Electrical computers and digital processing systems: support patents - Monitor Patents
FreshPatents.com Logo    FreshPatents.com icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents



USPTO Class 713  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14: Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |

Electrical computers and digital processing systems: support

Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
  
04/10/2014 > 60 patent applications in 27 patent subcategories.

20140101420 - Adaptive control of processor performance: Embodiments include a method, system and an article of manufacture for configuring at least one processor. These include changing a sampling frequency of at least a portion of a control loop coupled to the processor in response to a change in a current input workload, determining a current error of... Agent: Advanced Micro Devices, Inc.

20140101421 - Dynamic protection of a master operating system image: Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational... Agent: International Business Machines Corporation

20140101422 - Dynamic protection of one or more deployed copies of a master operating system image: Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment... Agent: International Business Machines Corporation

20140101419 - Method for preemptively restarting software in a multi-subsystem mobile communication device to increase mean time between failures: Methods for a mobile device restarting subsystem software on a schedule that reduces the likelihood of subsystem failures without requiring a general system restart or impacting other subsystems. The mobile device may calculate a restart time window during which a first subsystem may be restarted efficiently and prior to the... Agent: Qualcomm Incorporated

20140101423 - Processing device and management board: A processing device includes: casing; a processor in the casing; and a management board detachably mounted on the casing and manages the processor. The casing includes a memory storing therein first identification data to identify the casing. The management board includes a non-volatile memory storing therein second identification data of... Agent: Fujitsu Limited

20140101427 - Automatic update of persistent boot parameter storage: A computer system includes a memory, the memory comprising a hardware boot parameter storage area; an operating system running on the computer system; and reboot logic configured to: store updated boot parameters for the operating system in the hardware boot parameter storage area in the memory; perform a reboot of... Agent: International Business Machines Corporation

20140101424 - Cooperative boot techniques for an enterprise computing system: Cooperative boot techniques enable sharing of information in an enterprise computing system so as to optimize performance of the system. For example, in an enterprise computing system comprising a management server, one or more server computers, and a storage subsystem, the management server monitors the one or more server computers... Agent: Cisco Technology, Inc.

20140101425 - Managing operating system components: A plurality of operating system (OS) components is stored in a storage location on a computing device. A user may selected a set of OS components to use when the computing device boots. A boot location is created and links to the set of OS components are stored in the... Agent: Red Hat, Inc.

20140101426 - Portable, secure enterprise platforms: A portable, secure enterprise computing platform is provided by a device having a storage or memory, including a firmware module, a processor and an interface for interfacing with a host platform. The interface may be a USB interface and the device may have the form factor of a USB thumb... Agent: Msi Security, Ltd.

20140101432 - Detection of component operating state by computer: A mechanism is provided for detecting an operating state of a component. A CLI command is transmitted via a command line interface to the component. An output character string is received responsive to the CLI command. A set of significant character substrings is dissected from the output character string, where... Agent: International Business Machines Corporation

20140101429 - Dynamic protection of a master operating system image: Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational... Agent: International Business Machines Corporation

20140101428 - Dynamic protection of one or more deployed copies of a master operating system image: Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment... Agent: International Business Machines Corporation

20140101430 - Dynamically recommending configuration changes to an operating system image: Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one... Agent: International Business Machines Corporation

20140101431 - Dynamically recommending configuration changes to an operating system image: Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one... Agent: International Business Machines Corporation

20140101433 - Information processing apparatus: In the invention, a first processor that controls operation of a predetermined controlled unit and a second processor are operated in a first mode, a second mode, and a third mode, in the first mode the first processor and second processor are operable respectively, in the second mode respective amounts... Agent: Ricoh Company, Limited

20140101434 - Cloud-based file distribution and management using real identity authentication: Systems, devices and process for secure storage, retrieval and management of files using cloud-based hosting services are supported with a real identity authentication device and process. Biometric authentication is required for encryption/decryption of files. The real identity authentication processes are integrated with file exchange processes and API's related to the... Agent: Msi Security, Ltd.

20140101435 - Encrypted communication apparatus and control method therefor: An encrypted communication apparatus determines a security protocol in IPsec to be applied to an IP packet, and calculates, based on the determined security protocol, a packet size which prevents the IP packet from being fragmented even if IPsec is applied to the IP packet. The packet size to be... Agent: Canon Kabushiki Kaisha

20140101436 - Differential client-side encryption of information originating from a client: A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each... Agent: Braintree Payment Solutions, LLC

20140101437 - Automated certification based on role: In one aspect, systems and methods for generating a set of certification requirements based on a defined role and certification level for a requesting entity are provided. A target set of certification requirements is organized according to a set of process areas that are applicable to one or more roles.... Agent: Wurldtech Security Technologies

20140101438 - Structure preserving database encryption method and system: A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE method permits to convert a conventional database index into a secure one, so that the time complexity of all queries is... Agent: Ben-gurion University Of The Negev Research And Devlopment Authority

20140101440 - Digital arbitration: A method for resolving disputes between users in network communications using digital arbitration. The method comprising the steps of agreeing on a contract between the users and choosing a set of arbitrators; appealing to the arbitrators by a first user, if he/she suspects the second user violates the agreement; and... Agent: Ben-gurion University Of The Negev

20140101439 - Systems and methods for authentication between networked devices: Systems, methods, and computer-readable media are disclosed for authentication of networked devices in which a server device may authenticate a client device and/or a client device may authenticate a server device. Authentication credentials may be exchanged by the server device and the client device to enable mutual authentication. Upon authentication... Agent: General Electric Company

20140101441 - Systems and methods for flash crowd control and batching ocsp requests via online certificate status protocol: The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers receives a first client certificate during a first SSL handshake with a first client and a second client certificate during a... Agent: Citrix Systems, Inc.

20140101442 - System and web security agent method for certificate authority reputation enforcement: Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system... Agent: Barracuda Networks, Inc.

20140101443 - Method and apparatus for selectively providing protection of screen information data: A method and apparatus for enabling a cloud server to provide screen information data indicating a screen to be displayed on a client device are provided. The method of enabling a cloud server to provide screen information data relating to a screen to be displayed on a client device includes:... Agent: Samsung Electronics Co., Ltd.

20140101444 - Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer: Disclosed are a data transmission/reception apparatus and method. A secret key generation unit uses a user ID as a public key to generate a secret key corresponding to the user ID. An encryption/decryption unit sets a user ID intended to receive data as an input value to encrypt the data... Agent: Samsung Sds Co., Ltd.

20140101445 - Authenticated encryption support in iso/iec 23009-4: A server apparatus supporting authenticated encryption in a network, comprising a receiver configured to receive an unencrypted segment, a processor configured to selecting an encryption key, an initialization vector, and an additional authentication data (AAD), encrypt the segment, configuring the segment for transfer in a Dynamic Adaptive Streaming over Hypertext... Agent: Futurewei Technologies, Inc.

20140101447 - Mutual authentication schemes: Implementations of the present disclosure are directed to web-based authentication. Implementations include receiving user credentials at a browser, transmitting a first request to an application, the first request including a first user credential, receiving a first response, the first response including an encrypted server public key (SPK) and a user-specific... Agent: Sap Ag

20140101446 - Secure client-side key storage for web applications: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for secure client-side key storage for authentication tracking. Implementations include actions of determining, at a browser executed on a client-side computing device, that an application is authentic, the application being executed on a server-side computing device, in response... Agent: Sap Ag

20140101448 - System and method for secure messaging in a hybrid peer-to-peer network: An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages to one another within a hybrid peer-to-peer environment.... Agent: Damaka, Inc.

20140101451 - Client side encryption with recovery method: Technology is disclosed herein for client side data encryption with a recovery mechanism. According to at least one embodiment, a computing device encrypts at least one data set into an encrypted data set using a private encryption key. The computing device encrypts the private encryption key using a password provided... Agent: Nextbit Systems Inc.

20140101450 - Method and apparatus for remotely provisioning software-based security coprocessors: A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system.... Agent:

20140101449 - Method and system for the remote provisioning of subscription: The present disclosure relates to a method and system for the remote provisioning of an access subscription of a user to a wireless communication network, wherein at least one network operator provides communication services to mobile communication devices provided with a user UICC card. Data of a temporary subscription are... Agent:

20140101452 - Method and terminal for transmitting information: The present disclosure provides an information transmitting method and terminal for the same. The method can comprise: establishing a communication connection between an execution terminal and a command terminal into which an IM message is entered when the command terminal detects an information transmission request from the execution terminal; recording... Agent: Tencent Technology (shenzhen) Company Limited

20140101453 - Real identity authentication: A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored instructions in firmware which perform authentication in a secure manner, independent of processing and storage resources on a host platform. The device and authentication process require biometric... Agent: Msi Security, Ltd.

