk activity, Ethernet activity, and other information. The front panel may implement sequencing... Agent: Silicon Graphics International Corp.
20140281641 - Method and apparatus for controlled reset sequences without parallel fuses and pll's: A system, semiconductor device and method for providing a controlled system reset sequence with lower power consumption without dependency on fuses, PLL's and external XTAL's. A method to simplify a boot sequence by using a ring oscillator that compensates for voltage and temperature variations while also removing the dependency on... Agent: Intel Corporation
20140281643 - Apparatus and method for detecting clock tampering: Disclosed is a method for detecting clock tampering. In the method a plurality of resettable delay line segments are provided. Resettable delay line segments between a resettable delay line segment associated with a minimum delay time and a resettable delay line segment associated with a maximum delay time are each... Agent: Qualcomm Incorporated
20140281644 - Control system for power control: A power control system for saving power by powering on enough application servers to satisfy the current load workload as well as any required reserve capacity based on administrative settings is disclosed. As the load increases, more servers are powered on. As the load decreases some servers are powered off.... Agent: Tso Logic Inc.
20140281645 - Enchanced grid reliability through predictive analysis and dynamic action for stable power distribution: A power grid stabilizing system may include a processor and a network interface executable by the processor to monitor for new event data from power consumption devices over a network. The new event data may include information such as device location, operating information, and sensor data. The system may include... Agent: Accenture Global Services Limited
20140281647 - Managing the operation of a computing system: A method and system for managing the operation of a computing system are described herein. The method includes determining a number of workloads on the computing system. The method also includes determining a number of performance-power states for each workload and a corresponding performance range and power consumption range for... Agent:
20140281649 - Method for automatic mapping of ac phase conductors and identification of ac buses in a multi-bus power system: A system is disclosed for detecting if a remote device is associated with a power supply. The system may have a controller having machine readable, non-transitory executable code running thereon for varying a characteristic of a signal being applied to the power supply. The controller further may be configured to... Agent: Liebert Corporation
20140281650 - Passive monitoring system: Embodiments discussed herein provide a passive monitoring system for use in a residential independent living framework. In some exemplary embodiments, the system may be used to alert a primary caregiver of a possible decline or change in an activity of daily living (“ADL”) of the monitored individual. The system may... Agent: Evermind, Inc.
20140281646 - Power management method for server system: A power management method for a server system is provided. At least any one of a power status indication signal and an alert signal from a power supply is detected to judge whether an input voltage is normal. If it is judged that the input voltage is abnormal, a motherboard... Agent:
20140281642 - Resolution programmable dynamic ir-drop sensor with peak ir-drop tracking abilities: A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The... Agent:
20140281648 - Systems and methods for power awareness in mobile applications: A data processing device may comprise one or more applications. Based on communication from a particular application, the data processing device may be operable to provide, to the particular application, power consumption information of the data processing device associated with each of a plurality of application states of the particular... Agent: Google Inc.
20140281652 - Data synchronization across asynchronous boundaries using selectable synchronizers to minimize latency: A system and apparatus that include a selectable synchronizer circuit for synchronizing data across asynchronous boundaries are disclosed. The apparatus includes a unit associated with a first clock domain and a synchronizer sub-unit (SSU) coupled to the unit and associated with a second clock domain. The synchronizer sub-unit includes two... Agent: Nvidia Corporation
20140281653 - Reestablishing synchronization in a memory system: Embodiments relate to reestablishing synchronization across multiple channels in a memory system. One aspect is a system that includes a plurality of channels, each providing communication with a memory buffer chip and a plurality of memory devices. A memory control unit is coupled to the plurality of channels. The memory... Agent: International Business Machines Corporation
20140281651 - Serial peripheral interface and methods of operating same: Serial peripheral interfaces and methods of operating the same are provided. An apparatus can have a serial peripheral interface (SPI) including a first command state machine (CSM), and a second CSM.... Agent: Micron Technology, Inc.
20140281654 - Synchronizing data transfer from a core to a physical interface: In one example implementation, the present disclosure provides a system that includes circuitry and one or more electronic components for synchronizing data transfer from a core to a physical interface. One example can involve an apparatus for interfacing a digital core with at least one physical interface that includes a... Agent: Analog Devices, Inc.
20140281655 - Transducer clock signal distribution: An array of ultrasonic transducers can be controlled to produce a steerable beam. Beam steering can be skewed by buffer delays in the distribution of a clock signal. The skew can be at least approximately linearized by distributing the clock signal in a diagonal fashion across an array of buffers... Agent: Ubeam Inc.
20140281656 - Global synchronous clock: Processor clock signals are generated for each processor in a HPC system, such that all the processor clock signals are of the same frequency. Furthermore, as part of a startup (boot) procedure, a process sets all time stamp counters (TSCs) of the processors, such they indicate identical times. Each blade... Agent: Silicon Graphics International Corp.
20140281657 - Processor core clock rate selection: Techniques described herein generally relate to multi-core processors including two or more processor cores. Example embodiments may set forth devices, methods, and computer programs related to calculating a clock rate for one or more of the processor cores in the multi-core processor. One example method may include determining a first... Agent: Empire Technology Development LLC
20140281658 - Compressed sampling and memory: Aspects of a low power memory buffer are described. In one embodiment, a sampling rate of a signal is adjusted to identify extrema of a signal. An extrema pulse is generated and, in response to the extrema pulse, a time segment and potential value of the signal are stored in... Agent: West Virginia University
20140281659 - Intelligent modules in a particle counter: An airborne, gas, or liquid particle sensor with one or more intelligent modules either within the instrument or attached to the instrument. These modules comprising sub-systems with local controllers or memory.... Agent: Particles Plus, Inc.
20140281660 - Information processing device, time adjusting method, and time adjusting program: One embodiment provides an information processing device which includes a clock unit, a file access unit and a setting unit. The clock unit is configured to count up an elapsed time from a prescribed reference time if an origin time has not been set, and to count up an elapsed... Agent: Kabushiki Kaisha ToshibaPrevious industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20140925:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
Results in 1.12713 seconds