|Electrical computers and digital processing systems: support patents - Monitor Patents|
USPTO Class 713 | Browse by Industry: Previous - Next | All
Recent | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Electrical computers and digital processing systems: supportBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 12/05/2013 > 55 patent applications in 23 patent subcategories.
20130326205 - Deterministic clock crossing: Techniques and apparatuses for clock crossing. A reset circuit on a first die generates a forwarded FIFO reset signal synchronous to a reference clock that identifies a single edge. A clock generation circuit on the first die generates the reference clock signal. Control circuitry on the first die generates a... Agent:
20130326207 - Implementing security functions using rom: Systems, methods, and other embodiments associated with implementing security functions in a read-only memory (ROM) are described. According to one embodiment, an device includes a read-only memory (ROM) that stores (i) a plurality of security functions and (ii) a mapping of locations of the plurality of security functions in the... Agent:
20130326206 - Reintialization of a processing system from volatile memory upon resuming from a low-power state: Boot configuration information is stored to a volatile memory of a processing system during a low-power state. When resuming from the low-power state, a processor device accesses configuration information for a memory controller from a non-volatile memory and restores the memory controller using the configuration information so as to permit... Agent: Advanced Micro Devices, Inc.
20130326209 - Automatic alert mode selection: Automatic Alert Mode Selection may put a device into vibrate, silent, or ringer mode, or take the device out of such modes. It may automatically adjust volume settings, as applicable. It may perform these functions based on a location, a calendar entry, or an event. One embodiment may comprise a... Agent:
20130326208 - Headset computer (hsc) with docking station and dual personality: An example embodiment of the present invention includes a headset computing device (HSC) having a port for docking. When worn on a user's head, the HSC operates in a “headset” mode and behaves as a hands-free computing device. When docked with a docking station, the HSC operates in a “docked”... Agent: Kopin Corporation
20130326211 - Method and system for conditional access to a digital content, associated terminal and subscriber device: The invention relates to a method and a system for conditional access making it possible to prevent the fraudulent use of a subscriber electronic device (1a, 1b, 1m) and to thus effectively combat the fraudulent making available of protected contents. The invention further relates to the adaptation of such a... Agent: Cryptoexperts Sas
20130326210 - Secure client-side communication between multiple domains: Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for dynamic multi-domain and/or multi-tenant environments while allowing for granular security or specific security of messages and operations with regard to users, user sessions, groups, organizations,... Agent: Salesforce.com, Inc.
20130326212 - Helper applications for data transfers over secure data connections: Data rates in secure data communications may be improved by executing helper applications to assist a computer system in responding to requests for secure data. The computation-intensive calculations may be offloaded to helper applications executing on different central processor units (CPUs). When the helper applications execute on different CPUs, higher... Agent:
20130326213 - Method and system for automatic generation of context-aware cover message: One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system first transmits an encrypted message to a secure message server, wherein the encrypted message is addressed to the receiving device. The system then generates a cover message which indicates... Agent:
20130326214 - Apparatus and methods for activation of communication devices: A method that incorporates teachings of the subject disclosure may include, for example, storing, by a universal integrated circuit card (UICC) including at least one processor, a digital root certificate locking a communication device to a network provider, and disabling an activation of the communication device responsive to receiving an... Agent: At&t Intellectual Property I, Lp
20130326215 - Establishing trust within a cloud computing system: A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of... Agent: Cleversafe, Inc.
20130326216 - Methods and arrangements to launch trusted, coexisting environments: Methods and arrangements to launch trusted, distinct, co-existing environments are disclosed. Embodiments may launch trusted, distinct, co-existing environments in pre-OS space with high assurance. A hardware-enforced isolation scheme may isolate the partitions to facilitate storage and execution of code and data. In many embodiments, the system may launch a partition... Agent:
20130326217 - Self-keyed protection of anticipatory content: Systems and methods are provided to facilitate anticipatory pushing of content to clients of a communications network in such a way that the content is unusable by the anticipatory clients until explicitly requested. Embodiments apply one or more self-keying techniques to a content dataset to generate an anticipatory dataset, such... Agent: Viasat, Inc.
20130326221 - Confidential message exchange using benign, context-aware cover message generation: Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with known message generating tools to permit a user to generate a message. The local application encrypts the message (and optional attachments) based on public/private... Agent: Private Giant
20130326222 - Information processing apparatus and method, recording medium and program: The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner.... Agent: Sony Corporation
20130326220 - Recipient blind cryptographic access control for publicly hosted message and data streams: Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer. Since the client devices perform all encryption and decryption processing, the server computer stores the... Agent: Apple Inc.
20130326219 - Stored public key validity registers for cryptographic devices and systems: Systems and techniques for performing cryptographic operations based on public key validity registers are described. A described system includes a controller and a memory structure to store one or more public keys. The memory structure includes one or more validity registers that respectively correspond to the one or more public... Agent: Atmel Corporation
20130326218 - Techniques for secure message offloading: Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user authenticates to the local client for access and the intermediary authenticates the user for access to the remote client using different credentials unknown... Agent:
20130326223 - Methods and systems for increasing the security of private keys: A method for increasing the security of private keys is provided that includes generating transaction data at a device operated by a user and processing the transaction data. Moreover, the method includes determining whether the user permits using a private key that is associated with the user and with a... Agent:
20130326226 - Information processing device and information processing program: A long-term signature registration system 8 receives an input of attributes from a user to set an attribute value group with respect to original data. The attribute value group is compressed to generate single long-term signature compressed data. The long-term signature registration system 8 outputs and registers long-term signature compressed... Agent:
20130326225 - Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program: A client terminal 3 can generate PAdES while performing communication with a long-term signature server 2 without delivering a PDF document and a secret key used in an electronic signature to the long-term signature server 2. PAdES is a long-term signature format which is specified for a PDF file. The... Agent: Il Sung Co., Ltd.
20130326224 - System and method for message verification in broadcast and multicast networks: In a network device, a method for verified communication includes generating a network communication message using a selection of predetermined message elements having digital signatures generated with a private key. The network device generates a signature for the message by applying a homomorphic operation to the digital signatures of the... Agent: Robert Bosch Gmbh
20130326227 - Authentication apparatus, authentication system, authentication method and storage medium: The first authentication unit of an authentication apparatus decides whether first authentication data exists in a received message, and performs, if it is decided that the first authentication data exists, authentication based on the first authentication data. The second authentication unit of the authentication apparatus decides whether second authentication data... Agent: Canon Kabushiki Kaisha
20130326228 - Password encryption key: A password-encrypted key (PEK) is generated from a user-supplied password or other identifying data and then used to encrypt the user's password. The encrypted password is stored in a user record on a server. At login a would-be user's password is again used to make a key, which is... Agent: Cambridge Interactive Development Corp.
20130326229 - Verification apparatus, verification program, and verification method: In a verification apparatus, a biometric information acquisition unit acquires a plurality of biometric information pieces from an object. A first verification unit calculates, as a verification score, the similarity between the biometric information piece and a verification information piece, and compares the calculated verification score with a first determination... Agent: Fujitsu Frontech Limited
20130326235 - Cryptographic method: In a cryptographic method between a portable data carrier and a terminal device there are employed a public data-carrier key and a secret data-carrier key of the data carrier as well as a public terminal key and a secret terminal key of the terminal device. The data carrier employs as... Agent: Giesecke & Devrient Gmbh
20130326232 - Device for carrying out a cryptographic method, and operating method for same: A device for carrying out a cryptographic method has an input interface for receiving input data, an output interface for outputting output data, and a cryptographic unit for carrying out the cryptographic method. A first functional unit is provided which is designed to convert at least a portion of the... Agent: Robert Bosch Gmbh
20130326234 - Information processing device and information processing program: A long-term signature group has a package of long-term signature data and an information file. The package of long-term signature data is obtained by compressing original data and XAdES as long-term signature data of original data into a single file. In the information file, the hash value of the package... Agent: Seiko Instruments Inc.