20140101454 - Secure credential unlock using trusted execution environments: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK)... Agent: Microsoft Corporation

20140101456 - Confidentiality preserving document analysis system and method: A method and system for document processing allow a service provider to process a document without having access the textual content of the document. The system includes memory which receives an encoded source document from an associated client system. The encoded source document includes structural information and encoded content information.... Agent: Xerox Corporation

20140101455 - Implementing dynamic banding of self encrypting drive: A method and controller for implementing dynamic banding of a storage device, such as a Self Encrypting Device (SED) in a data storage array, and a design structure on which the subject controller circuit resides are provided. The controller dynamically identifies band boundaries for the storage device at the time... Agent: International Business Machines Corporation

20140101457 - Method and system for providing document retention using cryptography: Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents),... Agent: Intellectual Ventures I LLC

20140101460 - Architecture and instruction set for implementing advanced encryption standard (aes): A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it... Agent:

20140101458 - Code tampering protection for insecure environments: In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow subsequent detection of tampering by a attacker with the code. This verification technique is used here in a “White Box” cryptographic process by... Agent: Apple Inc.

20140101459 - Mode-based secure microcontroller: Various embodiments of the present invention are related to integrated circuits for processing data at a microcontroller interface. The microcontroller interfaces to a memory. The method is employed to process input data provided by the microcontroller during a memory write operation, or input data extracted from the memory during a... Agent: Maxim Integrated Products, Inc.

20140101461 - Parallelized counter tree walk for low overhead memory replay protection: A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks along a counter tree structure. The memory encryption engine upon receiving an incoming read request for the protected memory region, performs a dependency check... Agent:

20140101463 - Current distribution system, current distribution method, and computer system thereof: A current distribution system, a current distribution method, and a computer system thereof are disclosed. The current distribution system includes a main control unit, a first power supply device, and a second power supply device. The main control unit is used for generating a first control command and a second... Agent:

20140101462 - Energy-efficient uninterruptible electrical distribution systems and methods: A power distribution system for data center systems (and corresponding method) feeds DC power directly to a first AC-DC power supply of a computer system in the data center system and feeds AC power to a second AC-DC power supply of the computer system to efficiently and reliably provide an... Agent: InertechIPLLC

20140101465 - Extending the capabilities of existing devices without making modifications to the existing devices: A system of extending functionalities of a host device using a smart flash storage device comprises the host device having a host interface and configured to perform a specific function to generate a first set of data. The host device is coupled with a flash storage device. The flash storage... Agent:

20140101466 - Information processing device and method, record medium and program: The present technique relates to an information processing device, an information processing method, a record medium and a program which can prevent hot insertion and extraction of an SIM card. A removing unit removes a tray storing a storage member. A removal detector detects an operation of starting removal of... Agent: Sony Corporation

20140101464 - Uninterruptible power system and power control system thereof: An uninterruptible power system and a power control system thereof are disclosed. The power control system includes the uninterruptible power system and a computer system. The uninterruptible power system supplies power to the computer system and includes an external power adaptor, a battery module, a first switch module, a second... Agent: Wistron Corporation

20140101467 - Discovering, validating, and configuring hardware-inventory components: Methods, systems, and computer-readable media for automatically validating and configuring an inventory of hardware to interact seamlessly with a cloud-computing fabric of a data center are provided. Initially, devices internal to the hardware inventory are located by sending and receiving messages via out-of-band communication channels and network communication channels, respectively.... Agent: Microsoft Corporation

20140101468 - Apparatus, system and method for gated power delivery to an i/o interface: Techniques and mechanisms for managing a delivery of power to a resource of an input/output (I/O) interface. In an embodiment, a first link of a plurality of communication links is monitored. Of the plurality of links, a first set of resources of the I/O interface is to support communication only... Agent:

20140101469 - Hard drive energy-saving control method and apparatus, and central processing unit: A hard drive energy-saving control method is disclosed. The method includes: obtaining a historical working state of a hard drive in each preset time segment, where each preset time segment is each preset time segment in at least one statistic period; predicting a working state of the hard drive in... Agent: Huawei Technologies Co., Ltd.

20140101470 - Idle duration reporting for power management: For one disclosed embodiment, data corresponding to an idle duration for one or more downstream devices may be received. Power may be managed based at least in part on the received data. Other embodiments are also disclosed.... Agent:

20140101471 - Power management for processing capacity upgrade on demand: A method, computer program product, and apparatus for managing power management in a data processing system are presented. A core is activated and configured to operate at a frequency in response to a request to increase a processing capacity. A determination whether a use of power resulting from activating the... Agent: International Business Machines Corporation

20140101472 - Adaptive screen timeouts based on user preferences, interaction patterns and active applications: A computing device, such as a mobile communication device, is provided that adjusts, based on user interaction with the device, sleep times for a display to enter a sleep mode restricting use of a graphical user interface. The device includes a display providing the graphical user interface and a processor.... Agent: Google Inc.

20140101473 - System and method for enabling energy efficient ethernet networks with time-sensitive protocols: A system and method for enabling energy efficient Ethernet networks with time-sensitive protocols. Time-stamped packets generated by a time-sensitive protocol rely on fixed latency in a transit time through a transmission subsystem. An energy efficiency control policy in a network device governs a transmission of time-stamped packets in accordance with... Agent: Broadcom Corporation

20140101474 - System and method for extending system uptime while running on backup power: A server chassis includes an uninterruptible power supply, and a server including a controller. The uninterruptible power supply is configured to provide a reserve power when a primary power is lost, and to send a power loss signal when the primary power is lost. The controller is configured to receive... Agent: Dell Products, Lp

20140101476 - Battery management system and method: A battery management system/method implementing optimal dynamic battery charge/discharge cycling is disclosed. The system utilizes a power source control unit (PSCU) to selectively switch a power supply source to a battery charger that charges a battery servicing a portable computing device. The PSCU is controlled by a power monitor control... Agent: Advanergy, Inc.

20140101475 - Power management system: A power management system includes a power system. A powered component is coupled to the power system. A power detect circuit is coupled to the power system. A power system controller is coupled to the power system, the powered component, and the power detect circuit. The power system controller is... Agent: Dell Products L.p.

20140101477 - Power switching in a two-wire conductor system: In an example embodiment, a power switching circuit of an automobile audio bus (A2B) chip is provided in a bi-directional, multi-node two-wire conductor system that includes a plurality of A2B chips interconnected on a twisted wire pair bus (A2B bus), with at least one A2B chip functioning as a master... Agent: Analog Devices, Inc.

20140101478 - Processor clocking policies for mobile computing devices: In one embodiment, a processor of a computing device executes a sequence of instructions that depends on one or more external operations. Software of the computing device determines a clocking policy for the processor during execution of the sequence of instructions. The clocking policy is based at least in part... Agent:

  
04/03/2014 > 69 patent applications in 28 patent subcategories.

20140095853 - Alternative boot path support for utilizing non-volatile memory devices: Embodiments of the invention describe apparatuses, systems and method for particularly to providing alternative boot paths for computing devices. In embodiments of the invention, a non-volatile controller subsystem is powered up by default in order to allow memory operations to one or more non-volatile devices prior to PCIe/USB enumeration. Logic... Agent:

20140095854 - Computer and hardware parameter configuring method thereof: A hardware parameter configuring method operating under in an Extensible Firmware Interface-based basic input/output system mode includes reading a currently-existing hardware profile including multiple hardware parameters; reading a preloading hardware profile including multiple hardware parameters; comparing the currently-existing hardware parameters with their corresponding preloading hardware parameters to generate a comparison... Agent: Msi Electronic (kun Shan) Co., Ltd

20140095852 - Multi-persona computing based on real time user recognition: A computing device may configure one or more applications on the computing device for a specific user in response to identifying that the specific user is operating the device and may make relevant content available to such applications. The identification of the specific user may be performed using a signal... Agent:

20140095858 - Customizing program logic for booting a system: A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The method includes determining the hardware devices operatively connected with the target system; sending a first list of identifiers of the determined hardware devices... Agent: International Business Machines Corporation

20140095857 - Multiple system images for over-the-air updates: In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the... Agent: Facebook, Inc.

20140095856 - Pinning boot data for faster boot: Methods and apparatus are provided for reducing computer system boot up times in systems with composite HDD-SSD storage devices. Booting a computer system having a composite storage device that includes a magnetic storage device (HDD) and a solid state storage device (SSD) includes identifying boot data read from the magnetic... Agent: Apple Inc.

