Electrical computers and digital processing systems: support patents - Monitor Patents
FreshPatents.com Logo    FreshPatents.com icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents



USPTO Class 713  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14: Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |

Electrical computers and digital processing systems: support

Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
  
09/04/2014 > 28 patent applications in 18 patent subcategories.

20140250291 - Continuation of trust for platform boot firmware: This disclosure is directed to continuation of trust for platform boot firmware. A device may comprise a processing module and a memory module including read-only memory (ROM) on which is stored platform boot firmware. On activation, the processing module may load the platform boot firmware. The platform boot firmware may... Agent:

20140250295 - Load boot data: Embodiments herein relate to loading boot data. In an embodiment, a device loads boot data from a first portion of a first non-volatile memory to complete a first booting of the device. The first portion of the first non-volatile memory is then released to allow the device to overwrite the... Agent:

20140250290 - Method for software anti-rollback recovery: A temporary anti-rollback table—which is cryptographically signed, unique to a specific device, and includes a version number—is provided to an electronic device requiring a replacement anti-rollback table. The table is verified by the device, and loaded to memory following a reboot. The memory image of the table is used to... Agent: St-ericsson Sa

20140250293 - Method, apparatus, system, and machine readable storage medium for providing software security: Technologies are provided in example embodiments for determining that a module is to be loaded, the module being associated with module code, determining that the module is a frozen module, the frozen module being associated with frozen module code, determining that a module fingerprint of the module fails to correspond... Agent:

20140250294 - Router and a virtual trusted runtime bios: An implementation may include a virtual trusted runtime BIOS managed by the virtual machine monitor. A replacement portion of the virtual trusted runtime BIOS may be included. A router can replace an address to a resource of the virtual trusted runtime BIOS with the address to the resource of the... Agent:

20140250292 - Server information handling system configuration from an end state definition file: One step server information handling system configuration reduces complexities associated with remote server maintenance through a management network. A configuration end state sent through the management network, such as an XML file, is parsed by a management processor to automatically initiate and complete configuration of the server to the end... Agent: Dell Products L.p.

20140250296 - Strict communications transport security: Strict transport security controls are arranged to detect a first navigation command of a network-enabled application to navigate from a secure connection established with a first network address and to navigate to a second network address using an unsecure reference. A filter is used to filter, in response to the... Agent:

20140250297 - Certificate renewal: Certificate renewal is described. A processing device searches a certificate authority (CA) database of digital certificates to identify a certificate that satisfies an expiration condition for automatic renewal. The processing device renews the certificate as a renewed certificate without any user interaction. The processing device is to renew the certificate... Agent: Red Hat, Inc.

20140250298 - Method and device for ensuring information integrity and non-repudiation over time: The present invention relates to a method and a device for ensuring information integrity and non-repudiation over time. At least one example embodiment provides a mechanism for secure distribution of information, which information relates to an instance in time when usage of cryptographic key pairs associated with a certain brand... Agent: Brandsign Ab

20140250299 - Egm authentication mechanism using multiple key pairs at the bios with pki: Executable applications on a gaming machine are verified before they can be executed, for security purposes and to comply with jurisdictional requirements. Unlike in prior systems for authenticating the executable applications, embodiments allow for new executable applications to be provided and verified over time with different private and public key... Agent: Igt

20140250300 - Secure storage and accelerated transmission of information over communication networks: A system and method for securely obfuscating, storing, and transmitting digital information includes a computing device configured to parse at least a portion of one or more bit streams to form a plurality of first datasets. The computing device is configured to disperse the plurality of first datasets into multiple... Agent: Bitspray Corporation

20140250301 - Network coding-based anonymous communication: A computer-based peer-to-peer anonymous networking using a coding scheme with a formal information theoretic security characterization to construct a corresponding overlay subgraph is presented. A code construction based on linear coding which can be used for data transfer in an anonymous network is also presented. Various performance and simulation of... Agent: California Institute Of Technology

20140250302 - Device: According to one embodiment, a device includes a second data generator configured to generate a session key (SKey) by encrypting a random number (RN) with the second key (HKey) in AES operation; a one-way function processor configured to generate an authentication information (Oneway-ID) by processing the secret identification information (SecretID)... Agent: Kabushiki Kaisha Toshiba

20140250303 - Multi-drive cooperation to generate an encryption key: A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme. The data of each storage device is encrypted with a key, and the key is encrypted based on a shared secret and a device-specific value. Each storage device stores a share... Agent: Pure Storage, Inc.

20140250304 - User authentication system and method for encryption and decryption: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and... Agent: Maz Encryption Technologies LLC

20140250306 - Decision service manager: A decision service manager authenticating at a managed system hosting a decision service, in case of a successful authentication, the decision service manager sending a first status request to the managed system and receiving, in response to the first status request, a first indication of a current status of the... Agent:

20140250307 - Method and apparatus for securing keystrokes from being intercepted between the keyboard and a browser: d

20140250305 - Reducing decryption latency for encryption processing: In a compression processing storage system, using a pool of encryption processing cores, the encryption processing cores are assigned to process either encryption operations, decryption operations, and decryption and encryption operations, that are scheduled for processing. A maximum number of the encryption processing cores are set for processing only the... Agent: International Business Machines Corporation

20140250308 - Content data reproduction system and recording device: To exclude any unauthorized device from a system and thereby prevent illegal use of content data, a memory card 10 stores a service key Ksrv for encrypting content key data Kc in a hidden area 14. The memory card 10 stores answer data AC to be obtained when question data... Agent: Kabushiki Kaisha Toshiba

20140250310 - Apparatus for starting up switching voltage regulator: Described is a soft-start scheme for a voltage regulator. The apparatus comprises: a first voltage regulator to provide regulated voltage to an output node coupled to a load, the first voltage regulator operable to be in open loop via a bypass unit, the first voltage regulator including a comparator; and... Agent:

20140250309 - Predictive self calibrated power control: A method of controlling power in a circuit includes characterizing a power behavior of the circuit, from a circuit input to a circuit output during a manufacturing process of the circuit, wherein the characterizing may be at one or more of a wafer, chip or circuit board level, predicting the... Agent:

20140250311 - Information processing apparatus and method: In accordance with one embodiment, an information processing apparatus comprises a connection unit configured to be connectable to a peripheral device, a communication unit configured to be communicable with an external apparatus, a reception unit configured to receive a request from the external apparatus through the communication unit, a first... Agent: Toshiba Tec Kabushiki Kaisha

20140250312 - Conditional notification mechanism: The described embodiments comprise a first hardware context. The first hardware context receives, from a second hardware context, an indication of a memory location and a condition to be met by the memory location. The first hardware context then sends a signal to the second hardware context when the memory... Agent: Advanced Micro Devices, Inc.