20130326233 - Locating cryptographic keys stored in a cache: Example embodiments provide various techniques for locating cryptographic keys stored in a cache. The cryptographic keys are temporarily stored in the cache until retrieved for use in a cryptographic operation. The cryptographic key may be located or found through reference to its cryptographic key identifier. In an example, a particular... Agent: Netapp, Inc.
20130326230 - Methods and apparatus for data hashing based on non-linear operations: A method and an apparatus that provides a hard problem based hashing mechanism to improve security of hash functions are described. The hashing mechanism can include a custom padding and/or a post processing to a hashed value strengthened via operations specifying a hard problem. In one embodiment, a new hash... Agent: Apple Inc.
20130326231 - System and method for downloading electronic information to a video lottery: This invention relates to reprogramming of in-circuit programmable chips installed in video lottery terminals (VLTs) by downloading electronic information (software) to such chips. Encrypted electronic information is downloaded from a host device to a gaming terminal through a communications link. The terminal comprises a decryption component configured for decrypting... Agent: Spielo International Canada, Ulc
20130326236 - Security of program executables and microprocessors based on compiler-architecture interaction: A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a control instruction encoded with an instruction set encoding contains information about decoding of an instruction that is encoded with another instruction set encoding scheme. A... Agent: Bluerisc Inc., A Delaware Corporation
20130326245 - Dynamic energy management: A method of dynamic energy management that includes loading an energy budget configuration stream for an instruction of a thread, loading characterization data for the thread, computing energy management settings for the instruction based on the characterization data and the budget configuration stream, and driving control signals indicative of the... Agent: International Business Machines Corporation
20130326240 - Host device with installable power supply: A host device with an installable power supply comprises: a casing which is a case with an installation space enclosed inside, and the installation space is partitioned into at least a power supply installation space and a plurality of uninterruptible power supply (UPS) installation spaces disposed adjacent to the power... Agent: Multi-expander Technology Inc.
20130326239 - Power management with thermal credits: A power management system, in one embodiment, determines a thermal status (e.g. a temperature or a calculation of power consumption) of at least a portion of a data processing system, and based on that status, thermal credits are calculated and then used to determine a voltage dithering pattern and a... Agent:
20130326242 - Power supply apparatus for datacenter: A power supply apparatus for a datacenter includes a carrier to carry the datacenter on rails of a rail transport system, a number of pantographs each including a main body with first and second terminals and a contact plate connected to the first terminal of the main body, and a... Agent: Hon Hai Precision Industry Co., Ltd.
20130326241 - Power supply circuit to simulate battery power: A power supply circuit includes a power output port, an operational amplifier, a voltage adjusting circuit, a feedback circuit, and a current controlling circuit. The power output port connects with an electronic device under test and provides a power supply which in all respects simulates the behavior of a battery... Agent: Fu Tai Hua Industry (shenzhen) Co., Ltd.
20130326244 - Semiconductor device and alarm device: In the microcomputer in the alarm device, supply of power to a sensor portion or a CPU in a sensor is allowed or stopped by a power gate controlled by a power gate controller. In addition, a volatile memory portion and a nonvolatile memory portion are provided in the CPU,... Agent: Semiconductor Energy Laboratory Co., Ltd.
20130326243 - Semiconductor device having identification information generating function and identification information generation method for semiconductor device: A semiconductor device includes an identification information generation circuit having a power supply control circuit whose output voltage is controlled by a control signal, and a memory array having a first cell power line and a second cell power line. The power supply control circuit outputs a first supply voltage... Agent: Renesas Electronics Corporation
20130326238 - Shared access system: A shared access system is for a plurality of shared access devices to share data and power, and one of the shared access devices includes an instruction unit, a connecting unit, a storage unit, a power unit and a processing unit. The instruction unit is for storing a plurality of... Agent: FluiditechIPLimited
20130326237 - Uninterruptable pc power unit for use in personal computer and servers: Uninterruptable PC Power Unit (UPCPU) for a personal computer (PC) replaces the power supply of a PC. The UPCPU comprises an internal battery to be used during AC power interruption. The UPCPU may be connected to external batteries installed in the PC's 5.25″ or 3.5″ drive bays. The UPCPU may... Agent:
20130326249 - Regulating power consumption of a mass storage system: A technique includes receiving first work requests that are associated with a user workload. The technique includes using a machine to transform the first work requests into second work requests that are provided to components of a mass storage system to cause the components to perform work associated with a... Agent:
20130326246 - Semiconductor memory device, and method of controlling the same: A semiconductor device includes a memory core with a plurality of memory cells, an internal voltage generator and a low power entry circuit. The low power entry circuit receives a plurality of control signals which are provided to a command decoder, and generates a low power signal indicating a low... Agent: Fujitsu Semiconductor Limited
20130326247 - Semiconductor memory device, and method of controlling the same: A semiconductor device includes a memory core with a plurality of memory cells, an internal voltage generator and a low power entry circuit. The low power entry circuit receives a plurality of control signals which are provided to a command decoder, and generates a low power signal indicating a low... Agent: Fujitsu Semiconductor Limited
20130326248 - Semiconductor memory device, and method of controlling the same: A semiconductor device includes a memory core with a plurality of memory cells, an internal voltage generator and a low power entry circuit. The low power entry circuit receives a plurality of control signals which are provided to a command decoder, and generates a low power signal indicating a low... Agent: Fujitsu Semiconductor Limited
20130326255 - Communication system: A communication system includes a plurality of nodes performing communication via a common communication channel based on a communication protocol and including a first node or a second node. The first node transmits, to the communication channel, a wake-up frame as the communication frame for enabling the second node to... Agent:
20130326252 - Computer readable medium and computation processing apparatus: According to an embodiment, there is provided with a non-transitory computer readable medium having instructions stored therein, which, when executed by a computer, causes the computer to execute steps including: calculating an access load on a memory area including a plurality of segment areas and determining, for each of the... Agent: Kabushiki Kaisha Toshiba
20130326250 - Managing power consumption of electronic devices responsive to usage forecast: A system and process that incorporates teachings of the subject disclosure may include, for example, transitioning a processor from a high-power consumption state to a low-power consumption state, wherefrom return to the high-power consumption state includes a boot process. Future demand for operation of the processor in the high-power consumption... Agent: At&t Intellectual Property I, Lp
20130326251 - Method and apparatus for recovery from low power state: A method and apparatus for recovering from a low power state in a computing system is disclosed. In one embodiment of the method, the computing system enters the low power state from a standard power state after an activity detector indicates a user controlled peripheral device connected to the computer... Agent: Apple Inc.
20130326254 - Procedure for charging a portable device using a battery-operated computer: A method of charging a battery of a device using a battery of a computer powered by the battery, in which the procedure is implemented by a circuit independent of the computer's processors. The method includes supplying a power supply voltage, insufficient to charge a battery, to a computer port,... Agent:
20130326253 - Toggling sleep-mode of a mobile device without mechanical or electromagnetic toggling buttons: Techniques for toggling sleep modes. A gesture associated with the mobile device that is in a first mode is detected. The can be gesture indicative of a user toggling the sleep mode of the mobile device from a first mode. Responsive to the gesture, the first mode can be switched... Agent:
20130326256 - Generating monotonically increasing tod values in a multiprocessor system: Generating monotonically increasing time-of-day values in a multiprocessor system is provided. Synchronization impulses are received by a processor of the multiprocessor system, and an execution of a read instruction of a time-of-day value within a processor of the processors is refused, if the execution of the read instruction of the... Agent:
20130326257 - Memory device, host device, and sampling clock adjusting method: A memory card includes a memory controller configured to perform control for sending and receiving a command signal, a response signal, a data signal, and a status signal in synchronization with a clock signal, and a memory-side pattern signal storage unit configured to store a tuning pattern signal to be... Agent: Kabushiki Kaisha Toshiba
20130326258 - Predicting timing violations: For predicting timing violations, a prediction module predicts a timing violation for a first instruction in a semiconductor device in response to use by the first instruction of a specified sensitized path. The prediction module further mitigates the predicted timing violation.... Agent: Utah State University
20130326259 - System and method for multiple backplane time synchronization: A system and method for synchronizing multiple backplanes within an information handling system are disclosed. An information handling system includes a first controller that may be operable to generate a time command at a predetermined time interval. A backplane including a second controller is communicatively coupled to the first controller.... Agent:11/28/2013 > 56 patent applications in 20 patent subcategories.