20140095855 - Secure system flash sharing: Systems and methods may provide for securely transferring data from a flash component. In one example, the method may include receiving a download request from an embedded controller chip, obtaining information from the flash component in response to the download request, and transferring the information to the embedded controller chip.... Agent:

20140095859 - Apparatus and method for managing register information in a processing system: The setting in a configuration register is controlled based on a value stored in a management register and/or based on generation of a reset signal during a debugging operation or detection of a malfunction or power state transition in an electronic system. The management register may allocate a single bit... Agent:

20140095860 - Architecture for cloud computing using order preserving encryption: A method for providing enhanced security in cloud computing architecture by managing the types of interaction a server should be allowed, thus preventing decryption of private data. A client may encrypt data using an order preserving encryption (OPE) algorithm. One application of the method and system is a browser-based webmail... Agent:

20140095861 - Input consistency verification for server assisted secure function evaluation: Server-assisted secure function evaluation (SFE) is performed with input consistency verification for two parties that want to evaluate a function. The server computes a garbled circuit corresponding to the function. A predefined bit of the 0-secret of wire i in the garbled circuit is set to a random bit bi... Agent:

20140095862 - Security association detection for internet protocol security: According to an example, a detection message may be sent for security association detection for Internet protocol security. The detection message includes a detection flag. The detection message may be an encapsulated message including the detection flag.... Agent: Hangzhou H3c Technologies Co., Ltd.

20140095863 - Internet based security information interaction apparatus and method: The present invention discloses a device and method for security information interaction. The device for security information interaction includes: an interface circuit, configured to connect the device for security information interaction to an internet terminal; an information input unit, configured to allow user to input security information; a secure encryption/decryption... Agent:

20140095864 - Reduced authentication times in constrained computer networks: In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the LLN in order... Agent: Cisco Technology, Inc.

20140095865 - Exchange of digital certificates in a client-proxy-server network configuration: Various techniques are described to authenticate the identity of a proxy in a client-proxy-server configuration. The configuration may have a client-side and a server-side SSL session. In the server-side session, if the proxy has access to the private keys of the client, the proxy may select a client certificate from... Agent: Blue Coat Systems, Inc.

20140095866 - System and method for verification of digital certificates: Analysis of authenticity digital certificates includes. Initial information pertaining to digital certificates is collected from diverse information sources. For each of the digital certificates the initial information includes intrinsic parameter data from among contents of the digital certificate and extrinsic parameter data pertaining to the digital certificate and comprising static... Agent:

20140095867 - Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function... Agent:

20140095869 - Secure data storage: Methods and systems for obscuring the location of critical system files are provided. In particular, the locations of files stored within a file system are selected by applying various inputs to a hash algorithm. For system files, the inputs applied to the hash algorithm can include a user name and... Agent: Absio Corporation

20140095868 - System and method for multi-layered sensitive data protection in a virtual computing environment: Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data... Agent: Ca, Inc.

20140095870 - Device, method, and system for controlling access to web objects of a webpage or web-browser application: A method and device for securely displaying web content with secure web objects across untrusted channels includes downloading web content from a web server. The web content includes tags that a web browser uses to authenticate the current user and identify encrypted web objects packaged in the web content. The... Agent:

20140095872 - Analyte data retriever: Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include receiving, at a first processing system including a user interface, an installation package including a plug-in and code configured to provide at the first processing system an interface between... Agent: Dexcom, Inc.

20140095873 - Method and system for hypertext transfer protocol digest authentication: A method and system for hypertext transfer protocol digest authentication through the use of a token issuing entity trusted by both a client and a service provider. The token issuing entity may issue an encrypted token and a token secret to the client. The client may then use the token... Agent: Research In Motion Limited

20140095874 - Method and system for secured inter-application communication in mobile devices: This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based... Agent: Salesforce.com, Inc.

20140095871 - Protecting online meeting access using secure personal universal resource locators: Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a... Agent: International Business Machines Corporation

20140095875 - Use of application identifier and encrypted password for application service access: To support authentication of a mobile device, an application server obtains an application identifier and password and creates an encrypted value by encrypting a combination of the password and a lime based value. The application server transmits the application identifier and encrypted value over a communication network to the mobile... Agent: Cellco Partnership D/b/a Verizon Wireless

20140095881 - File sharing with client side encryption: Technology is disclosed herein for sharing encrypted data within a client-server distributed data storage system. According to at least one embodiment, a first computing device encrypts multiple data sets of the first computing device using symmetric encryption keys. Each of the data sets is encrypted using a different symmetric encryption... Agent: Nextbit Inc.

20140095876 - Introduction of discrete roots of trust: Systems and methods may provide introducing a first root of trust on a platform to a second root of trust on the same platform. In one example, the method may include using an authenticated code module to transfer a first encryption key from a first root of trust on a... Agent:

20140095878 - Key change management apparatus and key change management method: According to one embodiment, an apparatus includes a permission/inhibition information storage which stores a permission/inhibition information file, a changer which changes a first encryption key of a first private key encrypted with the first public key to the second public key by using the first re-encryption key, a first storage... Agent:

20140095882 - Method for providing cryptographic key pairs: The invention relates to a method for creating a second asymmetric cryptographic pair of keys, wherein a first private key (G0) together with a first public key (O0) forms a first asymmetric cryptographic pair of keys (K0). Embodiments of the method may comprise the following steps: receiving a user identifier;... Agent: Compugroup Medical Ag

20140095879 - Storing a key in a remote security module: A system obtains assurance by a content provider that a content control key is securely stored in a remote security module for further secure communications between the content provider and the security module. A security module manufacturer, which has a pre-established trustful relation with the security module, imports a symmetric... Agent: Activldentity

20140095880 - System and method for software protection and secure software distribution: The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for downloading to a client and identifies the sections for encoding. APIs are inserted in the identified sections. A unique ID is created based... Agent: Aventyn, Inc.

20140095877 - Transmitting apparatus, communicating system: e

20140095883 - Hardening of direct anonymous attestation from side-channel attack: Various embodiments are generally directed to hardening the performance of calculations of a digital signature system for authenticating computing devices against side-channel attacks. An apparatus comprises a processor circuit and an interface operative to communicatively couple the processor circuit to a network; a storage communicatively coupled to the processor circuit... Agent:

20140095885 - Methods for biometric registration and verification, and related systems and devices: The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data (4) and second biometric data (5) relating to said person; obtaining alphanumerical data (a) including at least one identifier relating to said person; storing, in a... Agent: Morpho

20140095884 - Multi-factor authentication using biometric data: Technologies for enabling biometric multi-factor authentication includes a transform selector value, a transform function that uses the transform selector value and a biometric user identifier as input, a salt derived from the output of the transform function, and a cryptographic hash function that generates a hash value based on the... Agent:

20140095886 - Methods, systems and apparatus to self authorize platform code: Methods and apparatus are disclosed to self authorize platform code. A disclosed example method includes storing a hash of a first public key in a policy data structure of a platform at a first time, extracting a second public key from a signature block associated with a data structure to... Agent:

20140095889 - Encrypted search database device, encrypted search data adding/deleting method and adding/deleting program: The encrypted search result adding module of the encrypted search database device includes: a search result generating unit which generates a linear list as a list of search results for newly registered document data; an initial point information generating unit which generates initial point information as address of first data... Agent: Nec Corporation

20140095888 - Matrix code for encryption, storage, and transmission of data: A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and identifies a first mask within a data region of the matrix code, wherein the first mask includes public user data, and identifies a second mask... Agent: International Business Machines Corporation

20140095887 - Method and apparatus for maintaining trusted time at a client computing device: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for maintaining trusted time at a client computing device including, for example, executing a computer program within a client device; initiating a call from the computer program to a secure time service of the client device requesting a... Agent:

20140095890 - Systems and methods for manipulating sensitive information in a secure mobile environment: Methods and devices for protecting and manipulating sensitive information in a secure mobile environment are disclosed. Methods and devices for processing secure transactions and secure media processing up to rendering in human readable form using abstract partitioning between non-secure and secure environments are disclosed.... Agent: Motorola Mobility LLC

20140095892 - Digital information protecting method and apparatus, and computer accessible recording medium: In a method for protecting digital information, a processor converts a protected address range into a plurality of address blocks of a storage device based on a preset conversion unit, and generates an address block rearranging rule using the address blocks as a parameter. When it is desired to load... Agent:

20140095891 - Instruction set for sha1 round processing on 128-bit data paths: According to one embodiment, a processor includes an instruction decoder to receive a first instruction to process a SHA1 hash algorithm, the first instruction having a first operand, a second operand, and a third operand, the first operand specifying a first storage location storing four SHA states, the second operand... Agent:

20140095893 - Method and apparatus for encryption: Method and apparatus for encryption, and a non-transitory computer-readable medium that stores instructions for performing encryption. The method includes loading a virtual system driver module in a host operating system and constructing a virtual operating system, wherein the virtual operating system comprises a micro-kernel; preparing and providing context of a... Agent: Tencent Technology (shenzhen) Company Limited

20140095894 - Policy-based application management: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the... Agent: Citrix Systems, Inc.