20140250313 - Minimizing power consumption in asynchronous dataflow architectures: An asynchronous pipeline structure includes a plurality of functional blocks comprising dynamic logic, each block precharged to an idle state responsive to a precharge control signal applied thereto, with each block, upon being precharged, receiving input data thereto for processing, and holding output data generated thereby during an evaluate phase,... Agent: Raytheon Company

20140250314 - System and method for providing a low power remote control: To conserve power in a controlling device having a processing device in communication with an input element and a transmitting device the processing device is caused to be placed into a low-power state for at least a portion of a transmission inactive interval intermediate the transmission of at least a... Agent: Universal Electronics Inc.

20140250315 - Storage system data hardening: A bridge receives a power down command and in response converts the power down command to a data hardening command. The bridge issues the data hardening command to a solid state disk. In response to the data hardening command, data stored on the solid state disk is hardened. The hardening... Agent: Lsi Corporation

20140250316 - Data transfer operation completion detection circuit and semiconductor memory device provided therewith: A data transfer operation completion detection circuit including a first counter for performing a shifting operation in response to the generation of a read initiation signal, a second counter for performing a shifting operation in response to the generation of a burst completion signal, and an SR latch circuit for... Agent:

20140250317 - Apparatus and method for providing a modular power supply with multiple adjustable output voltages: An apparatus and method for supplying operating voltages to a plurality of electronic devices is disclosed. A plurality of power supply modules of a modular power supply may output voltages to at least two electronic devices. The apparatus may identify a failure of one of the power supply modules. The... Agent: Abbott Medical Optics Inc.

  
08/28/2014 > 71 patent applications in 24 patent subcategories.

20140244992 - Extensible firmware interface external graphic card, mainframe system, and extensible firmware interface bios booting method: A central processing unit of a mainframe system is configured to load a physical graphic card driver into a memory of the mainframe system for performing a display function when the mainframe system is not connected to an Extensible Firmware Interface (EFI) external graphic card. The central processing unit is... Agent: Silicon Motion Inc.

20140244990 - Method and apparatus for prefetching peripheral device drivers for smart phones and other connected devices prior to hlos boot: Apparatus and methods for booting a user equipment are described. A device boot of the user equipment may be performed. Peripherals and associated drivers for the user equipment may be configured. A high-level operating system (HLOS) may be booted. The configuring may occur before the booting of the HLOS. Apparatus... Agent: Qualcomm Incorporated

20140244993 - Method of updating the operating system of a secure microcircuit: A method of loading an operating program in a secure microcircuit, includes the steps of: downloading and installing in the microcircuit a boot program, which is launched upon activation of the microcircuit, loading into the microcircuit initialization data including a first public key, performing a mutual authentication procedure between the... Agent: Inside Secure

20140244994 - Method, apparatus and system for binding mtc device and uicc: A method for binding a Machine Type Communication (MTC) device and a Universal Integrated Circuit Card (UICC) is disclosed. The method includes: during a process of establishment of a shared key, a Network Application Function (NAF) acquires identity information of the MTC device and identity information of the UICC (101);... Agent: Zte Corporation

20140244991 - Patching boot code of read-only memory: The present disclosure describes apparatuses and techniques for patching boot code of read-only memory (ROM). In some aspects, execution of boot code from a ROM is initiated to start a boot process of a device. Execution of the boot code from the ROM is then interrupted to enable execution of... Agent: Marvell World Trade Ltd.

20140244989 - Peer-to-peer network booting: A technique for booting a computing device using a boot image that is downloaded from a distributed network booting system involves identifying a tracker computing device that manages a plurality of computing devices that store all or a portion of the boot image, receiving from the tracker computing device information... Agent: Vmware, Inc.

20140244988 - Self-healing of operating system components: Aspects of the subject matter described herein relate to operating system technology. In aspects, a mechanism is described that allows self-healing actions to correct operating system problems. The self-healing actions may be performed at virtually any time during the loading and executing of operating system components. Earlier placement of the... Agent: Microsoft Corporation

20140244995 - Adaptive media transmission processing: Provided are methods and systems for processing information. In one example method a first frame of a first group of frames of an information transmission can be processed. The first frame can be encoded without reference to other frames of the information transmission. Additionally, a second frame can be processed... Agent: Comcast Cable Communications, LLC

20140244996 - Private discovery of electronic devices: The disclosed embodiments provide a system that facilitates communication between a first electronic device and a second electronic device. During operation, the system uses the first electronic device to create a discovery request comprising a first group identifier (ID) associated with the first electronic device, wherein using the first electronic... Agent: Apple Inc.

20140244997 - Emergency mode for iot devices: Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT) device, an emergency secret key from a trusted authority source The method receives, at an IoT device, an emergency message from the... Agent: Qualcomm Incorporated

20140244999 - Network system, certificate management method, and certificate management program: A network system includes a management apparatus and multiple apparatuses. The management apparatus includes a preparation instruction unit to transmit an instruction to prepare a certificate request to the apparatuses; a collection unit to collect the certificate requests; a request unit to request issuance of certificates to a certificate authority;... Agent:

20140245000 - Secure message delivery using a trust broker: An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When... Agent: Microsoft Corporation

20140244998 - Secure publishing of public-key certificates: The current document is directed to methods and systems for secure provisioning, publication, distribution, and utilization of public-key certificates. These methods and systems employ domain name system (“DNS”) servers implementing the DNS security extensions (“DNSSEC servers”), a publisher component, and additional client-side and server-side functionalities. Public-key certificates provided by the... Agent: Secure64 Software Corporation

20140245001 - Decryption of content including partial-block discard: Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more... Agent: Adobe Systems Incorporated

20140245002 - Method and apparatus for secure data transmissions: An apparatus, system, and method are disclosed for secure data transmissions. In one embodiment, a method includes receiving a request for data from a remote client, the request including a public Internet protocol address of the remote client, the request encrypted according to an initial encryption scheme, encrypting the requested... Agent: Ciphertooth, Inc.