20130318335 - Computing device and method of capturing shutdown cause in same: A computing device includes an embedded controller. The embedded controller suspends a shutdown process in response to detection of a shutdown command, and obtains a shutdown cause according to the shutdown command. The embedded controller includes a memory. The embedded controller stores the shutdown cause in the memory, and resumes... Agent: Hon Hai Precision Industry Co., Ltd.
20130318337 - Dmi redundancy in multiple processor computer systems: In accordance with various aspects of the disclosure, a method and apparatus are disclosed that includes aspects of monitoring a first processor of a computer by a monitoring module for a first processor instability; determining if the first processor is stable based on the monitored first processor instability; routing operational... Agent:
20130318336 - Method for executing bios tool program in non-smi mechanism: A method for executing a Basic Input Output System (BIOS) tool program in a non-System Management Interrupt (SMI) mechanism is applicable to a computer and includes: bi-directionally transmitting, by an ACPI ASL module and a service module, a corresponding trigger signal; bi-directionally transmitting, by the service module and a driver,... Agent: Insyde Software Corporation
20130318338 - Selective management controller authenticated access control to host mapped resources: An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory,... Agent: Dell Products, Lp
20130318340 - Flexible method for modifying a cipher to enable splitting and zippering: A cryptographic framework embodies modular methods for securing data, both at rest and in motion, via an extensible encryption method. Key derivation and synchronization methods are defined. Using a small set of initialization values (keys), a multi-dimensional geometric form from which two or more entities (participants) may derive the same... Agent:
20130318339 - Systems and methods for protecting communications between nodes: Systems and methods for protecting communications between at least two nodes protect the identity of a node requesting information, provide content of communications being sent and/or obscuring a type of communications being sent. Varying degrees of protection options including encryption, intermediate node termination and direct node communications are provided.... Agent:
20130318341 - Highly scalable architecture for application network appliances: A highly scalable application network appliance is described herein. According to one embodiment, a network element includes a switch fabric, a first service module coupled to the switch fabric, and a second service module coupled to the first service module over the switch fabric. In response to packets of a... Agent:
20130318342 - Method and system for generating implicit certificates and applications to identity-based encryption (ibe): The invention relates to a method of generating an implicit certificate and a method of generating a private key from a public key. The method involves a method generating an implicit certificate in three phases. The public key may be an entity's identity or derived from an entity's identify. Only... Agent: Certicom Corp.
20130318343 - System and method for enabling unconfigured devices to join an autonomic network in a secure manner: A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending... Agent: Cisco Technology, Inc.
20130318344 - System and method for processing encoded messages for exchange with a mobile data communication device: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message... Agent: Blackberry Limited
20130318350 - Information processing apparatus and method, recording medium and program: The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner.... Agent: Sony Corporation
20130318345 - Multi-tunnel virtual private network: Systems and methods for controlling Quality-of-Service (“QoS”) in a Virtual Private Network (“VPN”) in a transport network (303) providing a plurality of QoS bearers (3301-330n). The methods involve: establishing (601-615), between two VPN endpoints (319, 341), a plurality of VPN tunnels (3320-332i) through the transport network, including at least a... Agent: Harris Corporation
20130318346 - Obtaining targeted services using a unique identification header (uidh): A system is configured to receive, from a user device, a request for content; obtain, based on receiving the request, an identifier for a subscriber associated with the system and a key; encode the identifier and the key to create a unique identifier; store the unique identifier in the request... Agent: Cellco Partnership D/b/a Verizon Wireless
20130318347 - Private data sharing system: A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that... Agent:
20130318349 - Processing of communication device signatures for use in securing nomadic electronic transactions: A method for execution in a communication device, which comprises receiving a first data set and a second data set over a first communication path; receiving a series of requests over local communication path different from the first communication path; responding to a first one of the requests by releasing... Agent: Bce Inc.
20130318351 - Similarity degree calculation system, similarity degree calculation apparatus, computer program, and similarity degree calculation method: Based on an encrypted feature vector (comparison ciphertext) encrypted with a public key of a decryption apparatus and an encrypted feature vector (target ciphertext) encrypted with the public key of the decryption apparatus, and a random number (temporary key) generated by a random number generation unit (temporary key generation unit),... Agent: Mitsubishi Electric Corporation
20130318348 - System and method for processing transactions: Embodiments of the invention include methods, systems, and computer-readable media for processing transactions involving sensitive information, such as a credit card number. Embodiments include a first server authenticating a second server based on a security token and determining whether the security token is expired. Based on the results, the first... Agent:
20130318352 - Communication setup method and wireless connection device: A method of setting up wireless communication between a client device and a wireless connection device, the method including: establishing non-limited, temporary communication between devices; obtaining an identifier assigned to a client device or an identifier assigned to connection between the client device and a wireless connection device; limiting a... Agent: Buffalo Inc.
20130318353 - Method for creating and installing a digital certificate: The invention comprises a method of creating a certificate based on the contents of another certificate. The certificate is then automatically installed and configured on the server where it will be used. A further enhancement automatically requests and installs the certificate prior to an existing certificate's expiration.... Agent: Digicert, Inc.
20130318354 - Method for generating a certificate: The invention relates to a method for generating a certificate for signing electronic documents by means of an ID token (106), having the following steps: —sending (201) a transaction request for a user to carry out a transaction, —as a result of the sending of the transaction request, a check... Agent: Bundesdruckerei Gmbh
20130318355 - Method for managing content on a secure element connected to an equipment: The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the... Agent: Gemalto Sa
20130318356 - Distribution of digital content protected by watermark-generating password: A receiver receives digital content scrambled using a control word and a user code for the scrambled content. A user inputs the user code that is forwarded to a code extractor that generates the control word and a user identifier from it. The control word is sent to a descrambler,... Agent: Thomson Licensing
20130318357 - System and method for secure software update: A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a... Agent: Siemens Health Care Diagnostics Inc.
20130318358 - Apparatus for generating secure key using device and user authentication information: A secure key generating apparatus comprising an ID calculating unit receiving a primitive ID from a first storage device and calculating a first media ID, (a unique identifier of the first storage device), from the first primitive ID; a user authentication information providing unit providing user authentication information for authenticating... Agent:
20130318359 - Systems and methods for verifying uniqueness in anonymous authentication: A method for anonymous authentication by an electronic device is described. The method includes obtaining biometric data. The method also includes generating a token. The method also includes blinding the token to produce a blinded token. The method also includes sending the blinded token and biometric information based on the... Agent: Partnet, Inc.
20130318360 - Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium: A computing apparatus outputs τ1 and τ2 corresponding to a ciphertext x, a capability providing apparatus uses τ1 to correctly compute f(τ1) with a probability greater than a certain probability and sets the result of the computation as z1, uses τ2 to correctly compute f(τ2) with a probability greater than... Agent: Nippon Telegraph And Telephone Corporation
20130318361 - Encrypting and storing biometric information on a storage device: A method for encrypting biometric information by an electronic device is described. The method includes obtaining biometric data. The method also includes generating a biometric template based on the biometric data. The method also includes encrypting the biometric template. The method also includes sending the encrypted biometric template to a... Agent: Partnet, Inc.
20130318362 - Logical-to-physical address translation for a removable data storage device: A method for making memory more reliable involves accessing data stored in a removable storage device by translating a logical memory address provided by a host digital device to a physical memory address in the device. A logical memory address is received from the host digital device. The logical memory... Agent: Imation Corp.
20130318363 - Security system for code dump protection and method thereof: A security system for code dump protection includes a storage device, a processor, and a decryption unit. The storage device has a protected storage area storing at least an encrypted code segment. The processor is utilized for issuing at least one address pattern to the storage device for obtaining at... Agent: Mediatek Inc.