20140095895 - Methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information: Applicant has created methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information to facilitate an account owner's management of her personal, private, business, and legal documents. The method for safeguarding can include a double authentication process that only grants exclusive access to an account... Agent:

20140095897 - Electronic device and method to extend battery life: An electronic apparatus is provided that includes a processor, a voltage regulator, a battery controller and an embedded controller. The voltage regulator to receive an input voltage and to provide an output voltage to the processor. The battery controller to store electronic device information and to receive battery information related... Agent:

20140095896 - Exposing control of power and clock gating for software: A processor includes at least one power domain, each power domain including at least one core that switchably receives power supply from a voltage regulator and switchably receives a clock signal from a clock source, a cache, and at least one control registers having stored thereon data indicating power management... Agent:

20140095898 - Fuel cell for powering computer apparatus: A computer peripheral device incorporates a fuel cell that may be used to supply power to a computer device coupled to the peripheral device. The peripheral device comprises a housing and circuitry within the housing to provide at least one computer peripheral function. A data interface provides for data transfer... Agent:

20140095899 - Information handling system adaptive high performance power delivery: An information handling system provides power to a peripheral though a peripheral interface, such as a USB interface, by communicating power availability with a primary set of power parameters through a data link and communicating power availability with a secondary set of power parameters through a power link. If a... Agent: Dell Products L.p.

20140095900 - Power supply system: A power supply system for an information handling system is provided. The information processing system is electrically coupled to an AC power source and includes at least one computer unit. The power supply system includes: at least one AC power supply unit electrically coupled to the at least one computer... Agent: International Business Machines Corporation

20140095901 - System and method for managing a power mode of a designated electronic device: A system and method for managing a power mode of a designated electronic device are provided. A geographical location of a mobile electronic device is determined. A comparison of the determined geographical location of the mobile electronic device and a stored location of a designated electronic device in a power-off... Agent: Google Inc.

20140095904 - Apparatus and method for determining the number of execution cores to keep active in a processor: A processor is described that includes a plurality of execution cores. The processor also includes power management circuitry to dynamically determine a number of the execution cores that, when active, will cause the processor to operate in a substantially linear power consumption vs. frequency region of operation such that performance... Agent:

20140095905 - Computing system and processor with fast power surge detection and instruction throttle down to provide for low cost power supply unit: A processor is described that includes a quick signal path from an input of the processor to logic circuitry within the processor. The input is to receive a fast throttle down signal. The logic circuitry is to throttle down a rate at which the processor issues instructions for execution in... Agent:

20140095908 - Downstream device service latency reporting for power management: For one disclosed embodiment, a transition from a first state to a second, different state for at least a portion of a downstream device may be identified. The first and second states may correspond to different levels relating to activity for at least a portion of the downstream device. Data... Agent:

20140095907 - Method of conserving power based on electronic device's i/o pattern: A method of affecting power used by an electronic device is provided for an electronic device having storage media and running at least one application. Each application interfaces with the storage media through an input/output (I/O) path executing I/O activities that access the storage media in accordance with configurable parameters... Agent: College Of William And Mary

20140095903 - Power excursion tolerant power system: A power excursion tolerant power system includes at least one powered component. A system capacitance and at least one power supply are coupled to the at least one powered component. The at least one power supply is operable as a voltage controlled current source to supply power to the at... Agent: Dell Products L.p.

20140095902 - Power saving traffic management policies: A method and system are provided for reducing power usage in a telecommunications network. Policies are applied during traffic management of packets, the policies taking into account the power cost of transmitting a packet onward, including over a network. Embodiments are provided in which such policies are used during classification,... Agent: Alcatel-lucent Canada Inc.

20140095906 - Rotational graphics sub-slice and execution unit power down to improve power performance efficiency: Methods and apparatus relating to rotational graphics sub-slice and Execution Unit (EU) power down to improve power performance efficiency are described. In one embodiment, power-gating is rotated amongst single sub-slices within each slice of a plurality of slices based on an indication to reduce power consumption of a computational logic.... Agent:

20140095909 - Multiple clock domain cycle skipping utilizing optimal masks to minimize voltage noise: Implementations of the present disclosure involve an apparatus and/or method for providing one or more clock signals that include a skipped clock cycle to a portion of a computing system. The skipped cycle clock signals may be changed by the computing system during operation of the system by altering masks... Agent: Oracle International Corporation

20140095911 - Controlling power consumption by power management link: Methods and apparatus relating to controlling power consumption by a power management link are described. In one embodiment, the physical interface of a power management (PM) link is shut down when a processor is in a sleep state (e.g., to conserve power), while maintaining the availability of the processor for... Agent:

20140095913 - Electronic apparatus: An electronic apparatus is disclosed. The electronic apparatus comprises a capacitive sensor and a central processing unit (CPU). The capacitive sensor comprises a sensor output pin, and the CPU comprises a wake-up pin. The wake-up pin is coupled to the sensor output pin.... Agent: Wistron Corporation

20140095914 - Information processing apparatus and operation control method: According to one embodiment, an information processing apparatus includes a display processor and a power-saving setup module. The display processor displays on a screen a first interface including a slider which is movable along a path. The power-saving setup module sets values of a plurality of power-saving setup items in... Agent:

20140095910 - Method and apparatus for efficient store/restore of state information during a power state transition: A processor is described having streamlining circuitry that has a first interface to receive information from a memory describing: i) respective addresses for internal state information of a power domain; ii) respective addresses of a memory where the internal state information is stored when the power domain is powered down;... Agent:

20140095912 - Micro-architectural energy monitor event-assisted temperature sensing: Methods and apparatus relating to micro-architectural energy monitor event-assisted temperature sensing are described. In one embodiment, at least one of a plurality of slices of a computational logic or at least one of a plurality of sub-slices of the computational logic are powered down or powered up based on a... Agent:

20140095915 - Portable electronic device carrier with electronic interface for recharging device battery: An electronics device carrier for porting a battery powered electronic device is formed by outer walls surrounding a hollow volume. The electronic device is held within the hollow volume and can be operated without removing the electronic device from the carrier. An input interface comprising interface elements external to the... Agent: Protonex Technology Corporation

20140095916 - Power supply circuit for pci-e and motherboard having same: An exemplary power supply circuit for a PCI-E on a motherboard includes a first power supply, a detection unit, a power control unit, and a discharge unit. The first power supply supplies power for the PCI-E via a power pin of the PCI-E. The detection unit detects whether the motherboard... Agent: Hong Fu Jin Precision Industry (wuhan) Co., Ltd.

20140095917 - Dynamic power system adjustment to store energy for power excursions: A power system is coupled to a powered system and a system capacitance. The power system includes a power system output sensor, a power conversion device, and a power system output controller. The power system output controller includes a powered system threshold that is related to a power excursion capability... Agent: Dell Products L.p.

20140095918 - Method and apparatus for maintaining secure time: An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset... Agent:

20140095919 - Clock control method for performance thermal and power management system: A control method for a clock signal for a CPU contained in a CMOS circuit includes: when a load current for the CMOS circuit is enabled, generating a first clock signal; in a first period, selectively gating certain cycles of the first clock signal to generate a second clock signal... Agent: Mediatek Singapore Pte. Ltd.

20140095920 - Variable clocked serial array processor: A serial array processor may have an execution unit, which is comprised of a multiplicity of single bit arithmetic logic units (ALUs), and which may perform parallel operations on a subset of all the words in memory by serially accessing and processing them, one bit at a time, while an... Agent:

  
03/27/2014 > 76 patent applications in 29 patent subcategories.

20140089648 - Bifurcated processor chip reset architectures: Systems and techniques for processor reset hold control are described. A described system includes a controller to detect a hold request based on an external reset signal and an external debug signal, and generate a hold signal based on a detection of the hold request, where the hold signal continues... Agent: Atmel Corporation

20140089651 - Computing device boot software authentication: Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor circuit and storage storing an initial boot software component comprising instructions operative on the processor circuit to select a first set of boot software components of multiple... Agent:

20140089652 - Customizing program logic for booting a system: A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The system is connected to one or more target systems via a network, the server system being adapted for: receiving a first list of... Agent: International Business Machines Corporation

20140089656 - Data processing apparatus and computer-readable recording medium: Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution starting data for starting execution of the program; a first decode key storage unit that stores a first decode key capable of... Agent:

20140089653 - Electronic apparatus, method of restoring guid partition table (gpt) and computer-readable recording medium: An electronic apparatus comprising a storage unit to store a first (primary) GPT, a second (secondary) GPT, and an OS, a controller boots the electronic apparatus using the first GPT and the OS, an effectiveness determination unit determines effectiveness of the first GPT if a predetermined event occurs, and a... Agent: Samsung Electronics Co., Ltd.

20140089654 - Network storage target boot and network connectivity through a common network device: The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network... Agent:

20140089650 - Security enclave processor boot control: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access... Agent: Apple Inc.