20140245003 - Communications method: The present application relates to a method of providing connectivity to a vehicle. The method comprises, at a first device aboard the vehicle, establishing at least one first connection with at least one first network, the at least one first connection allowing communication with a second device remote from the... Agent: Nomad Spectrum Limited

20140245006 - Cryptographic accumulators for authenticated hash tables: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data.... Agent: Brown University

20140245005 - Cryptographic processing method and system using a sensitive data item: A cryptographic processing method using a sensitive data item in a cryptographic processing system including in memory a test making it possible to tell a human and a computer apart and a reference value obtained by applying a cryptographic function to a pair of values P and R, where P... Agent: Oberthur Technologies

20140245004 - Rule sets for client-applied encryption in communications networks: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across... Agent: Surfeasy, Inc.

20140245008 - Systems and methods for controlling email access: Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources.... Agent: Sky Socket, LLC

20140245007 - User authentication system: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically... Agent: Broadcom Corporation

20140245009 - Client control through content key format: Client control may be provided. First, content may be encrypted using an actual key. Then an identifier corresponding to a client device may be received and a transformation may be performed on the actual key and the identifier to produce a transmitted key. The transmitted key and the encrypted content... Agent: Cisco Technology, Inc.

20140245010 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245011 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245017 - Digital tachograph: A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module. Vehicle-relevant data and the corresponding checksum are encoded using a secure private key and stored in the digital tachograph in a data format by the security module.... Agent:

20140245012 - Enhancing data security using re-encryption: A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling... Agent: Cellco Partnership (d/b/a Verizon Wireless)

20140245016 - Management system and methods for object storage system: The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. To facilitate creation and... Agent: Vmware, Inc.

20140245013 - Method for interworking with trustzone between normal domain and secure domain, and management method of trusted application download, management server, device and system using it: The present invention provides a trusted application download management, authentication, and execution method and system. A trusted application download management server according to the present invention includes a service loader, which accesses a device equipped with a trusted platform and establishes a data communication channel, and a service controller which... Agent: Sk Planet Co., Ltd.

20140245015 - Offline file access: In embodiments of the present invention improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in... Agent: Intralinks, Inc.

20140245014 - Remote control app for smart phones: Methods and apparatus for a Remote Control App for Smart Phones are disclosed. One embodiment of the present invention is a software application or “App” which may be downloaded to a conventional smart phone (12). Once downloaded to the smart phone (12) and to a remote computer, network or other... Agent: Pascal's Pocket Corporation

20140245019 - Apparatus for generating privacy-protecting document authentication information and method of performing privacy-protecting document authentication using the same: Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for generating the privacy-protecting document authentication information includes an electronic signature information generation unit, a multi-dimensional code generation unit, and a multi-dimensional code output unit. The electronic signature... Agent: Electronics And Telecommunications Research Institute

20140245018 - Systems and methods for media recognition: Certain embodiments described herein provide methods and systems for media recognition. One exemplary embodiment involves recognizing a piece of media in two steps. First, a watermark may be recognized that identifies that the media has a media identifying fingerprint. Second, that fingerprint is retrieved and used to recognize the media... Agent: Adobe Systems Incorporated

20140245020 - Verification system and method with extra security for lower-entropy input records: An authentication system for digital records has a hash tree structure that computes an uppermost, root hash value that may be digitally signed. A random or pseudo-random number is hashed together with hash values of the digital records and acts as a blinding mask, making the authentication system secure even... Agent: GuardtimeIPHoldings Limited

20140245021 - Storage system in which fictitious information is prevented: According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the secure storage by authentication processing, and which is used for encoding processing. The host... Agent: Kabushiki Kaisha Toshiba

20140245022 - Apparatus for verifying and for generating an encrypted token and methods for same: Embodiments show an apparatus for verifying a validity of an encrypted token associated to a product, wherein the apparatus has a decryptor for decrypting an encrypted token using a decryption key to obtain a decrypted token having information bits related to the product and structure bits. The apparatus further has... Agent:

20140245023 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245024 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140245025 - System and method for storing data securely: Systems, methods, and media may provide secure data storage. A request may be transmitted for a requested container to a database, the request comprising a requested container identifier of the requested container. The database may comprise containers, wherein each container is identified by a container identifier and comprises at least... Agent: Spideroak Inc.

20140245026 - System and method for resource sharing across multi-cloud arrays: A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are distributed in one or more cloud storage arrays, and each storage resource comprises a unique object identifier that identifies location and structure... Agent: Twinstrata, Inc

20140245027 - Device and method for providing safety of data by using multiple modes in device: A device and method for providing the security of data by using multiple modes in the device are provided. The device includes a storage unit that includes a normal mode data area and a security mode data area which is isolated from the normal mode data area and access to... Agent: Samsung Electronics Co., Ltd.

20140245033 - Dynamic power management of context aware services: The disclosure is directed to modifying the operation of one or more hardware subsystems when a new context awareness service begins. An aspect determines a power budget for a plurality of operating context awareness services including the new context awareness service, wherein the power budget is based on a power... Agent: Qualcomm Incorporated

20140245036 - Electronic apparatus, charging control method, charging system, and data transmission system: A processing unit 103 has a first operation mode in which an operation is enabled using only external power from a feeding device 120 and a second operation mode in which the operation is enabled by feeding from a battery 102 in addition to the external power from the feeding... Agent: Sony Corporation

20140245030 - Method and apparatus for providing power to an electronic device: In an embodiment, set forth by way of example and not limitation a USB power converter for an electronic device includes a USB bus including VBUS power line, a D− data line and a D+ data line, a variable voltage converter, a processor clock, a USB transceiver coupled to the... Agent: Maxim Intergrated Products, Inc.

20140245034 - Multi-level cpu high current protection: Methods and apparatus relating to multi-level CPU (Central Processing Unit) high current protection are described. In one embodiment, different workloads may be assigned different license types and/or weights based on micro-architectural events (such as uop (micro-operation) types and sizes) and/or data types. Other embodiments are also disclosed and claimed.... Agent:

20140245035 - N+1 power supply system upgrade using dual output power supplies: A system may include a power module that includes a group of power supplies, particular ones of the group of power supplies being operable at a group of voltages ranging from a first voltage to a second voltage. The system may further include a controller coupled to the particular ones... Agent: Juniper Networks, Inc.

20140245031 - Optimized power over ethernet power distribution system: A power distribution system includes a manager provided on a network controller and an agent provided on a line module. The manager is operable to receive a configuration for a port on the line module. A connection to the port is then detected by the agent and communicated to the... Agent: Dell Products L.p.