20130318365 - Cloud server system: A cloud server system may include a power module, a plurality of first connectors, at least one computer module including a second connector detachably electrically plugged into one of the each first connectors for receiving operational power, and a detection circuit configured to detect whether the first connector is electrically... Agent:
20130318366 - Dual frequency control of buck-boost regulator with a pass through band: Dual frequency control of first and second pairs of switches of a buck-boost regulator with pass through band is disclosed. In buck and boost modes respectively a first pair of the switches is operated at high frequency and a second pair of the switches is operated at low frequency. In... Agent:
20130318369 - Information processing apparatus, power supply control method, program and power supply control system: There is provided an information processing apparatus including a first connection unit with power supply type information, a second connection unit with power supply type information, a connection state determination unit for determining whether the connection states of the first and second connection units have changed, a power supply identification... Agent: Sony Corporation
20130318367 - Method and apparatus for thermal sensitivity based dynamic power control: A method and system provides dynamic power control based on thermal sensitivity of a processor system. The method and system includes a circuit that reduces the clock frequency for the processor system in response, to thermal characteristics satisfying a pre-determined threshold that allows maximal thermal temperature limit utilization without substantially... Agent: Intel Corporation
20130318370 - Middleware power management: A system can include multiple devices each configured to run an application at an application level and each having varying performance, power, and other capabilities. A middleware power management facility spanning each of the devices can transfer applications from one device to another responsive to a determination based on capabilities... Agent: Intel Corporation
20130318368 - Power management system and method for server: A power management system includes a number of motherboards, a power supply unit, a number of first electronic switches coupled to the motherboards respectively, and a processor. The power supply unit includes first and second power units. First terminals of the first electronic switches are coupled to the second power... Agent: Hong Fu Jin Precision Industry (shenzhen) Co., Ltd
20130318364 - Processor noise mitigation using differential critical path monitoring: An approach for power supply noise mitigation on a processor is provided. In one aspect, the approach comprises a central computing unit operatively coupled to the processor to execute program operations. The approach further comprises a calibration circuit adapted to determine a first threshold on the processor to be used... Agent: International Business Machines Corporation
20130318376 - Data processing system having power capping function in response to output state of power supply module: A data processing system includes a plurality of power supply modules each having a comparing unit for comparing an output-current value supplied to a computer with a threshold value, the plurality of power supply modules continue the comparison when the output-current value is equal to or less than the threshold... Agent: Hitachi, Ltd.
20130318373 - Distribution of tasks among asymmetric processing elements: Techniques to control power and processing among a plurality of asymmetric cores. In one embodiment, one or more asymmetric cores are power managed to migrate processes or threads among a plurality of cores according to the performance and power needs of the system... Agent:
20130318374 - Distribution of tasks among asymmetric processing elements: Techniques to control power and processing among a plurality of asymmetric cores. In one embodiment, one or more asymmetric cores are power managed to migrate processes or threads among a plurality of cores according to the performance and power needs of the system... Agent:
20130318372 - Dynamic load step calculation for load line adjustment: A method of controlling voltage in a circuit is provided. Within the circuit, a block of an electrical component provides an indication that it desires to switch states (such as from off to on, on to off, or from one speed to another). The change in states requires a different... Agent: Advanced Micro Devices, Inc.
20130318377 - Information processor, computer program product, and power saving setting method: According to one embodiment, information processor includes: setting module; processor; monitoring module; analyzer; and notification module. The setting module specifies first value as first power saving function. The processor controls modules in accordance with the first value. The monitoring module accumulates in storage device information indicating usage of the modules... Agent: Kabushiki Kaisha Toshiba
20130318375 - Program executing method: A program executing method is executed by a computer and includes calculating a first power consumption for execution of a first program described by first code; calculating a second power consumption for execution of a second program of a function identical to that of the first program and described by... Agent: Fujitsu Limited
20130318379 - Scheduling tasks among processor cores: Embodiments of apparatus, computer-implemented methods, computing devices, systems, and computer-readable media (transitory and non-transitory) are described herein for scheduling a plurality of tasks among a plurality of processor cores. A first processor core of a plurality of processor cores of a computing device may be transitioned to a shielded state,... Agent:
20130318378 - Self-contained method and device for managing a first electronic apparatus: Disclosed herein is a self-contained method and device for managing a first electronic apparatus. Said first electronic apparatus is, in particular, a first electronic multimedia apparatus connected via an HDMI interface to a second electronic apparatus consisting of a playback apparatus. A self-contained method for managing a first electronic apparatus... Agent: Orange
20130318371 - Systems and methods for dynamic power allocation in an information handling system environment: Systems and methods are disclosed that may be implemented to dynamically allocate relative power consumption between a group of multiple information handling system nodes that share a common (e.g., capacity-limited) power supply or source of power. The relative power consumption of the multiple information handling system nodes may be adjusted... Agent:
20130318381 - Electronic apparatus and start method for electronic apparatus: According to one embodiment, an apparatus includes a manager configured to perform power management for the apparatus corresponding to a normal mode and a power saving mode configured to consume less electrical power than in the normal mode, a processor configured to execute one of a first program and at... Agent: Kabushiki Kaisha Toshiba
20130318380 - Handling of wake-up messages in controller area networks: Systems and methods for handling wake-up messages in a Controller Area Network (CAN) are described. In some embodiments, a method may include operating a CAN controller in a selected one of a plurality of operating modes in response to the detection of an event or activity on a CAN bus.... Agent: Freescale Semiconductor, Inc.
20130318383 - Information processing apparatus, method for controlling information processing apparatus, and recording medium: An information processing apparatus operating in a first power state, a second power state, a third power state, and fourth power state includes a power control unit configured to the third power state to the fourth power state when a first shift time is measured, and a control unit configured... Agent: Canon Kabushiki Kaisha
20130318385 - Method for performing power management in an active optical cable (aoc): An active optical cable is provided that incorporates a power management solution. The AOC has plugs are configured to mate with respective USB sockets. The AOC is used to interconnect a USB host with a USB device. To the USB host and to the USB device, the AOC appears to... Agent: Avago Technologies GeneralIP(singapore) Pte. Ltd.
20130318382 - Power management apparatus, image forming apparatus and power management method: A sleep mode in which power consumption is reduced to a prescribed value or smaller is achieved, while convenience for a user is maintained by shortening the time taken to recover from the sleep mode. The temperature of an LSI is measured or estimated when shifting to the sleep mode,... Agent: Canon Kabushiki Kaisha
20130318384 - Power management apparatus, image forming apparatus and power management method: A sleep mode in which power consumption is reduced to a prescribed value or smaller is achieved, while convenience for a user is maintained by shortening the time taken to recover from the sleep mode. The temperature of an LSI is measured or estimated when shifting to the sleep mode,... Agent: Canon Kabushiki Kaisha
20130318386 - System and method of modifying power use within an information handling system: A system and method of modifying power use within an information handling system is disclosed. In one form, a method of managing power within an information handling system is disclosed. The method can include establishing a threshold power level of a first information handling system, and detecting a first power... Agent:
20130318387 - Distributed power delivery scheme for on-die voltage scaling: A high-speed low dropout (HS-LDO) voltage regulation circuit suitable to enable a power gate unit to produce a variable voltage signal based on the load of a processor is disclosed herein. In various embodiments, selection logic may dynamically enable or disable the HS-LDO circuit to allow the power gate unit... Agent:
20130318388 - Method and system for computing energy rating for cloud-based software services: A method for computing the energy rating for cloud-based software services is disclosed. For each of the service, following steps are performed. The method includes identifying configuration parameters impacting the energy consumption. The method further includes determining a value for each configuration parameter. Further, the method includes determining a relative... Agent: Xerox Corporation
20130318389 - Power supply management system and method: A power supply management system includes a number of motherboards, a number of power supply units (PSUs), a number of sampling units, and a processor. Each sampling unit is being coupled between a motherboard and a PSU, and outputting a signal as to a normal or abnormal power supply. Thus... Agent:
20130318390 - Information processing apparatus, method of measuring delay difference, and computer readable recording medium recorded with delay difference measuring program: Each of the plurality of second processing units includes: a counter that counts a count value in synchronization with such a counter included in each remaining second processing unit; a register that holds the count value of the counter; and a control unit that stores the count value, which is... Agent: Fujitsu Limited11/21/2013 > 59 patent applications in 31 patent subcategories.