20140089655 - System and method for auto-failover and version matching of bootloader in an access controller: In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may include a memory having a bootloader portion including a first memory address and a second memory address a second processor communicatively... Agent:

20140089649 - System and method of server re-provisioning via a service processor and virtual initiators: A method includes determining, by a management controller of a first server in a storage network, if a first virtual initiator is used by a second server in the storage network, wherein the first virtual initiator includes first boot information for allocating a first storage resource of the storage network,... Agent: Dell Products, Lp

20140089657 - Recording medium storing data processing program, data processing apparatus and data processing system: A computer-readable storage medium stores a data processing program for causing a computer to execute a process. The process includes: identifying a first combination of first data and second data based on a predetermined condition from a storage in which the first data and first ciphered data obtained by ciphering... Agent: Fujitsu Limited

20140089659 - Method and apparatus for key provisioning of hardware devices: Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform.... Agent:

20140089658 - Method and system to securely migrate and provision virtual machine images and content: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI... Agent:

20140089660 - Enhanced privacy id based platform attestation: As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the privacy issues of common RSA PKI security implementations where every individual is uniquely identified by their private keys. Instead, EPID provides the capability of remote attestation but... Agent:

20140089661 - System and method for securing network traffic: One variation of a method for selectively filtering internet traffic includes: receiving DNS queries; determining resource access levels for the DNS queries based on an internet resource database, wherein the resource access levels comprise a first level, a second level, and a third level returning an unmodified IP address for... Agent: Securly, Inc.

20140089662 - Systems and methods for sharing files among multiple terminals: Embodiments of the disclosure provide a method and apparatus for sharing data. The method includes: initiating the data sharing application on a first terminal; inserting the file to be shared in a webpage of the data sharing application on the first terminal, and generating an URL for the file in... Agent: Tencent Technology (shenzhen) Company Limited

20140089663 - Communication method, application device, program, and communication system: According to one embodiment, a communication method including acquiring an application key from a key-sharing network, determining a key use of the application key, and performing encryption communication by using the application key according to the determined key use.... Agent: Kabushiki Kaisha Toshiba

20140089664 - Trusted and confidential remote tpm initialization: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.... Agent: Microsoft Corporation

20140089665 - System and method for using a streaming protocol: An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application... Agent: Aol Inc.

20140089666 - Time synchronization in a machine to machine communication: The present disclosure is related to performing a time synchronization between entities in a machine to machine (M2M) communication.... Agent: Kt Corporation

20140089669 - Confidential provisioning of secret keys over the air: A method and apparatus for personalizing a smart card coupled with a communication device of a user who is a subscriber of a first telecommunication network and wishes to become a subscriber of a second telecommunication network is disclosed. A first authentication key is stored in both the smart card... Agent: Alcatel Lucent

20140089667 - Secure debug trace messages for production authenticated code modules: Methods of extending capabilities of authenticated code modules (ACM) with minimal increase in code size comprises defining an authenticated code module (ACM) extension module using an entry of a Firmware Interface Table (FIT). The FIT contains a starting address of the ACM extension module that is located outside of a... Agent:

20140089668 - Transmitting device, receiving device, transmitting method, receiving method, and program: There is provided a transmitting device including a public key information adder that adds information on a public key corresponding to an electronic signature to a sender address in an email with the electronic signature attached, and a transmitter that transmits the email.... Agent: Sony Corporation

20140089670 - Unique code in message for signature generation in asymmetric cryptographic device: Methods and systems are disclosed for verifying the use of a client device by a host device in a secure system. In one aspect, a method for authenticating a client device includes receiving, by the client device, a message from a host device, accessing, by the client device, a private... Agent: Atmel Corporation

20140089671 - Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers: Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating devices to access information and/or services provided by a remote server. Synchronization techniques include client devices and remote servers storing buckets of information. The client device sends a subscription request to... Agent: Nest Labs, Inc.

20140089673 - Biometric identification method and apparatus to authenticate identity of a user of a wearable device that includes sensors: Embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices for facilitating health and wellness-related information, and more particularly, to an apparatus or method for using a wearable device (or carried device) having sensors to identify a wearer and/or generate a... Agent: Aliphcom

20140089672 - Wearable device and method to generate biometric identifier for authentication using near-field communications: Techniques associated with a wearable device and method to generate biometric identifier for authentication using near-field communications are described, including capturing data associated with a habitual activity, a physiological characteristic, and a motion pattern using a wearable device, generating a biometric identifier using the data, storing the biometric identifier on... Agent: Aliphcom

20140089675 - Authenticator, authenticatee and authentication method: According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to... Agent: Kabushiki Kaisha Toshiba

20140089674 - Encryption in the cloud with customer controlled keys: A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a customer computing platform to a key store of the cloud computing platform, based on a customer-based encryption key. The cloud-based encryption key and customer-based encryption... Agent:

20140089677 - Method and apparatus for securing programming data of a programmable device: Configuration data for a programmable integrated circuit device is at least partially encrypted according to at least one encryption scheme. A plurality of key stores store a plurality of decryption keys for the at least one encryption scheme. Control circuitry identifies a required key from the at least partially encrypted... Agent: Altera Corporation

20140089678 - Order-preserving encryption system, device, method, and program: An order-preserving encryption system has an encryption means which generates a ciphertext as a sum of data which complies with a distribution X determined in advance, and the encryption means generates the ciphertext using the distribution X represented in a format that data of a bit length determined at random... Agent: Nec Corporation

20140089676 - Secure processor and a program for a secure processor: The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform... Agent: Fujitsu Semiconductor Limited

20140089679 - Secure execution of a computer program using binary translators: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein to provide a computing device with cooperative first and second binary translators in first and second execution environments having first and second security levels, respectively. The second security level may be more secure than the first security... Agent:

20140089680 - Secure processor and a program for a secure processor: The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform... Agent: Fujitsu Semiconductor Limited

20140089681 - Secure processor and a program for a secure processor: The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform... Agent: Fujitsu Semiconductor Limited

20140089682 - Security enclave processor for a system on a chip: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access... Agent: Apple Inc.

20140089685 - Key information generation device and key information generation method: In initial generation (for example, shipping from the factory), a security device generates an identifier w specific to the security device, with the PUF technology, generates key information k (k=HF(k)) from the identifier w, generates encrypted confidential information x by encrypting (x=Enc(mk, k)) confidential information mk with the key information... Agent: Mitsubishi Electric Corporation

20140089684 - Method and apparatus for protecting file: Embodiments of the present invention provide a method and a system for protecting a file, which belong to the field of information security. The method includes: replacing a secure file header of a file to be protected with its original file header to convert the file to be protected to... Agent: Huawei Device Co., Ltd.

20140089683 - Multi-drive cooperation to generate an encryption key: A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme. The data of each storage device is encrypted with a key, and the key is encrypted based on a shared secret and a device-specific value. Each storage device stores a share... Agent: Pure Storage, Inc.

20140089686 - Bus pin reduction and power management: A reduced-pin bus system includes a bus having one or more signal lines that are coupled to a bus power supply through a current limiting device. A master unit is coupled to the bus and is arranged to transmit communications across the bus during an active period of the bus... Agent: Texas Instruments, Incorporated

20140089689 - Computer with force sensing resistor: A computer includes a motherboard with a signal receiving port and a switch circuit. The switch circuit includes a force sensing module and a transistor. The transistor includes a first terminal connected to the force sensing module, a second terminal connected to a power source, and a third terminal connected... Agent:

20140089690 - Controlling power supply in arithmetic processing circuit: An arithmetic processing circuit includes a plurality of arithmetic processing units, a plurality of selector circuits each configured to select one of a plurality of power supplies that are fewer than the arithmetic processing units and to connect the selected power supply to a corresponding one of the arithmetic processing... Agent: Fujitsu Limited

20140089687 - Power management integrated circuit: An integrated circuit (IC) package is disclosed. The IC package includes a first die; and a second die bonded to the CPU die in a three dimensional packaging layout.... Agent:

20140089688 - Sharing power between domains in a processor package: In an embodiment, the present invention includes a processor having a first domain with at least one core to execute instructions, a second domain coupled to the first domain and having at least one non-core circuit, and a power control unit (PCU) coupled to the first and second domains. The... Agent:

20140089692 - Storage battery monitoring method, storage battery monitoring system, and storage battery system: A storage battery monitoring method including: receiving, via a communication network, identification information indicating a storage battery system and characteristic data indicating a state of at least one storage battery; determining, based on the received characteristic data, a deterioration model corresponding to the at least one storage battery from among... Agent:

20140089691 - Supply margining method and apparatus: In accordance with some embodiments, margining routines to determine acceptable voltage command values for specific CPU implementations at one or more different operating levels may be provided.... Agent:

20140089694 - Dynamically controlling power based on work-loop performance: The present embodiments provide a system that dynamically controls power consumption in a computing device. During operation, the system measures the performance of the computing device while executing a work-loop. Next, the system determines a derived completion time for the work-loop based on the measured performance. (For example, the derived... Agent: Apple Inc.