20140245029 - System and method for managing a thermal policy of a receiving device that couples to a portable computing device: A method and system for managing a thermal policy of a receiving device that couples to a portable computing device (PCD) includes automatically detecting a presence of the PCD. After detecting the presence of the PCD, a command to deactivate a thermal sensor and to deactivate a power supply within... Agent: Qualcomm Incorporated

20140245028 - System and method for temperature driven selection of voltage modes in a portable computing device: Various methods and systems for minimum supply voltage level selection in a portable computing device (“PCD”) are disclosed. It is an advantage of the various embodiments that PCD designers may close timing at a certain minimum supply voltage and operating temperature threshold that is higher than the lowest end of... Agent: Qualcomm Incorporated

20140245032 - System and method for thermal management in a portable computing device using thermal resistance values to predict optimum power levels: Various embodiments of methods and systems for thermal energy management in a portable computing device (“PCD”) based on power level calculations are disclosed. An exemplary method includes tracking instantaneous operating temperatures and active power supply levels to one or more components. With an estimate or measurement of ambient temperature, the... Agent: Qualcomm Incorporated

20140245037 - System and method for utilizing standard four wire usb for multiple power modes and out of band state management: A cable for establishing electronic communication between a first device and a second device is described. One end of the cable comprises a standard USB device connector that has four electrical contacts; two for power (VBUS, GND) and two for differential data signals (D+ and D−). The other end of... Agent: Ikingdom Corp.

20140245038 - Electronic device, electronic system, and control method: According to one embodiment, an electronic device to which an AC adaptor is attachable includes a detecting module and a control module. The detecting module detects whether the AC adaptor is attached to the electronic device. The control module controls suppression and non-suppression of power consumption of the electronic device... Agent: Kabushiki Kaisha Toshiba

20140245039 - Information processing apparatus, device control method, and computer program product: According to an embodiment, an information processing apparatus includes: a first control unit to control a first device; and a second control unit to control a second device. The first control unit includes a first request processing unit, a notification unit, and a first execution unit. The second request processing... Agent: Kabushiki Kaisha Toshiba

20140245041 - Apparatus for hibernation control in a device: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com LLC

20140245046 - Communication node: When an ECU serving as a communication node is under sleep mode, a switch portion in a transceiver connects a data transmit port of a microcomputer to a memory controller. The microcomputer sends, to the memory controller, a code write-in request for writing a code while outputting a write data... Agent: Denso Corporation

20140245045 - Control device and computer program product: According to an embodiment, a control device includes a processor setting unit, a resumption data reading unit, and a resumption processing unit. The processor setting unit is configured to identify, among a plurality of processors included in an information processing system, each of which is connected to one or more... Agent: Kabushiki Kaisha Toshiba

20140245049 - Electronic control device and microcomputer control method: Provided are an electronic control device and a microcomputer control method not only enabling smooth transmission and reception of signals by using a plurality of microcomputers but also capable of achieving, with a simpler configuration, reduction of power consumed by the microcomputers. As a mode for reducing power consumption, the... Agent: Toyota Jidosha Kabushiki Kaisha

20140245047 - Information processing apparatus, operation state control method, and computer program product: According to an embodiment, an information processing apparatus that includes a processor, has a first control unit, a power storage unit, and a second control unit. The first control unit is configured to control execution of a process by the processor. The power storage unit is configured to store therein... Agent: Kabushiki Kaisha Toshiba

20140245048 - Lsi and information processing system: The controller LSI is connected to an SPI flash memory having a deep power down mode (DPM), and brings the SPI flash memory to the DPM and then brings itself to low power consumption mode (LPM) that volatilizes data in a RAM. This invention solves the problem that the controller... Agent: Renesas Electronics Corporation

20140245042 - Method for hibernation control based on battery capacity: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com LLC

20140245043 - Method for hibernation control based on charging efficiency: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com Iic

20140245044 - Method for hibernation control based on usage pattern: Apparatus and algorithms to balance power savings and convenience to users of electronic devices based on usage patterns, charging and battery efficiency and capacity, and users' subscriptions.... Agent: Barnesandnoble.com Iic

20140245040 - Systems and methods for managing data in a system for hibernation states: The present application is directed to systems and methods for managing data in a system for hibernation states. In one implementation, a memory device comprises a controller memory, a main memory, a buffer to the main memory and a controller comprising a processor. The processor is configured to manage data... Agent:

20140245053 - Distributed computer system: A local computer (20) and a remote I/O device (30) are interconnected on a network (40) through an upstream side bridge (21) and a downstream side bridge (31). The upstream side bridge (21) and the downstream side bridge (31) each include a register (216, 316) for referring to or writing... Agent: Nec Corporation

20140245051 - Driver circuit powered by two power supplies sequentially activated: A driver circuit including front and rear amplifiers each powered by the primary and secondary power supplies, where the latter power supply is generated from the former power supply. The rear amplifier includes a cascade transistor whose base bias is provided from the bias source. The bias source provides the... Agent: Sumitomo Electric Industries, Ltd.

20140245052 - Method and device for storing an item of wake-up information in users of a can bus system: A device for connecting a user station to a CAN bus, the user station in the active state being able to exchange messages with other user stations via the CAN bus using the device, according to the standard ISO 11898; the user station in the at-rest state being able to... Agent: Robert Bosch Gmbh

20140245050 - Power management for host with devices assigned to virtual machines: A system and method of removing power from a device assigned to a virtual machine running on a host machine includes receiving a request, by a notification module, from the virtual machine to remove power from the device, and receiving, by the notification module, an indication from the virtual machine... Agent: Red Hat Israel,ltd.

20140245055 - Phase-based operation of devices on a polyphase electric distribution system: In one embodiment, a device in a computer network monitors an alternating-current (AC) waveform of an electrical power source at the device, where the power source is part of a polyphase power source system. Once the device determines a particular phase of the polyphase power source system at the device,... Agent: Cisco Technology, Inc.

20140245054 - Power over ethernet dynamic power allocation system: A power allocation system includes a manager provided on a network controller. An agent is provided on a line module coupled to the network controller. The agent is operable to detect a connection of a powered device to a port on the line module and communicate that to the manager.... Agent: Dell Products L.p.