20130311761 - Intelligently loading legacy option roms in a computing system: Intelligently loading legacy option ROMs in a computing system, including: generating, by a legacy option ROM manager, an inventory for the computing system, wherein the inventory for the computing system identifies one or more devices in the computing system; determining, by the legacy option ROM manager for each option ROM... Agent: International Business Machines Corporation
20130311763 - Customizing operating systems: An automation manager configured to manage a plurality of sessions of operating systems implemented in a hypervisor. The automation manager includes a processor and a non-transitory computer-readable storage medium storing computer-readable instructions when executed by the processor cause the automation manager to perform: generating a compact disk image containing customization... Agent: Ca, Inc.
20130311762 - Providing user access to specific programs and documents before the booting process is completed: A method, system and computer program product for providing a user access to specific programs and documents before a booting process is completed. A quick start list is generated containing a list of programs and documents that are to be provided priority in initialization during the booting process. A post-quick... Agent: International Business Machines Corporation
20130311765 - Information processing apparatus, data generation method, information processing method, and information processing system: A differencing generator generates difference data between a first data set and a second data set. An encryption unit encrypts data. An electronic signature generator generates the electronic signature of data. A transmission data generator generates transmission data. The encryption unit encrypts the difference data generated by the differencing generator... Agent: Sony Computer Entertainment Inc.
20130311764 - System for protection and authentication of location services with distributed security: Generally, this disclosure provides methods and apparatus for the protection and authentication of location services based on a distributed security system. The method may include exchanging security keys between a secure location processor (SLP) and a location requesting entity, the location requesting entity external to the SLP; obtaining location determination... Agent:
20130311766 - Establishing network security using internet protocol security policies: Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from... Agent:
20130311767 - System and method employing an agile network protocol for secure communications using secure domain names: A method and system are used to transparently create an encrypted communications channel between a client device and a target device. Audio video communications between the client device and the target device are allowed over the encrypted communications channel once the encrypted communications channel is created. The method comprises: (1)... Agent: Virnetx, Inc.
20130311769 - Public key encryption of access credentials and content data contained in a message: A method of sending data securely from a client computing device to a server computing device, the client computing device being arranged to store a public encryption key associated with the server computing device and being associated with a user, the user being a registered user on the server computing... Agent: Electronic Shipping Solutions Ltd
20130311768 - Secure authentication of a user using a mobile device: A computer-readable medium embodies a computer program for authenticating a user. The computer program comprises computer-readable program code for: generating a first message including an identifier for a session, sending the first message through an interface associated with the session, receiving a response message including the identifier for the session,... Agent:
20130311770 - Tracing device and method: A tracing method performed by a traceability device for validating a process having a purity of steps. During at least one step of the process, there is a step of receiving a marking message sent by a marking device; and a step of determining a new fingerprint as a function... Agent: Oridao
20130311772 - Non-pki digital signatures and information notary public in the cloud: A digital signature is applied to digital documents/information. In certain instances, juridically strong digital signatures are achieved. Cloud computing technologies may be used to aid in the production of the cryptographically secure, authenticated digital signatures. Digital signatures may be produced with a digital notarization. The techniques of generating a digital... Agent: Zenerji LLC
20130311771 - Subscriber certificate provisioning: Provisioning a device with a certificate is contemplated. The certificate may be used to verify whether the device or a user of the device is authorized to access electronic content, services, and signaling. The certificate may be provisioned in relation to the device having successfully completed a two-factor authentication process... Agent: Cable Television Laboratories, Inc.
20130311773 - Secure credential store: A credential store provides for secure storage of credentials. A credential stored in the credential store is encrypted with the public key of a user owning the credential. A first user may provide a credential owned by the first user to a second user. The first user may add credentials... Agent: Bladelogic, Inc.
20130311774 - System and method employing an agile network protocol for secure communications using secure domain names: A system and method connect a first network device and a second network device by initiating a secure communication link. The system includes one or more servers configured to: receive, from the first network device, a request to look up a network address of the second network device based on... Agent: Virnetx, Inc.
20130311775 - Method and system for unified mobile content protection: Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server (MPS) encrypts media content and publishes and stores it on a content delivery server (CDS), such as a server in a content... Agent: Azuki Systems, Inc.
20130311776 - Methods and apparatus to measure exposure to streaming media: Methods and apparatus to measure exposure to streaming media are described. An example method includes identifying metadata from media. The media is converted into converted media having a streaming format. The converted media is encrypted using an encryption key. A manifest is created in association with the converted media, the... Agent:
20130311777 - Symmetric key distribution framework for the internet: A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server... Agent:
20130311778 - System and method for secure cloud service delivery with prioritized services in a network environment: An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more... Agent: Cisco Technology, Inc.
20130311779 - Assisted certificate enrollment: A certificate enrolment assistant module may be provided to inject a challenge password into a certificate signing request to be sent, to a Certificate Authority, from a computing device. The certificate enrolment assistant module, thereby, acts as a trusted proxy to assist the computing device in building a valid certificate... Agent: Blackberry Limited
20130311781 - Apparatus and method for content encryption and decryption based on storage device id: An apparatus and method for encrypting content based on an identifier (ID) of a storage device and a decrypting apparatus and method corresponding thereto. The content recording device includes a storage device interface to receive a first primitive ID and a second primitive ID to identify first and second portions... Agent:
20130311780 - Methods and apparatus to measure exposure to streaming media: Methods and apparatus to measure exposure to streaming media are disclosed herein. An example method includes identifying metadata from media. The media is converted into converted media having a streaming format. The converted media is encrypted using an encryption key. A manifest is created in association with the converted media,... Agent:
20130311783 - Mobile radio device-operated authentication system using asymmetric encryption: An approach for signing messages and checking the authenticity of the sender at the receiver is disclosed. For this purpose, a mobile communication network is expanded by a signature function. The transmitted message packet comprises the message and a signature of the message encrypted with a secret key. The mobile... Agent: Siemens Aktiengesellschaft
20130311782 - Packet validation using watermarks: Methods and systems are disclosed for providing secure transmissions across a network comprising a transmitting device and a receiving device. At the transmitting device, a stream of watermark bits is generated. Next, a plurality of watermarks is generated, each of the plurality of watermarks comprising an index number and a... Agent: Google Inc.
20130311784 - System and method for preventing unauthorized access to information: An authentication system protects a hardware cryptographic chip from being commanded to decrypt or sign data by someone other than the legitimate owner(s) of the certificate residing on the chip. Openness of present cryptographic hardware systems are limited by imposing a condition that the cryptographic chip will only perform critical... Agent:
20130311786 - Cryptographic key attack mitigation: Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are... Agent: Microsoft Corporation
20130311787 - Methods and apparatus for efficient computation of one-way chains in cryptographic applications: Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length s having positions i=1, 2, . . . s each having a corresponding value vi associated therewith, wherein the value... Agent:
20130311785 - System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services: In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored are written into data chunks. The method includes generating an encryption key associated with a first archive... Agent: Commvault Systems, Inc.