20140089693 - Efficient low power exit sequence for peripheral devices: Embodiments of the invention describe methods, apparatuses and systems for providing an efficient low power exit sequence for peripheral devices. In embodiments of the invention, a signal from a host device is transmitted to a SATA peripheral device for exiting a low-power state. An initialization time for OOB transmission and... Agent:

20140089695 - Energy-saving device: The present invention discloses an energy-saving device with multiple voltage levels which is applied to a motherboard. The energy-saving device includes an energy-saving driving module electrically connected to a CPU on the motherboard for generating an energy-saving signal with multiple voltage levels to the CPU, so as to switch the... Agent: Msi Computer(shenzhen)co., Ltd.

20140089696 - Method for controlling power mode switching: A method for controlling power mode switching, applied to a computer device, is provided. The computer device includes a power source supplying electrical power to the computer device for operation and is operated in a first power mode. In the method, firstly, a request for switching the computer to a... Agent: Wistron Corp.

20140089697 - System-on-chip with capability for controlling power supply according to data transaction and method of operating the same: A system-on-chip (SoC) which includes a plurality of intellectual properties (IP cores) which communicate data with a memory device operates by monitoring whether a data transaction occurs between at least one of the IP cores and the memory device, determining an operation state of the IP core according to the... Agent:

20140089700 - Performance management methods for electronic devices with mutiple central processing units: Performance management methods for an electronic device with multiple central processing units (CPUs) are provided. First, thread loading rearrangement and CPU frequency evaluation are performed to obtain a plurality of evaluated performance values for different amounts of CPUs, wherein the plurality of evaluated performance values are relevant to power consumption... Agent: Htc Corporation

20140089699 - Power management system and method for a processor: The present disclosure relates to a method and apparatus for dynamically controlling power consumption by at least one processor. A power management method includes monitoring, by power control logic of the at least one processor, performance data associated with each of a plurality of executions of a repetitive workload by... Agent: Advanced Micro Devices

20140089698 - Sensing current to protect a fuse: The speed of a processor is adjusted based on the current sensed by a current sensor in order to protect a fuse from being damaged.... Agent: Hewlett-packard Development Company, L.p.

20140089707 - Changing power modes of a microcontroller system: A microcontroller system can operate in a number of power modes. In response to changing from a previous mode to a present mode, the microcontroller system reads a present calibration value correspond to the present mode from system configuration storage and write the present calibration value to a configuration register... Agent: Atmel Corporation

20140089708 - Delaying interrupts in a microcontroller system: A microcontroller system includes a power manager that is configured to, during a power saving mode, configure an interrupt delaying module to receive and hold an interrupt from an interrupt source. In response to receiving the interrupt from the interrupt source, the power manager causes the microcontroller system to exit... Agent: Atmel Corporation

20140089706 - Delaying reset signals in a microcontroller system: A microcontroller system includes a reset delaying module that is configured to, during a power saving mode, receive and delay a reset signal from a reset source. The reset delaying module waits for a regulator ready signal from a voltage regulator because, prior to the reset signal, the voltage regulator... Agent: Atmel Corporation

20140089702 - Energy-efficient content update: Embodiments of methods, systems, and storage medium associated with are disclosed herein. In one instance, the method may include: first determining whether the computing device is connected to a network, based on a result of the first determining, monitoring data traffic between the computing device and the network, wherein the... Agent:

20140089711 - Increasing the battery life of a mobile computing system in a reduced power state through memory compression: Embodiments of the invention are generally directed to systems, methods, and apparatuses for increasing the battery life of a mobile computing system through memory compression. In some embodiments, an integrated circuit includes compression logic to compress at least a portion of the data in volatile memory independent of an operating... Agent:

20140089709 - Information processing apparatus and information processing method: According to one embodiment, an information processing apparatus includes an operation control module, a calculator, and a display processor. The operation control module is configured to set the information processing apparatus in a power-saving state, based on a power-saving setup value corresponding to at least one power-saving setup item. The... Agent:

20140089710 - Integrated circuit, electronic device and operation method thereof: An embodiment of the invention provides an electronic device. The electronic device includes a first wireless module, a second wireless module and a controller. The first wireless module is controlled by a chipset to communicate with a portable device. The second wireless module communicates with the portable device. The controller... Agent: Nuvoton Technology Corporation

20140089703 - Low power event processing for sensor controllers: A controller includes a low power processor to couple to a sensor, the low power processor configured to receive data from the sensor and apply rules to the received data and provide an interrupt in accordance with the applied rules. A high power processor is coupled to receive interrupts from... Agent: Honeywell International Inc.

20140089701 - Method for controlling schedule of executing application in terminal device and terminal device implementing the method: A method may include associating, with a timer-B, a second application in a terminal device; setting the terminal device in a standby mode; and executing the second application when a processor in the terminal device wakes up after the timer-B measures a second amount of elapsed time. The timer-B may... Agent: Sony Mobile Communications Japan, Inc.

20140089705 - Power gating for termination power supplies: Power gating control architectures. A memory device having at least a memory array and input/output (I/O) lines terminated on the memory device with termination circuitry coupled to receive a termination supply voltage (Vtt) with power gating circuitry to selectively gate the termination supply voltage in response to a power gating... Agent:

20140089704 - System power control: A power control unit 16 controls the power consumed by a system 10 having a plurality of electrical power consumption states including an active state and at least one power saving state. The system comprises a plurality of subsystems 12 each having a plurality of subsystem power states including an... Agent: Hewlett-packard Development Company, L.p.

20140089713 - Computer system, power supply device and method thereof: A computer system includes a first electronic device configured to be operated by utilizing a regular voltage, a second electronic device configured to be operated by utilizing the regular voltage, and a power supply device for providing the regular voltage. The power supply device includes a voltage regulator coupled to... Agent: Wistron Corporation

20140089714 - Configuring power domains of a microcontroller system: A microcontroller system is organized into power domains. A power manager of the microcontroller system can change the power configuration of a power domain in response to event from an event generating module without activating a processor of the microcontroller system.... Agent: Atmel Corporation

20140089712 - Security enclave processor power control: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access... Agent: Apple Inc.

20140089715 - Information processing apparatus, information processing method, and computer program product: According to an embodiment, an information processing apparatus is powered by a power source including a power generation unit and a power storage device that stores power generated by the power generation unit. The information processing apparatus includes a first obtaining, a second obtaining unit, and a first control unit.... Agent: Kabushiki Kaisha Toshiba

20140089716 - Processing device and method for reducing noise: A processing device includes: a channel adaptor connected to an external device; a first resistor provided parallel to the channel adaptor, and has a variable resistance value; a processor to control the resistance value of the first resistor; a power supply device to provide power; a second resistor provided between... Agent: Fujitsu Limited

20140089717 - Ad-hoc synchronization of industrial control networks: A method and apparatus are disclosed to provide ad-hoc synchronization in industrial networks between a programmable logic controller and each I/O device without any specific protocol extensions or distributed clock scheme. An embodiment of an industrial control network comprising a Programmable Logic Controller (PLC), a network coupled to the PLC,... Agent:

20140089718 - Clock domain boundary crossing using an asynchronous buffer: An apparatus includes a plurality of channels, where each of the channels includes an asynchronous buffer, a latency determination block, a tap selection circuit, and a variable delay. A latency locator is configured to identify a longest latency from among the channels and is coupled to provide the longest latency... Agent: Xilinx, Inc.

20140089719 - Planning unambiguously across multiple time zones: A time slot of regular time length and capacity is defined in time local to a time zone. The slot is defined by a local time start timestamp and a local time end timestamp. In one aspect, upon determining that the local time end timestamp of the slot overlaps with... Agent:

20140089720 - Apparatus and methods for determining latency of a network port: One embodiment relates to a method for determining a latency of a network port. Read and write pointers for a FIFO are sampled at the same time. An average difference between a plurality of samples of the read and write pointers is determined. Another embodiment relates to an apparatus for... Agent:

20140089721 - Backplane communication system: The invention relates to an improved backplane communication system. In one embodiment this is accomplished by a central data processing card including at least one master central card and a plurality of slave central card, wherein each master central card and the slave central card having a first SerDes (serializer-deserializer),... Agent: Tejas Networks Limited

20140089722 - Single wire serial interface: A single wire serial interface for power ICs and other devices is provided. To use the interface, a device is configured to include an EN/SET input pin. A counter within the device counts clock pulses sent to the EN/SET input pin. The output of the counter is passed to a... Agent: Skyworks Solutions, Inc.

20140089723 - Semiconductor device, control method for the semiconductor device and information processing system including the same: The core chips each include a timing control circuit that outputs a timing signal synchronized with the outputting of parallel data to the interface chip. The interface chip includes a data input circuit that captures parallel data in synchronization with the timing signal. With this arrangement, the timing to output... Agent: Elpida Memory, Inc.

  
03/20/2014 > 65 patent applications in 31 patent subcategories.