20140245056 - Systems, apparatus and methods capable of shelf management: A method according to one embodiment may include discovering, by software, at least one variable from at least one component populated on a shelf system. The method may also include performing, by the software, at least one shelf management function based on at least one variable. Of course, many alternatives,... Agent:

20140245057 - Multi-processor synchronization using time base counters: A multi-processor system includes a first processor that includes a first time base counter that outputs a first time base count, a second processor that includes a second time base counter that outputs a second time base count, and a communication bus. The first and second processors exchange the first... Agent: Hamilton Sundstrand Corporation

20140245058 - Multi-processor system and method for internal time synchronization and event scheduling of multiple processors: Embodiments of a multi-processor system and method for synchronization and event scheduling of multiple processing elements are generally described herein. In some embodiments, timing marks are provided to the processing elements and a start-timer command is broadcasted to the processing elements after an initial timing mark. The start-timer command instructs... Agent: Raytheon Company

  
08/21/2014 > 66 patent applications in 20 patent subcategories.

20140237221 - Application execution environment setting apparatus and method for mobile terminal: An apparatus and method for application execution environment setting in a mobile terminal are provided. The application execution environment setting apparatus configures application execution environment variables on a per application basis in consideration of variable values assigned by the user in the past.... Agent: Samsung Electronics Co., Ltd.

20140237220 - Configuring a trusted platform module: A method includes storing configuration data for a Trusted Platform Module (TPM) in a pre-boot environment such as Unified Extensible Firmware Interface (UEFI), reading the configuration data, and automatically configuring the TPM based upon the configuration data. The configuring includes storing values of TPM parameters in non-volatile memory of the... Agent: Dell Products, Lp

20140237222 - Multi-model modes of one device: A portable media player may provide multi-modes for a user. Each mode may define different features and content that are customized for a particular mode. Based a selected mode, the media player may provide access to only content, features, hardware, user interface elements, and the like that the user wishes... Agent: Apple Inc.

20140237225 - Information processing apparatus, control method for information processing apparatus, and program: An information processing apparatus includes a first processing unit, a second processing unit which is different from the first processing unit, a supply unit configured to supply a clock to the first processing unit and the second processing unit, and a control unit configured to control the supply unit in... Agent: Canon Kabushiki Kaisha

20140237224 - Network boot system: [SOLVING MEANS] Network boot system 100 includes server 10 and terminal 20 having recording device 22a connecting each other through network 30. The terminal includes a read cache mechanism that stores a cache in a read cache region by a read cache driver. The read cache mechanism includes a mapping... Agent:

20140237226 - Option read-only memory use: Example embodiments disclosed herein relate to altered option read-only memory. A copy of an option read-only memory is stored. The copy is used during a boot process based on a determination that the option read-only memory has been altered.... Agent:

20140237223 - System boot with external media: Various aspects of the present disclosure provide for a system that is able to boot from a variety of media that can be connected to the system, including SPI NOR and SPI NAND memory, universal serial bus (“USB”) devices, and devices attached via PCIe and Ethernet interfaces. When the system... Agent: Applied Micro Circuits Corporation

20140237227 - Processing device, array-type processing device, control method thereof, and information processing system: This invention provides an array-type processing device which can reduce power consumption and can also reduce a processing performance drop caused by switching of configuration information. An array-type processing device, which includes a first domain and a second domain, the device comprises a plurality of processing units which are allocated... Agent: Canon Kabushiki Kaisha

20140237228 - Smart card renewal: A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for use in the renewal process. The data may comprise a certificate. The smart card may... Agent: Dell Products, Lp

20140237229 - Bluetooth device as security access key: This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the... Agent: Apple Inc.

20140237230 - Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method: A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in... Agent: Compugroup Medical Ag

20140237231 - Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method: A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program. The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in... Agent: Compugroup Medical Ag

20140237234 - Enhanced system security: Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data can be encrypted on an internal network of the organization and sent to the third party database system for storage. The third party database system... Agent: Salesforce.com, Inc.

20140237235 - Information processing device, information storage device, server, information processing system, information processing method, and program: Content usage control is realized on condition of the establishment of user authentication without having to communicate with a server or the like. An information storage device such as a memory card stores an encrypted content, a converted title key obtained by converting a title key which is an encryption... Agent: Sony Corporation

20140237233 - Method and apparatus for providing content: Methods and systems for enabling content to be securely and conveniently distributed to authorized users are provided. More particularly, content is maintained in encrypted form on sending and receiving devices, and during transport. In addition, policies related to the use of, access to, and distribution of content can be enforced.... Agent:

20140237232 - Selective shredding in a deduplication system: Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a segment that is used when reconstructing a target file. The directory manager file is modified by deleting a reference... Agent: Emc Corporation

20140237242 - Compact security device with transaction risk level approval capability: The present invention relates to the field of securing electronic transactions and more specifically to systems to indicate and verify the approval of the risk level of a transaction and to systems for generating transaction risk level approval codes.... Agent: Vasco Data Security, Inc.

20140237238 - Document authentication data embedding method and apparatus: A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired. The image is decomposed into a hierarchy of images having a top level and one or... Agent: Adsensa Ltd.

20140237241 - Mapping a glyph to character code in obfuscated data: In a font applying device on a client side in a computer system composed of the client and a server, an obfuscated font storing section stores an obfuscated font in which a character different from a character identified by the server based on a character code and having the same... Agent: International Business Machines Corporation

20140237237 - Message authentication using a universal hash function computed with carryless multiplication: A method for authenticating a message by a wireless device is described. The wireless device obtains the input message. The wireless device generates a keystream. The wireless device computes a message authentication code using the keystream and a universal hash function. The universal hash function is computed using carryless multiplication.... Agent: Qualcomm Incorporated

20140237243 - Method and system for secure over-the-top live video delivery: A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content... Agent: Azuki Systems, Inc.