20130311788 - System providing an improved skimming resistance for an electronic identity document: The invention relates to a secured identity document (1), comprising: —an externally readable chip (2) storing a cryptographic configuration of the chip for establishing a secure communication with a controlling terminal, storing a private key of a cryptography key pair and adapted to cipher data based on the stored private... Agent:
20130311789 - Block-level data storage security system: A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable... Agent: Unisys Corporation
20130311790 - Secure three-dimensional mask-programmed read-only memory: A secure three-dimensional mask-programmed read-only memory (3Dm-ROMS) comprises a 3Dm-ROM for storing mass information, a non-mask-programmed memory (NMP) for storing at least a key and an encryption logic for encrypting selected data from said mass information with said key. Because different 3Dm-ROMS devices from a same 3Dm-ROMS batch are encrypted... Agent: Chengdu HaicunIPTechnology LLC
20130311791 - Method and device for providing a cryptographic key for a field device: A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which, when a physical manipulation carried out on the field device is detected, a manipulation message is... Agent: Siemens Aktiengelsellschaft
20130311793 - Data switch with power budgeting: A controller of a data switch determines a power budget based upon respective capacities of power supplies coupled thereto. Operating power is allocated to requesting network devices in accordance with the power budget. The power budget can be re-determined periodically, in response to changes in operating temperature, or in accord... Agent:
20130311796 - Intelligent power controller: A method, apparatus, and system in which an interconnect for an integrated circuit communicates transactions between one or more initiator Intellectual Property (IP) cores and one or more target IP cores coupled to the interconnect, including a power manager having a hierarchy of two or more layers including a hardware... Agent: Sonics, Inc.
20130311795 - Power supply management system and method for server: A management system includes two motherboards assigned with different identities, a complex programmable logic device (CPLD), and a switch unit. Each motherboard includes a baseboard management controller (BMC) employed to receive a control signal from a client. The BMC outputs an operation signal corresponding to the control signal and an... Agent: Hong Fu Precision Industry (shenzhen) Co., Ltd.
20130311794 - System and method for dynamic battery current load management in a portable computing device: Various embodiments of methods and systems for managing battery capacity in a portable computing device (“PCD”) are disclosed. One such method includes leveraging a request/grant algorithm that receives a request from an offline component to come online. If battery capacity is available to accommodate the offline component, the request is... Agent: Qualcomm Incorporated
20130311792 - Voltage scaling architecture on system-on-chip platform: The subject matter of this application is embodied in an apparatus that includes a data processor, and at least one hardware monitor to measure circuit delays associated with the data processor and a power supply to provide power to the data processor. The apparatus also includes a voltage regulator to... Agent:
20130311797 - Method and system for advance wakeup from low-power sleep states: A system and method for power management by providing advance notice of events. The method includes snooping a register of an operating system timer to determine a timer period associated with a scheduled event. A unit of a computer system is identified that is in a low power state. A... Agent: Nvidia Corporation
20130311798 - System and method for providing wireless power feedback in a wireless power delivery system: A wireless power delivery system includes a wireless power source and a control module. The wireless power source provides power to an information handling system. The control module is in communication with the wireless power source, and is configured to detect a presence signal from the information handling system, to... Agent: Dell Products, Lp
20130311803 - Energy-saving device and method for portable terminal: An energy-saving apparatus and method for a portable terminal are disclosed in the present document. The apparatus includes: an electricity meter module, configured to detect battery power consumption parameters under driving of a data acquisition module; the data acquisition module, configured to drive the detection of the electricity meter module,... Agent: Zte Corporation
20130311800 - Information processing system and method, and non-transitory computer readable medium: An information processing system includes an obtaining unit, a specifying unit, and an output unit. The obtaining unit obtains information indicating a state of the use of each of plural electrical apparatuses. The specifying unit specifies a power supply-and-receive relationship between the plural electrical apparatuses, on the basis of a... Agent: Fuji Xerox Co., Ltd.
20130311802 - Maintaining processor context before entering power saving mode: A CPU automatically preserves the CPU context in a computer memory that remains powered-up when the CPU is powered down in sleep mode. By means of the preserved CPU context, the CPU is able to instantly and transparently resume program execution at the instruction of the program that was asserted... Agent:
20130311804 - Master slave qpi protocol for coordinated idle power management in glueless and clustered systems: Methods, apparatus, and systems for implementing coordinated idle power management in glueless and clustered systems. Components for facilitating coordination of package idle power state between sockets in a glueless system such as a server platform include a master entity in one socket (i.e., processor) and a slave entity in each... Agent:
20130311801 - Method and apparatus for controlling power consumption: A method of controlling power consumption of a portable device includes monitoring whether the portable device has connected to a docking station; and selecting and executing one of a plurality of power consumption controlling algorithms according to a monitoring result.... Agent: Samsung Electronics Co., Ltd.
20130311799 - Weighted control in a voltage scaling system: The subject matter of this application is embodied in an apparatus that includes a data processor, and two or more hardware monitors to measure parameters associated with the data processor. The apparatus also features a power supply to provide power to the data processor and the hardware monitors, and a... Agent:
20130311806 - Parallel processing computer systems with reduced power consumption and methods for providing the same: A parallel processing computing system includes an ordered set of m memory banks and a processor core. The ordered set of m memory banks includes a first and a last memory bank, wherein m is an integer greater than 1. The processor core implements n virtual processors, a pipeline having... Agent: Cognitive Electronics, Inc.
20130311805 - System-wide time synchronization across power management interfaces and sensor data: A power management control system for an information handling system is disclosed. The power management control system includes a power management interface bus interfacing a plurality of devices, where one or more of the devices is each associated with a time clock. The power management control system further includes a... Agent:
20130311807 - Display apparatus and power saving method thereof: Disclosed are a display apparatus and a power saving method thereof. The power saving method of a display apparatus includes acquiring an image by photographing surroundings of the display apparatus, detecting a human body region contained in the image by analyzing the acquired image, and entering a power saving mode... Agent: Lg Innotek Co., Ltd.
20130311808 - Platform and processor power management: The present invention relates to platform power management.... Agent:
20130311809 - Reduced power state network processing: Technologies for reduced power network processing include a main processor, a low-power co-processor, and a network interface controller. The network interface controller receives one or more network packets while the computing device is in a sleep state, filters the one or more network packets to identify network packets to be... Agent:
20130311810 - Browsing terminal, charging terminal, and communication system as well as transmitting/receiving system using the same: To provide a browsing terminal and the like with high security, which can effectively prevent contents data stored in a terminal from being stolen unlawfully by a third party even if the terminal is accidentally lost. The browsing terminal includes: a receiving part for receiving contents data; a volatile memory... Agent: Nlt Technologies, Ltd.
20130311811 - Power shifting in multicore platforms by varying smt levels: Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading... Agent: International Business Machines
20130311812 - Power shifting in multicore platforms by varying smt levels: Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading... Agent: International Business Machines
20130311813 - Method and apparatus for performing clock extraction: A method and apparatus for performing clock extraction are provided. The method includes: performing edge analysis on a Training Sequence Equalization (TSEQ) pattern carried by a set of received signals that are received from a Universal Serial Bus (USB) port of an electronic device, to dynamically generate a plurality of... Agent: Silicon Motion Inc.
20130311814 - Constant frequency architectural timer in a dynamic clock domain: Implementations of the present disclosure involve an apparatus and/or method for providing a constant frequency timer signal for a microprocessor that operates with varying core clock signals. The apparatus and/or method utilizes a code generator, such as a gray code generator, operating on a reference clock signal that allows the... Agent: Oracle International Corporation
20130311815 - Providing adaptive frequency control for a processor: In one embodiment, the present invention includes a method for receiving utilization data from thread units of one or more processor cores, determining an operating frequency for a core clock signal based on the utilization data, a target utilization value, and an operating mode of the processor, and generating the... Agent:
20130311816 - Circuit and method for controllably delaying an input signal, and microscope, and method for controlling a microscope: A circuit for delaying an input signal includes first and second delay units. The input signal is switched to the first delay unit which is configured to delay the input signal by k cycles of a first clock signal so as to generate a value xt—k and transfer the input... Agent: Leica Microsystems Cms Gmbh
20130311817 - Scalable, common reference-clocking architecture using a separate, single clock source for blade and rack servers: Scalable, common reference-clocking architecture and method for blade and rack servers. A common reference clock source is configured to provide synchronized clock input signals to a plurality of blades in a blade server or servers in a rack server. The reference clock signals are then used for clock operations related... Agent:
20130311818 - Methods and apparatuses for master-slave detection: Apparatuses, master-slave detect circuits, memories, and methods are disclosed. One such method includes performing a master detect phase during which a memory unit in a memory group is determined to be a master memory unit, determining at each memory unit its location relative to other memory units, and determining at... Agent: Micron Technology, Inc.