20140082342 - Audio/video electronic equipment, such as a multimedia car radio, installable in an automotive vehicle: The equipment comprises a digital processor implementing an operating system requiring a previous boot before the equipment is in an operational state. A start module is operable, when the device is initially in a power-off state, for: producing a triggering signal upon detection (32) of a vibration by a sensor... Agent: Parrot

20140082344 - Case secure computer architecture: Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets, together with hardware and/or firmware, to compartmentalize execution of user programs to insure their behavior does not exceed defined bounds. Programs hidden in data cannot execute. User programs... Agent:

20140082343 - Information processing apparatus: The present disclosure provides an information processing apparatus effective in detecting an unauthorized use or misuse of the information processing apparatus from when the OS is shut down to when the OS is started. An information processing apparatus controlled by an operating system comprises: an operation history generating section which... Agent: Panasonic Corporation

20140082346 - Method and system for managing basic input/output system (bios) configuration data of bios: Disclosed in the present invention are a method and a system for managing basic input/output (BIOS) configuration data of a BIOS. The method includes: reading a BIOS program code, and executing a BIOS program; when executing the BIOS program, executing different code segments in the BIOS program according to read... Agent: Huawei Technologies Co., Ltd.

20140082341 - Method for generating reduced snapshot image for booting and computing apparatus: Method for generating a reduced snapshot image for booting and a computing apparatus are provided. An embodiment of the method includes the following. In response to a shutdown request, it is determined whether a specific boot mode is enabled. When the specific boot mode is enabled, a threshold parameter set... Agent: Industrial Technology Research Institute

20140082345 - Semiconductor device: On a single semiconductor package PK1, m semiconductor chips CP1 to CPm are mounted, and the semiconductor package PK1 has external terminals T shared by m pad electrodes PD1 to PDm of the m semiconductor chips CP1 to CPm. An electrostatic protection circuit CD is mounted on only one CPm... Agent: Kabushiki Kaisha Toshiba

20140082347 - Computer, and computer-readable storage medium for computer program: A mobile information terminal includes a normal setting data storage portion configured to store temporary setting data in advance as normal setting data that is related to settings; a separate setting data storage portion configured to store, for each user, separate setting data that is related to individual settings in... Agent: Konica Minolta, Inc.

20140082348 - Mobile device security: A mobile device (2) exchanges an electronic message with a messaging server (4), where the message is encrypted with a messaging key. The mobile device encrypts a copy of the message with a monitoring key (9) different from the messaging key, and sends the encrypted copy to a monitoring server... Agent: Scentrics Information Security Technologies Ltd.

20140082349 - Security credential deployment in cloud environment: Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a virtual machine image associated with the application. Upon deploying the virtual machine image as a virtual machine instance, embodiments transmit... Agent: Netflix Inc.

20140082350 - Security credential deployment in cloud environment: Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a virtual machine instance associated with the application. Upon deploying the virtual machine instance, embodiments transmit a request to a cryptex... Agent: Netflix Inc.

20140082351 - Authority-neutral certification for multiple-authority pki environments: A method for facilitating electronic certification, and systems for use therewith, are presented in the context of public key encryption infrastructures. Some aspects of the invention provide methods for facilitating electronic certification using authority-neutral service requests sent by an application, which are then formatted by a server comprising a middleware... Agent: Zoralco Fund Limited Liability Company

20140082352 - Layered certification: A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a hierarchy of secure certification provenance document (SCPD) structures. Each SCPD structure in the hierarchy may represent a given component at a given... Agent:

20140082353 - Scalable groups of authenticated entities: Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private... Agent: Netapp, Inc.

20140082356 - Protection of interpreted source code in virtual appliances: Protection of interpreted programming language code filesystem files from access and alteration may be provided by encrypting a file to be protected in a boot sequence. Run-time examination of a virtual appliance may be deterred by hiding the boot sequence in a restricted virtual appliance platform. No shell or filesystem... Agent: International Business Machines Corporation

20140082355 - Secure system for allowing the execution of authorized computer program code: Systems and methods for selective authorization of code modules are provided. According to one embodiment, a whitelist containing cryptographic hash values of code modules that are approved for loading into memory of a computer system and execution on the computer system is maintained by a kernel mode driver of the... Agent: Fortinet, Inc.

20140082354 - System and method for obtaining keys to access protected information: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a... Agent: Angel Secure Networks, Inc.

20140082357 - Cross enterprise communication: A method provides cross enterprise communication in which intermediary communication components carry out cross enterprise communication. The method at a first sending enterprise comprises: receiving a signed encrypted message from a sender within a first enterprise; validating the sender; decrypting the message; encrypting the message for receipt by a second... Agent: Ibm Corporation

20140082361 - Data encryption: Public key encryption methods and apparatus are provided for encrypting secret data under a public key in a data processing system (1). The secret data is provided as a message (m) comprising at least one element of a pair of base groups G1, G2 satisfying a bilinear map ê: G1×G2→GT... Agent: International Business Machines Corporation

20140082358 - Efficient key generator for distribution of sensitive material from mulitple application service providers to a secure element such as a universal integrated circuit card (uicc): A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node... Agent: General Instrument Corporation

20140082359 - Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc): A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node... Agent: General Instrument Corporation

20140082360 - Security for mobility between mbms servers: In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including triggering by user terminal device a new streaming server to generate new user-specific security keys; receiving at the user terminal device from the new streaming server a new security... Agent: Nokia Corporation

20140082362 - Method of anonymous entity authentication using group-based anonymous signatures: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session... Agent:

20140082363 - Automatic user authentication and identification for mobile instant messaging application: Automatic identification and authentication of a user of a mobile application entails receiving from the wireless communications device a unique device identifier and an e-mail address corresponding to the wireless communications device, associating a registration identifier with the unique device identifier and the e-mail address, generating an authentication token, and... Agent: Blackbery Limited

20140082364 - Collaborative uses of a cloud computing confidential domain of execution: An exemplary confidential computing system includes a computing device. A cryptographic processing unit is associated with the computing device. The cryptographic processing unit is configured to use a first user key for encrypting a communication to the first user that includes information from the computing device. The cryptographic processing unit... Agent:

20140082365 - Group management of authenticated entities: Exemplary embodiments provide various techniques for managing groups of authenticated entities. In one exemplary computer-implemented method, an entity accesses a group roster that includes a first group identifier identifying a first group, a first group digital certificate associated with the first group, and a first entity identifier identifying the entity... Agent: Netapp, Inc.

20140082366 - Multi-system security integration: In accordance with aspects of the disclosure, a system and methods are provided for managing multi-system security integration by performing state change calls to one or more backend systems by combining a multi-system protection token with a message component for transporting from a user agent to the one or more... Agent: Sap Ag

20140082367 - Verifying passwords on a mobile device: Methods, systems, and computer programs for verifying a password are disclosed. For example, the password can be verified on a mobile device to control user access to the mobile device. In some implementations, a mobile device includes a user interface, a main processor, and a co-processor. The user interface receives... Agent: Blackberry Limited

20140082368 - Biometric authentication method and computer system: A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating... Agent: Hitachi, Ltd.

20140082369 - Method and system for object access and usage control using location and access boundary shape information: A method and a system for shape based encrypted object usage control using a querying device includes receiving location coordinates information and requesting an access to the encrypted object based on the received location coordinates information. The granting or denying access to the object is based on a determination of... Agent: Futurwei Technologies Inc.

20140082370 - Methods, apparatus and systems to improve security in computer systems: In one implementation a computer system stores a software program that contains some instructions organized in blocks wherein each block contains a first part with instructions and a second part with an electronic signature or hash value, wherein the computer system includes a security component within the processor that allows... Agent: Media Patents . S.l.

20140082371 - Secure processor and a program for a secure processor: The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform... Agent: Fujitsu Semiconductor Limited

20140082375 - Data security for digital data storage: A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is derived at least in part from an identification code stored in a nonvolatile memory. The key may also be derived at least in... Agent:

20140082373 - Method and system for securely updating firmware in a computing device: Embodiments of a method are disclosed. One embodiment is a method for securely updating firmware in a computing device, in which the computing device includes a host processor and a non-volatile memory. The method involves receiving a double-encrypted firmware image from an external firmware source, wherein the double-encrypted firmware image... Agent: Nxp B.v.

20140082374 - Mobile device using secure spin torque transfer magnetic random access memory (sttmram): A mobile device includes an application processor, an RF modem for connection to cellular networks, wireless device for connection to wireless networks, a display coupled to the application processor, audio devices coupled to the application processor, power management for providing power through a main battery; and charging the battery, a... Agent: Avalanche Technology, Inc.

20140082372 - Secure spin torque transfer magnetic random access memory (sttmram): A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the magnetic memory device has parameter memory that maintains a protected zone used to store protected zone parameters, and an... Agent: Avalanche Technology, Inc.