20140237240 - Method and systems for the authentication of a user: A computer security system used to identify and authenticate a user. In one aspect, a method for identifying and authenticating a user is provided. The method includes establishing a trust between a server machine and an agent on a user machine. The method further includes establishing a session key to... Agent:

20140237236 - Mobile security fob: c

20140237239 - Techniques for validating cryptographic applications: Disclosed are various embodiments for validating cryptographic applications. A cryptographic application is transmitted to a client device. Subsequently, a communication link is established with the transmitted cryptographic application as it executes in the client device. A round-trip time for communications with the transmitted cryptographic application is measured. Validation data and... Agent:

20140237244 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237245 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237246 - Generating a symmetric key to secure a communication link: A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed... Agent: Blackberry Limited

20140237248 - Mobile communication system implementing integration of multiple logins of mobile device applications: In existing mobile implementations, there is a disconnect between the mobile device accessing the network and the applicative services inasmuch as the entity responsible for network access, such as the VPN Gateway, differs from the entity governing access to applications, such as email servers and SharePoint repositories. Therefore existing solutions... Agent:

20140237247 - System and method for provisioning and authenticating via a network: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods... Agent:

20140237249 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237250 - Registration and network access control: In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a... Agent:

20140237253 - Cryptographic devices and methods for generating and verifying commitments from linearly homomorphic signatures: A processor of a device generates a cryptographic commitment by receiving a vector {right arrow over (m)}, a public verification key of a homomorphic signature scheme, and a tag; choosing a signature σ in the signature space; generating a commitment c by running the verification algorithm of the homomorphic signature... Agent: Thomson Licensing

20140237254 - Cryptographic devices and methods for generating and verifying linearly homomorphic structure-preserving signatures: and outputting the signature σ comprising the signature elements (z, r, u). The signature is verified by verifying, in a processor that (M1, . . . , Mn)≠(, . . . , ) and that (z, r, u) satisfy the equalities =e(gz, z)·e(gr, r)·Πi=1ne(gi, Mi), =e(hz, z)·e(h, u)·Πi=1ne (hi, Mi);... Agent: Thomson Licensing

20140237251 - Digital signature system: A message signing system including a processor operative to receive a seed S0 and a number N from an authority providing permission to digitally sign up to N messages for a client device, successively apply a one-way function to the seed S0 yielding a chain having a plurality of values... Agent:

20140237252 - Techniques for validating data exchange: Disclosed are various embodiments for confirming transactions between cryptographic applications. A transaction confirmation is generated using metadata for ciphertext data. The transaction confirmation is signed using a private key of a temporary key pair. The signed transaction confirmation and a public key of the temporary key pair are converted into... Agent:

20140237255 - Decryption and encryption of application data: Examples disclose providing a decryption, validation and encryption process. Specifically, disclosure includes decrypting a first encrypted application data to then validate its integrity. Disclosure also includes encrypting the decrypted application data using a technique different from that used to provide the first encrypted application data and then storing the encrypted... Agent:

20140237256 - Method for securing data using a disposable private key: A method for securing data uses a unitary device to obtain a biometric reading from a user, and to generate a new key pair corresponding to the user's biometrics. The unitary device uses a private key from the key pair to encrypt data or voice, sends the encrypted data or... Agent:

20140237258 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140237261 - Process authenticated memory page encryption: A memory controller encrypts contents of a page frame based at least in part on a frame key associated with the page frame. The memory controller generates a first encrypted version of the frame key based at least in part on a first process key associated with a first process,... Agent: Rambus Inc.

20140237257 - Scalable precomputation system for host-opaque processing of encrypted databases: A method, system, and computer program product to generate results for a query to an encrypted database stored on a host are described. The method includes generating indexes from the encrypted database, each index identifying records of the encrypted database associated with a range of data for at least one... Agent: International Business Machines Corporation

20140237262 - System and method for establishing perpetual trust among platform domains: A method may include generating a first shared secret for a present boot session of the information handling system and determining if a second shared secret existed for a prior boot session of the information handling system. If the second shared secret existed for the prior boot session, the method... Agent:

20140237259 - Systems/methods of encryption: Encryption is provided via an algorithm that maps a block of N input bits onto a block of M output bits, wherein M≧N. Encryption also may be provided in accordance with bit/bandwidth expansion, wherein M>N. At least one bit of the block of M output bits may be pseudo-randomly generated... Agent: Eices Research, Inc.

20140237260 - Telecommunications device security: A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment and a secure execution environment The mobile terminal enables the software of the terminal in the secure execution environment to be updated. The terminal may be provided with minimal software initially in the... Agent:

20140237264 - Authentication method: According to one embodiment, an authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in... Agent: Kabushiki Kaisha Toshiba

20140237265 - Logical-to-physical address translation for a removable data storage device: A method for making memory more reliable involves accessing data stored in a removable storage device by translating a logical memory address provided by a host digital device to a physical memory address in the device. A logical memory address is received from the host digital device. The logical memory... Agent: Imation Corp.

20140237263 - Nonvolatile semiconductor memory device and memory system using the same: According to one embodiment, a nonvolatile semiconductor memory device includes a memory cell array and an encryption arithmetic module. The memory cell array includes a first storage area and a second storage area. The first storage area is inhibited from being written into and read from and stores secret key... Agent: Kabushiki Kaisha Toshiba

20140237266 - Secure memory system with fast wipe feature: A Flash-based storage system, card, and/or module comprises a Flash controller configured to encrypt the data pages of a page stripe by shuffling the data pages, including loading each data page into a data shuffling buffer in a sequential order relative to other data pages in the page stripe, and... Agent: International Business Machines Corporation

20140237271 - Controlling energizing range of mobile electronic device: An energization range of a laptop PC is controlled for safety component replacement. An EC can communicate with a battery unit to control a FET of the battery unit. In a power-off state, a PWC receives electricity from the battery unit or an AC/DC adapter. In the power-off state, a... Agent: Lenovo (singapore) Pte.ltd.

20140237267 - Dynamically controlling a maximum operating voltage for a processor: In an embodiment, a processor includes voltage calculation logic to calculate a plurality of maximum operating voltage values each associated with a number of active cores of the plurality of cores, based at least in part on a plurality of coefficient values. In this way, the processor can operate at... Agent:

20140237269 - Estimating power usage in a computing environment: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.... Agent: International Business Machines Corporation

20140237268 - Moisture shutdown control: Aspects of shutdown control of a device in the presence of moisture are described. In one embodiment, a moisture detection signal is received from a moisture detector. In turn, certain parameters associated with the moisture detector are identified. For example, the location of the moisture detector may be identified. Additionally... Agent: Broadcom Corporation

20140237270 - Power supply control apparatus, power supply control system and power supply control method: A power supply control apparatus is disclosed. The power supply control apparatus includes a positional-information-obtaining unit configured to obtain positional information of a communication terminal; a process-information-obtaining unit configured to obtain process information requested by a user of the communication terminal; a distance-determination unit configured to, based on positional information... Agent: Ricoh Company, Ltd.