20130311819 - Controller: This controller is used in a system in which initiators and targets are connected via distributed buses to control transmission timing of an access request received from the initiators. The controller stores intermittent information including information about an intermittent period in which interference between packets can be restricted and bus... Agent: Panasonic Corporation11/14/2013 > 55 patent applications in 29 patent subcategories.
20130305028 - Method and apparatus for authorizing host to access portable storage device: A method and apparatus for authorizing a host to access a portable storage device and a method and apparatus of providing information for authorizing a host to access a portable storage device. The method includes: verifying integrity of host software requesting to transmit data; determining whether the host is authorized... Agent:
20130305029 - Method for automatic start up of a communication terminal configured for voice communication on a communication terminal configured for text communication: In the case of a method or an arrangement for the automatic start up of a first communication terminal (EG A, EG B) configured for voice communication on at least one second communication terminal (CL A, CL B) configured for text communication, the voice communication between communication terminals is conveyed... Agent:
20130305025 - Method for dynamic loading of operating systems on bootable devices: A method for booting is provided. A devices manager of a host operating system residing on a host machine (or a boot loader) disables resources of one or more bootable devices having resource conflicts. The device manager enables resources required by one of the one or more bootable device. The... Agent:
20130305027 - Multi-bios circuit and switching method between multiple bios chips: The present invention relates to a multi-BIOS circuit and a BIOS switching method accomplished through the circuit. The multi-BIOS circuit comprises at least two BIOS chips, a SPI Select chip is disposed between the BIOS chips and a Southbridge chip, the BIOS chips are connected to the SPI Select chip... Agent: Celestica Technology Consultancy (shanghai) Co., Ltd.
20130305026 - System and method for input tool invocation and proxy device: A system and a method for input tool invocation and a proxy device enable an installable operating system to perform input operation by invoking the input tool of a local operating system, such as a soft keyboard of the local operating system, an input method of the local operating system,... Agent: China Mobile Communications Corporation
20130305031 - Digital control device and execution method thereof: In a digital control device, when a normal mode for carrying out a normal process is selected by a mode switch, a computation unit transfers base process code and APL process code which controls the normal process from a code storage device to a main memory, loads the base process... Agent: Kabushiki Kaisha Toshiba
20130305030 - Testing a configuration change: An approach is presented for testing a change (i.e., configuration change) in a configuration of a computing environment. A user identifier (ID) of a user is received from an administrative user having an administrative user ID. First configurable attributes of the user ID are determined. A temporary simulation user ID... Agent: International Business Machines Corporation
20130305032 - Anonymization of data within a streams environment: Streams applications may decrypt encrypted data even though the decrypted data is not used by an operator. Operator properties are defined to permit decryption of data within the operator based on a number of criteria. By limiting the number of operators that decrypt encrypted data, the anonymous nature of the... Agent: International Business Machines Corporation
20130305034 - Anonymization of data within a streams environment: Streams applications may decrypt encrypted data even though the decrypted data is not used by an operator. Operator properties are defined to permit decryption of data within the operator based on a number of criteria. By limiting the number of operators that decrypt encrypted data, the anonymous nature of the... Agent: International Business Machines Corporation
20130305033 - Data encryption method: A method performed by a computing system. Embodiments of the method include shifting source data by a shift amount and encrypting the shifted data with an encryption key to produce encrypted data. An encryption package is produced by removing a portion of the encrypted data. Decryption data is generated that... Agent:
20130305035 - Virtual transportation point of sale: Embodiments provided herein include techniques for enabling a mobile device to communicate with smart media in a manner that can sidestep the secure element of the mobile device—and the costs associated with it. The mobile device can communicate with the smart media using near-field communication (NFC) by creating an encrypted... Agent:
20130305036 - Tls abbreviated session identifier protocol: A method, system and computer program product related to an authentication security protocol, which associates a unique Abbreviated Session Identifier (ASI) with some application data packets transmitted, for example, from a client to a server. The present technology can be a modified version of the Transport Layer Security (TLS) protocol.... Agent: Sierra Wireless, Inc.
20130305037 - Method and apparatus for accelerating connections in a cloud network: Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission of encrypted data from an application server uses an encryption scheme that encrypts static data using a first encryption scheme that derives keys from the... Agent: Alcatel-lucent Usa Inc.
20130305038 - Network security load balancing: A website hosting system includes a request routing node and a plurality of security termination nodes coupled to the request routing node. Each security termination node is configured to secure connections between servers hosting websites and customers of the websites in accordance with a predetermined quality of service level. The... Agent: Volusion, Inc.
20130305039 - Cloud file system: A cloud storage system supporting user agnostic encryption and deduplication of encrypted files is described. Further the cloud storage system enables users to share a file, a group of files, or an entire file system with other users without a user sending each file to the other users. The cloud... Agent:
20130305040 - Secure messaging by key generation information transfer: A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the first device, and receive, via the secure connection with the first device, a set of parameters from the first device.... Agent: Verizon Patent And Licensing Inc.
20130305041 - Method, device, and system of secure entry and handling of passwords: Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A server includes: an authentication module to send, to a remote client device, a... Agent:
20130305042 - System and method for issuing digital certificate using encrypted image: The disclosure relates to a system and method for issuing a digital certificate using an encrypted image, in which a digital certificate is sealed in a digital envelope image so as to protect a digital certificate user from damages caused by hacking, phishing attacks and the like in the course... Agent:
20130305043 - System and methods to perform public key infrastructure (pki) operations in vehicle networks using one-way communications infrastructure: A set of certificate management methods designed to significantly reduce or eliminate reliance on infrastructure network connectivity after vehicles are sold uses techniques to support certificate management operations in order to reduce the frequency which vehicles need to communicate with the Certificate Authorities (CAs) and the amount of data that... Agent:
20130305044 - Geothentication based on new network packet structure: A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting... Agent: The Boeing Company
20130305045 - Indiscriminate virtual containers for prioritized content-object distribution: A system may be provided for dynamically serving a content file with embedded content objects over the Internet to an end user system. A content object request function may receive a request for a webpage defined by the content file, the content file comprising embedded content objects. A content-file modifier... Agent:
20130305047 - Method, and device and system for unlocking terminal by operator: The disclosure provides a method, device and system for unlocking a mobile terminal by an operator. The method includes the following steps. An operator device receives an unlocking request from the mobile terminal, wherein the unlocking request carries unlocking identification information; the operator device determines to allow the mobile terminal... Agent: Zte Corporation
20130305048 - Methods and apparatuses for distributing keys for ptp protocol: The present invention provides a solution of automatically distributing PIP keys, and on that basis, provides a new encryption method. A domain control device is proposed to verify whether a network node is an eligible node in the domain; if the network node is an eligible node in the domain,... Agent: Alcatel-lucent
20130305046 - System and method for virtual machine data protection in a public cloud: According to one embodiment of the present disclosure, a method includes partitioning a disk image file into a plurality of segments. The method also includes generating a unique key for each segment, storing the unique keys in an image mapping file, and transmitting the image mapping file to a particular... Agent: Computer Associates Think, Inc.