20140082376 - System, method and apparatus for securely saving/retrieving data on a data storage: A system, method and apparatus securely save data by receiving a file from a user device, wherein the file contains an encrypted data and has a file name. The encrypted data is then split into two or more encrypted data chunks having a specified size. A chunk number is assigned... Agent: Texas Tech University System

20140082380 - Distributing power to heterogeneous compute elements of a processor: In one embodiment, the present invention includes a processor having a first domain with a first compute engine and a second domain with a second compute engine, where each of these domains can operate at an independent voltage and frequency. A first logic may be present to update a power... Agent:

20140082378 - Distributing power to heterogeneous compute elements of a processor: In one embodiment, the present invention includes a processor having a first domain with a first compute engine and a second domain with a second compute engine, where each of these domains can operate at an independent voltage and frequency. A first logic may be present to update a power... Agent:

20140082382 - Method and system for providing backup power for memory devices: According to exemplary embodiments, a computer program product for providing voltage to a memory device includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method performed includes storing data on the memory device, providing a... Agent: International Business Machines Corporation

20140082379 - Powering a display controller: A method and system are described for powering a display controller in an electronic device. In the described embodiments, the display controller includes a display controller power management circuit directly connected to a battery.... Agent: Apple Inc.

20140082377 - Providing additional current capacity to a processor for a turbo mode: In one embodiment, the present invention includes a primary voltage regulator to couple a regulated voltage to a processor via a supply line. This regulator includes a multi-phase controller to provide the regulated voltage in multiple phases and to provide a maximum current output sufficient to meet a thermal design... Agent:

20140082381 - Providing additional current capacity to a processor for a turbo mode: In one embodiment, the present invention includes a primary voltage regulator to couple a regulated voltage to a processor via a supply line. This regulator includes a multi-phase controller to provide the regulated voltage in multiple phases and to provide a maximum current output sufficient to meet a thermal design... Agent:

20140082386 - Charge recycling between power domains of integrated circuits: A mechanism is provided for efficiently recycling a charge from a power domain that is discharging. A side of a discharging power domain normally coupled to a voltage supply is disconnected from the voltage supply. The side of the precharging power domain normally coupled to the voltage supply is currently... Agent: International Business Machines Corporation

20140082384 - Inferring user intent from battery usage level and charging trends: Techniques for power management of a portable device are described herein. According to one embodiment, a user agent of an operating system executed within a portable device is configured to monitor daily battery usage of a battery of the portable device, to capturing, by the user agent, daily battery charging... Agent: Apple Inc.

20140082385 - On demand power management for solid-state memory: Embodiments of an apparatus to increase the power efficiency of a solid-state memory have been presented. In one embodiment, the apparatus includes a power detection circuit coupled to the solid-state memory to detect a demand of a power distribution network that supplies power to the solid-state memory. Furthermore, the apparatus... Agent:

20140082383 - Predicting user intent and future interaction from application activities: Techniques for power management of a portable device are described herein. According to one embodiment, a user agent of an operating system executed within a portable device is configured to monitor activities of programs running within the portable device and to predict user intent at a given point in time... Agent: Apple Inc.

20140082387 - Method and apparatus for controlling central processing unit: A method for controlling a central processing unit (CPU), where the method includes: acquiring a usage rate and an operating frequency of one CPU of operating CPUs; if the operating frequency of the one CPU is smaller than a core off-line frequency, multiplying the usage rate of the one CPU... Agent: Huawei Device Co., Ltd.

20140082390 - Cache array with reduced power consumption: Embodiments of the disclosure include a cache array having a plurality of cache sets grouped into a plurality of subsets. The cache array also includes a read line configured to receive a read signal for the cache array and a set selection line configured to receive a set selection signal.... Agent: International Business Machines Corporation

20140082391 - Computer system and power management method: A computer system is provided. The computer system has: a processor; a network transmission module; a storage unit; and a dual-port disk controller, coupled to the processor, the network transmission module and the storage unit, configured to control access of the storage unit, wherein when the computer system is in... Agent: Acer Incorporated

20140082389 - Direct hardware access media player: A system, method and a computer program product for processing media content on a media player having direct access to hardware are provided in exemplary embodiments. When the media player is initialized, an operating system is placed into a stand-by mode that decreases power consumption on an electronic device. Instead... Agent: Advanced Micro Devices, Inc.

20140082388 - Firmware agent: Methods, apparatuses and storage medium associated with providing firmware to a device are disclosed herein. In various embodiments, an apparatus may include a device, and a processor to host a computing environment that includes the device and a device driver of the device. Further, the apparatus may include a firmware... Agent:

20140082393 - Hot swapping type uninterruptible power supply module: A system comprises a plurality of the hot swapping type uninterruptible power supply module and a plurality of conventional power supply. A HSUPS comprises a battery module and a controller module. A conventional power supplies is connected with an external AC power source and converts into DC voltage to provide... Agent: Compuware Technology Inc.

20140082392 - Semiconductor device and communication method: According to an embodiment, a communication control section which is a semiconductor device includes a communication circuit capable of operating in at least two operation modes of normal mode L0 and low-power mode L0s. A power management control section controls an UpdateFC transmission control section to make a transition of... Agent: Kabushiki Kaisha Toshiba

20140082394 - Electronic device: An electronic device comprises a main battery used as a drive power source for driving the electronic device, a secondary battery used as a drive power source instead of the main battery when the main battery cannot be used, a battery detection unit that detects an event of removal of... Agent: Panasonic Corporation

20140082395 - Information processing apparatus, power control method, and computer-readable storage medium: An information processing apparatus includes an application program; a power control unit configured to switch power modes so as to control ON/OFF of power supply to each piece of hardware; and a function execution unit configured to execute control of a specified function based on an instruction from the application... Agent:

20140082396 - Method and apparatus for distributed generation of multiple configurable ratioed clock domains within a high speed domain: Implementations of the present disclosure involve an apparatus and/or method for providing one or more clock signals within a processing device. In particular, one or more counter devices may be integrated into a microprocessor design that operates on a system clock signal to provide ratioed synchronous clock signals for use... Agent: Oracle International Corporation

20140082399 - Data bus part and method for synchronizing data bus parts: The data bus part (1) has a synchronization unit (7) to synchronize the clock generator (6) with the clock signal of the higher-order data bus part (1), wherein the synchronization unit (7) is configured to detect transitions in the downstream data stream (D) received at the downstream data input (2),... Agent: Wago Verwaltungsgesellschaft Mbh

20140082398 - Embedded multimedia card (emmc), host controlling emmc, and method operating emmc system: An embedded multimedia card (eMMC) is provided. The eMMC includes a clock channel receiving a clock output from a host, data channels receiving data signals from the host, and a command channel receiving a SWITCH command including delay offset values from the host so as to adjust a delay of... Agent: Samsung Semiconductor Co., Ltd.

20140082397 - Embedded multimedia card using unidirectional data strobe signal, host for controlling the same, and related methods of operation: An embedded multimedia card (eMMC) comprises a clock channel configured to receive a clock signal from a host, a command channel configured to receive a command from the host, a plurality of data channels configured to transmit data to the host, a data strobe channel configured to transmit a data... Agent: Samsung Electronics Co., Ltd.

20140082400 - Enhanced clock gating in retimed modules: Embodiments of the invention may include receiving a design netlist representing a datapath operable to execute a function corresponding to an opcode combination. The datapath may include an input stage, a register stage, and an output stage and the register stage may include a plurality of registers. For a first... Agent: Nvidia Corporation

20140082402 - Embedded multimedia card (emmc), host for controlling emmc method operating emmc system: An embedded multimedia card (eMMC) includes a clock channel receiving a clock from a host, a complementary clock channel receiving a complementary clock from the host, a command/response channel exchanging commands/responses with the host, a plurality of data channels exchanging data between the host and the eMMC, a return clock... Agent: Samsung Electronics Co., Ltd.

20140082401 - Usb3.0 clock frequency generation device without crystal oscillator: The present invention discloses a USB3.0 clock frequency generation device without crystal oscillator, that is, the crystal oscillator used in the USB3.0 device (or apparatus) is removed and replaced with an oscillator circuit module in the present invention, in which a simple circuit module is added to the controller circuit... Agent:

20140082403 - Adaptive service timeouts: Disclosed are various embodiments for a timeout management application. Latency data for executing services is obtained. The used service capacity is calculated. If the service capacity is outside of a predefined range, the timeout of a selected service is reconfigured.... Agent: Amazon Technologies, Inc.

20140082404 - Embedded multimedia card (emmc), emmc system, and methods of operation: An embedded multimedia card (eMMC) communicating with a host includes; a latch circuit that receives and latches a data signal according to either a first edge or a second edge of a clock to thereby generate a latched data signal, and a start bit detector that detects in the latched... Agent: Samsung Electronics Co., Ltd.

20140082405 - Embedded multimedia card (emmc), host controlling emmc, and method operating emmc system: An embedded multimedia card (eMMC) includes a clock channel that receives a clock signal from a host, a command channel that receives a command from the host, a plurality of data channels that transmit data to the host, and a return clock channel that transmits a return clock synchronized with... Agent:

Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery


######

RSS FEED for 20140410: xml
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.

######

Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.



Results in 1.19309 seconds

PATENT INFO