20140237273 - Information processing apparatus, information processing method, and program: An information processing apparatus includes: a wakeup-target identifying section configured to identify a wakeup target in response to a wakeup trigger; and a wakeup processing section configured to wake up the wakeup target identified by the wakeup-target identifying section.... Agent: Sony Corporation

20140237274 - Method for controlling information processing apparatus and information processing apparatus: A method of controlling an apparatus including a processor including a plurality of cores, the method includes, when a number of the cores to be activated is M, determining whether or not a first power consumed by the M activated core is within a range of a second power to... Agent: Fujitsu Limited

20140237272 - Power control for data processor: A data processor includes a data processor core, and a power controller. The data processor core is adapted to control an external memory system and to perform a task by accessing the external memory system, where the task has an associated computation rate, and the data processor is adapted to... Agent: Advanced Micro Devices, Inc.

20140237275 - Multiple critical paths having different threshold voltages in a single processor core: A processor having a multi-Vt critical path is provided that includes both low-Vt devices and high-Vt devices. If the processor is operating in a high performance mode, the multi-Vt critical path is controlled so as to use the low-Vt devices. Conversely, if the processor is operating in a low power... Agent: Qualcomm Incorporated

20140237278 - Controlling power management in micro-servers: Systems and methods of enabling power management in a micro server include providing multiple cores, a power management module coupled to the cores, and one or more peripherals coupled to the power management module. The power management module may be configured to cause the one or more peripherals to delay... Agent:

20140237281 - Data processing system: A data processing apparatus is provided comprising first processing circuitry, second processing circuitry and shared processing circuitry. The first processing circuitry and second processing circuitry are configured to operate in different first and second power domains respectively and the shared processing circuitry is configured to operate in a shared power... Agent: Arm Limited

20140237277 - Hybrid performance scaling or speech recognition: Aspects of the present disclosure describe methods and apparatuses for executing operations on a client device platform that is operating in a low-power state. A first analysis may be used to assign a first confidence score to a recorded non-tactile input. When the first confidence score is above a first... Agent:

20140237276 - Method and apparatus for determining tunable parameters to use in power and performance management: Various method and apparatus embodiments for selecting tunable operating parameters in an integrated circuit (IC) are disclosed. In one embodiment, an IC includes a number of various functional blocks each having a local management circuit. The IC also includes a global management unit coupled to each of the functional blocks... Agent: Apple Inc.

20140237280 - Power supply system and control method: A power supply system includes a plurality of power supply circuits connected to a common output node and a control unit that controls outputs of the plurality of power supply circuits such that an output value at the output node follows an output target value at the output node. The... Agent: Toyota Jidosha Kabushiki Kaisha

20140237279 - Priority based application event control (paec) to reduce power consumption: Methods and apparatus relating to Priority Based Application Event Control (PAEC) to reduce application events are described. In one embodiment, PAEC may determine which applications (and their corresponding sub-system(s)) may cause a processor or platform to exit a low power consumption state. In an embodiment, PAEC may determine which applications... Agent:

20140237282 - Usb peripheral and method of reducing transmission power thereof: Disclosed are a USB peripheral apparatus capable of reducing transmission power of a transmission terminal circuit by significantly increasing resistance values of terminations provided at the transmission terminal circuit and a reception terminal circuit as compared with a specific impedance value of a transmission line, and a transmission power reduction... Agent:

20140237283 - Estimating power usage in a computing environment: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.... Agent: International Business Machines Corporation

20140237284 - Masking power usage of co-processors on field-programmable gate arrays: Technologies are generally described for masking power usage of co-processors on field-programmable gate arrays. In some examples, one or more moat brick circuits may be implemented around a co-processor loaded on a held-programmable gate array (FPGA). The moat brick circuits may be configured to use negative feedback and/or noise to... Agent: Empire Technology Development, LLC

20140237285 - Single-pin command technique for mode selection and internal data access: A single pin is used to control an operating mode of an integrated circuit and to supply serial data to a host controller. The internal operating mode can be changed by changing a static level on an input/output terminal and maintaining that static level longer than a first time threshold.... Agent: Silicon Laboratories Inc.

  
08/14/2014 > 35 patent applications in 20 patent subcategories.

20140229723 - Random access to signal values of an fpga at runtime: A method for accessing a signal value of an FPGA at runtime, including the steps of loading an FPGA hardware configuration into the FPGA, executing the FPGA hardware configuration in the FPGA, requesting a signal value of the FPGA, sending status data from a functional level of the FPGA to... Agent: Dspace Digital Signal Processing And Control Engineering Gmbh

20140229722 - Systems and methods for calibrating the elements of a quantum processor: Systems and methods for improving calibration procedures in a quantum processor architecture are described. For example, a dedicated calibration signal source is built into the architecture of the quantum processor for use during calibration. A single calibration signal source is communicatively coupled to many devices in the quantum processor architecture... Agent: D-wave Systems Inc.

20140229727 - Method and apparatus for fast booting of user device: A method of fast booting of a user device is provided. The method includes detecting a movement of the user device in a power-off state, generating energy corresponding to the movement of the user device, changing the power-off state to a sleep mode state by the generated energy, partly performing... Agent: Samsung Electronics Co., Ltd.

20140229724 - Method and electronic device of file system prefetching and boot-up method: A method of file system prefetching is provided. The method is applicable to an electronic device including a volatile storage, a non-volatile storage, and multiple processors with multiple operating systems. The method includes the following steps. When a first static backup table in the non-volatile storage is not empty, copy... Agent: Htc Corporation

20140229725 - Systems and methods for metadata-driven command processor and structured program transfer protocol: Systems and methods for facilitating on-demand delivery and processing of one or more programs and program-compatible applications on a plurality of different machines. In an embodiment, a metadata-driven command processor on a machine sends a request for a booting program and application to an agent. In response to the request,... Agent: Automatic Data Capture Technologies Group, Inc.

20140229726 - Systems and methods for metadata-driven command processor and structured program transfer protocol: Systems and methods for facilitating on-demand delivery and processing of program(s) and program-compatible application(s) on a plurality of different machines. In an embodiment, a metadata-driven command processor on a machine sends a request for a booting program and application to an agent. In response to the request, the agent invokes... Agent: Automatic Data Capture Technologies Group, Inc.

20140229728 - Data processing device, operation mode switching method and data displaying method thereof: In a method for switching an operation mode of a data processing device, a switching instruction is obtained; and the data processing device is switched to a first operation mode or a second operation mode based on the switching instruction. The second operation mode is a multi-user operation mode.... Agent:

20140229729 - Data security service: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed... Agent: Amazon Technologies, Inc.