20130305049 - Secure message transfer and storage: Messages are transmitted from a computer sending device to a first main server. The first main server splits the message into a plurality of message parts and the plurality of message parts is transmitted to a plurality of parallel file servers. The message parts are stored in the file servers... Agent: Ojooo Gmbh
20130305050 - Method and system for establishing trust between a service provider and a client of the service provider: Trust is established between a service provider (20) and a client (10) of the service provider (20). The client (10) is associated with a party that is known by an identity provider (50), and the identity provider (50) is trusted by the service provider (20). The identity provider (50) contacts... Agent: Visa Europe Limited
20130305051 - Methods and systems for server-side key generation: Systems and methods for generating credentials are described. A subject private key that has been encrypted with a session key and a subject public key are received. A storage session key is generated and the subject private key is encrypted with the storage session key. A storage private key is... Agent:
20130305052 - System and method for obtaining and sharing media content: A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device. The license request and the timeout indicator may be combined to form a device license for the personal media device. The... Agent:
20130305053 - Systems, methods, and apparatus to authenticate communications modules: In one implementation, a communications module includes a host interface, a communications link interface, a memory, and a processor operatively coupled to the host interface, to the communications link interface, and to the memory. The memory includes a signature based on a data set and a private key of a... Agent:
20130305054 - Truly anonymous cloud key broker: Embodiments of systems and methods for providing anonymous cloud encryption are provided. One embodiment of a method for providing anonymous cloud encryption includes communicating an anonymizing token to a key broker. Additionally, the method may include communicating at least one encryption key associated with the anonymizing token to the key... Agent:
20130305055 - Biometric identification method: A biometric and cryptographic processing unit includes a biometric receiver receiving biometric information of a BCU user. A biometric unit of the BCU has a store of biometric information of an authorized BCU user and compares received biometric information with the stored biometric information to determine if the user is... Agent:
20130305056 - In-circuit security system and methods for controlling access to and use of sensitive data: The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as... Agent: Privaris, Inc.
20130305059 - Airport security check system and method therefor: A decryption system for decrypting user identification information encrypted on a storage device associated with a user identity document is disclosed. The system comprises: a server configured to collect user identity document data from the user and to construct a token including the user identity document data encoded in a... Agent:
20130305058 - Controlling enterprise data on mobile device via the use of a tag index: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the... Agent: International Business Machines Corporation
20130305057 - Cryptographic erasure of selected encrypted data: Exemplary method, system, and computer program product embodiments for cryptographic erasure of selected encrypted data are provided. In one embodiment, by way of example only, data files are configured with a derived key. The derived keys adapted to be individually shredded in a subsequent erasure operation. The derived key allows... Agent: International Business Machines Corporation
20130305061 - Data storage device and data protection method: A flash memory includes a plurality of blocks. A controller encrypts a first file to produce a first encrypted file and stores the first encrypted file to the flash memory, wherein the controller further comprises a key generation module, an encryption/decryption module and a key eliminating module. The key generation... Agent: Silicon Motion, Inc.
20130305062 - Device and method for protecting a security module from manipulation attempts in a field device: A device for protecting a security module from manipulation attempts in a field device. A control device is configured to control the field device, a security module is configured to provide cryptographic key data which is to be used by the control device, and an interface device is connected to... Agent: Siemens Aktiengesellschaft
20130305060 - Distributed storage network data revision control: Multiple revisions of an encoded data slice are generated, with each revision having the same slice name. Each of the data slices represents the same original data portion, but each is encoded so that no single data slice can be used to reconstruct the original data portion. Appropriate revision numbers... Agent: Cleversafe, Inc.
20130305064 - Allocating and distributing power: Example apparatus and methods to allocate and distribute power are disclosed. An example apparatus includes an availability calculator to determine first and second power allocations based on an available power. The example apparatus includes a distributer to supply a first power to a first device and to supply a second... Agent:
20130305065 - Controller and semiconductor system: A controller is formed as one chip, and controls a voltage regulator that supplies a power supply voltage to a CPU. The controller includes: an input unit for receiving a monitor voltage for monitoring the power supply voltage applied to the CPU; a control unit for detecting that the power... Agent: Renesas Electronics Corporation
20130305063 - Ups device and ups structure with prolonged power supply: An uninterruptible power supply (UPS) device for providing a DC operating power to operate a motherboard is disclosed. The UPS device includes a main power supply system, a backup power supply system and a disable control unit. In a normal condition, the main power supply system converts and outputs a... Agent:
20130305066 - Methods, systems and apparatus for enabling an accessory for use with a host device: Methods, systems, and apparatus for enabling a power path between a power source and a host device via an accessory. A host device may send, to an accessory arranged within the power path, via a first data pin arranged in the host device, a request for an accessory identifier. The... Agent: Apple Inc.
20130305067 - Dynamic management of thermal loads: A method, system, and computer program product for dynamic management of thermal load in a data processing system are provided in the illustrative embodiments. A component of the data processing system is identified whose temperature has reached a temperature threshold, the component forming a critical component. A workload is selected... Agent: International Business Machines Corporation
20130305068 - Leakage variation aware power management for multicore processors: A system and method are provided to improve power efficiency of processor cores, such as processor cores in a multicore processor. A break-even time of a processor core may be determined that affects which power saving mode a processor core should enter when an expected idle of the processor core... Agent: Broadcom Corporation
20130305070 - Data interface power consumption control: Apparatus and techniques relating to data interface power consumption control are disclosed. Components of a data transfer module may be selectively moved between their normal operating states and reduced power states at times when the data transfer module is not to be used for transferring data. Decisions as to particular... Agent:
20130305072 - Host apparatus connected to image forming apparatus and power save mode control method thereof: A method of controlling a power save mode of an image forming apparatus connected to a host apparatus, the method includes: requesting information on a power mode of the image forming apparatus; transmitting the power mode information and information on an entering time for a power save mode of the... Agent: Samsung Electronics Co., Ltd.
20130305069 - Information processing apparatus, control method thereof, and storage medium: An information processing apparatus including a volatile storage unit, and is operated in any of a plurality of modes including a first power mode and a second power mode, power being supplied to the storage unit in the first power mode and the second power mode, power consumption in the... Agent:
20130305071 - System and method for providing dynamic power management: A power management system suitable for dynamically allocating power provided by a selected power source among one or more associated loads and methods for manufacturing and using same. In a normal operation mode, the power source provides power to one or more enabled loads. The selection of loads that are... Agent: Panasonic Avionics Corporation
20130305073 - Controlling methods of optical disc drive and computer system: A controlling method of an optical disc drive includes the following steps. After an optical disc is loaded into the optical disc drive, a start-up procedure is performed to acquire a disc parameter and a disc information of the optical disc. Then, the optical disc drive enters a ready state.... Agent: Philips & Lite-on Digital Solutions Corporation
20130305074 - Protocol for memory power-mode control: In one embodiment, a memory device includes a memory core and input receivers to receive commands and data. The memory device also includes a register to store a value that indicates whether a subset of the input receivers are powered down in response to a control signal. A memory controller... Agent: Rambus Inc.
20130305075 - Generation of energy consumption profiles: The subject matter described herein relates to a system and a method for generation of energy consumption profiles corresponding to a plurality of computing systems. For each of the plurality of the computing systems, a plurality of consumption parameters from at least one measurement device is received. The consumption parameters... Agent: Tata Consultancy Services Limited
20130305076 - Unattended wakeup: Embodiments provide methods and apparatuses delaying unattended wakeup events based on the operating conditions. In one embodiment, the operating conditions may be detected by the computing device while in a first power state, wherein the unattended wakeup event is to transition the computing device to a second power state.... Agent:
20130305077 - Method for sharing a resource and circuit making use of same: A method is provided for interfacing a plurality of processing components with a shared resource. A token signal path is provided to allow propagation of a token through the processing components, wherein possession of the token enables a processing component to conduct a transaction with the shared resource. Token processing... Agent: Octasic Inc.
20130305078 - System on chip (soc), method of operating the soc, and system having the soc: A data processing system, comprising: a PLL configured to receive a reference clock and to generate a common clock; a processing unit configured to output an operation condition data based on one of temperature, voltage, or process information; and at least two data processing circuits, each comprising: a first clock... Agent:
20130305079 - Memory component that samples command/address signals in response to both edges of a clock signal: A memory component has a signaling interface, data input/output (I/O) circuitry and command/address (CA) circuitry. The signaling interface includes an on-die terminated data I/O and an unterminated CA input. The data I/O circuitry is dedicated to sampling write data bits at the data I/O timed by a strobe signal and... Agent:Previous industry: Electrical computers and digital processing systems: processing architectures and instruction processing (e.g., processors)
Next industry: Error detection/correction and fault detection/recovery
RSS FEED for 20131205:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Electrical computers and digital processing systems: support patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Electrical computers and digital processing systems: support patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Electrical computers and digital processing systems: support patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.02528 seconds