20140229730 - Implicit certificate scheme: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data... Agent:

20140229731 - Systems and methods for a cryptographic file system layer: The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies (e.g., by encrypting) data to be stored in a designated directory. The cryptographic file system layer can be used in combination with one or more cryptographic approaches to provide... Agent: Security First Corp.

20140229732 - Data security service: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed... Agent: Amazon Technologies, Inc.

20140229734 - Data management apparatus, power usage calculation system, and data management method: According to an embodiment, a data management apparatus includes a first receiver, a generator, a second receiver, a convertor, and a transmitter. The first receiver is configured to receive first values from at least one power meter, the first values being acquired by encrypting power usage amounts collected by the... Agent: Kabushiki Kaisha Toshiba

20140229733 - System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions: Aspects of the disclosure pertain to a system and method for key wrapping via a storage system to allow secure access to media of the system by multiple authorities with modifiable permissions. The keys used to encrypt ranges of the drive are not stored in plaintext and are recoverable using... Agent: Lsi Corporation

20140229736 - Hierarchical attribute-based encryption and decryption: A domain authority 13 for use in a hierarchy of domain authorities in a hierarchical cryptographic system. The domain authority 13 comprises a user secret key generator 21 for generating a user secret key based on a domain secret key and one or more attribute representations, to obtain a user... Agent:

20140229735 - Managing device ownership and commissioning in public-key encrypted wireless networks: A mobile commissioning device for assisting in the commissioning of wireless public-key encrypted networks, the device being provided with: means for reading the public key from a network node to be integrated in the wireless network, the channel for reading the public key being physically different to the wireless network... Agent: Tridonic Gmbh & Co Kg

20140229737 - Federated key management: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information... Agent: Amazon Technologies, Inc.

20140229738 - Timestamping system and timestamping program: A timestamping system including a plurality of time servers and a timestamping device, the timestamping device including a dividing processing unit dividing an electronic document into a plurality of divided data items by a secret sharing scheme, a distributing processing unit transmitting the divided data items to different servers, respectively,... Agent: Nomura Research Institute, Ltd.

20140229739 - Delayed data access: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information... Agent: Amazon Technologies, Inc.

20140229740 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba

20140229741 - Dual composite field advanced encryption standard memory encryption engine: A different set of polynomials may be selected for encryption and decryption accelerators. That is, different sets of polynomials are used for encryption and decryption, each set being chosen to use less area and deliver more power for a memory encryption engine. This is advantageous in some embodiments since memory... Agent:

20140229742 - Methods and devices for protecting digital objects through format preserving coding: To code a digital object, a sender encrypts its data to obtain a bitstream that is converted into a set of points that are then packaged and the coded object is output. A receiver receives and unpacks the coded object to obtain the set of points, converts the set of... Agent:

20140229744 - Enabling a software application to be executed on a hardware device: The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence of the hardware circuit, while preventing the execution of a binary copy of the application in another hardware device. Challenge data originating from the... Agent: Irdeto B.v.

20140229743 - Malware and tamper resistant computer architecture: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated... Agent: Raytheon Bbn Technologies Corp.

20140229745 - System and method for updating read-only memory in smart card memory modules: A storage device contains a smart-card device and a memory device, both connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it may he used to store a relatively large amount of data in various partitions. One of these... Agent: Micron Technology, Inc.

20140229746 - Authentication method: According to one embodiment, a authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in... Agent: Kabushiki Kaisha Toshiba

20140229748 - Apparatus and method for optimizing use of nvdc chargers: A method includes detecting removal or depletion of a power supply associated with a powered device. The powered device is configured to receive power from a power adapter via a narrow-voltage direct current/direct current (NVDC) charger and from the power supply. The method also includes, in response to the detection,... Agent: Texas Instruments Incorporated

20140229747 - Automatic classification change in power over ethernet device: In one implementation, a classification resistance of a powered device is adjusted passively. The powered device is configured to receive a classification voltage from a network device and, in response, is configured to send a first current indicative of a first classification resistor to the network device. The first current... Agent: Cisco Technology, Inc.

20140229749 - Method and system for discovery, validation and delivery of power through a universal power center: A system and method of discovery, validation and delivery of power to an electronic device through a universal power center is provided. The method comprises providing a power tip for an electronic device with a unique identification and broadcasting the unique identification to a power center. The method further includes... Agent: International Business Machines Corporation

20140229750 - Method and apparatus for per core performance states: A method and apparatus for per core performance states in a processor. Per Core Performance States (PCPS) refer to the parallel operating of individual cores at different voltage and/frequency points. In one embodiment of the invention, the processor has a plurality of processing cores and a power control module that... Agent:

20140229753 - Communication system and communication node: A main body ECU as a slave node includes a switch. The switch is under OFF state when a prohibition signal is outputted from a verification ECU as a master node and under ON state when the prohibition signal is not outputted. The switch is inserted in a reception path... Agent: Denso Corporation

20140229751 - Network interface with low power data transfer and methods for use therewith: A network interface includes a physical layer device coupled to a network link. A media access control module communicates with a link partner over the network link. An energy controller monitors a link utilization level of the network link and transitions, in response to the monitoring, the media access control... Agent: Broadcom Corporation

20140229752 - User device and operation method thereof: An operation method of an electronic device includes performing a sleep mode and at least one function that is allowed during the sleep mode, if at least one preset condition is satisfied.... Agent: Samsung Electronics Co., Ltd.

20140229754 - Power telemetry remote monitoring: Embodiments disclosed herein generally relate to the collection and correlation of power consumption data for mobile devices. Power consumption data for a mobile device is collected and correlated with system activity by monitoring what processes are being run on the CPU and measuring the power being consumed within the mobile... Agent: Nvidia Corporation

20140229755 - Pulse width modulation load share bus: Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (PWM) signals represent output loading of each of the power supply modules over the single wire load share bus. The PWM load share signal width (time... Agent: Microchip Technology Incorporated

20140229756 - Compound universal serial bus architecture providing precision synchronisation to an external timebase: A method of synchronising a compound SuperSpeed USB device, comprising: providing data communication between a host computing device and the compound SuperSpeed USB device across the SuperSpeed USB communication channel; establishing a SuperSpeed USB communication channel to a SuperSpeed USB function of the compound USB device; establishing a non-SuperSpeed synchronisation... Agent: Chronologic Pty. Ltd.

Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery


######

RSS FEED for 20140904: xml
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.

######

Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.



Results in 0.84468 seconds

PATENT INFO