Match Document Document Title
US20140095912 Micro-Architectural Energy Monitor Event-Assisted Temperature Sensing  
Methods and apparatus relating to micro-architectural energy monitor event-assisted temperature sensing are described. In one embodiment, at least one of a plurality of slices of a computational...
US20130121489 System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition  
Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured...
US20140075187 SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an...
US20130132721 Method and Apparatus for Providing a Key Certificate in a Tamperproof Manner  
A method and a server are configured to provide, in a tamperproof manner, a key certificate for a public device key of a user device, which is installed for a user, by means of a server belonging...
US20110265172 METHOD AND SYSTEM FOR THIRD PARTY CLIENT AUTHENTICATION  
Methods and systems for third party client authentication of a client. A method includes displaying a user interface on a display of the client, the user interface including an option to select a...
US20140149733 SYSTEM FOR ENCRYPTING CONTENT NAME  
A system encrypts a name of content stored in a node of a hierarchical structure. A content receiving node encrypts a name of a predetermined node among names of nodes included in a content name,...
US20140164784 INTEGRATED HEALTH CARE SYSTEMS AND METHODS  
Systems and methods described herein may store and analyze patient data sets. A processor in communication with a database may generate a plurality of patient data sets, each of the patient data...
US20130305038 NETWORK SECURITY LOAD BALANCING  
A website hosting system includes a request routing node and a plurality of security termination nodes coupled to the request routing node. Each security termination node is configured to secure...
US20130024697 SYSTEM AND METHOD FOR OBFUSCATION INITIATION VALUES OF A CRYPTOGRAPHY PROTOCOL  
A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client...
US20130046965 SYSTEM AND METHOD OF DERIVING APPROPRIATE TARGET OPERATING ENVIRONMENT  
The present invention relates to a configurable parameter driven system and method for providing an appropriate target operating environment based on user specific needs and enterprise objectives....
US20110251876 ELECTRONIC LOCK BOX SYSTEM WITH INCENTIVIZED FEEDBACK  
An electronic lock box system that includes a central computer, which allows “listing agents” (if used in a real estate sales environment) to custom tailor a survey questionnaire that relates to...
US20150212830 AUTO-WAKING OF A SUSPENDED OS IN A DOCKABLE SYSTEM  
A mobile computing device with a mobile operating system and desktop operating system running concurrently and independently on a shared kernel without virtualization. The mobile operating system...
US20110185166 Slider Control for Security Grouping and Enforcement  
A group of security functions may be configured and managed by organizing the security functions and their features into a ranked list and made available through an administrative console. The...
US20150222517 UNIFORM COMMUNICATION PROTOCOLS FOR COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES  
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can...
US20140032906 CRYPTOGRAPHIC AUTHENTICATION TECHNIQUES FOR MOBILE DEVICES  
A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device regenerates a credential containing a key pair from a PIN and a...
US20140129857 METHOD OF DYNAMICALLY SCALING A POWER LEVEL OF A MICROPROCESSOR  
A method of dynamically scaling a power level of a microprocessor is provided. The method includes: receiving a plurality of workload rates of a microprocessor in a first duration period;...
US20130254534 METHOD OF AND SYSTEM FOR AUTHENTICATING ONLINE READ DIGITAL CONTENT  
A method of authenticating an online read right of a digital content includes: receiving an online read first request from a terminal, the first request including first user information, obtaining...
US20090216552 SYSTEMS AND PROCESSES FOR MAINTAINING ROOFS  
The process for maintaining a roof includes receiving a maintenance request and establishing an account in the database associated with the maintenance request. Next, a contractor is notified of...
US20140289516 PORTABLE DIGITAL VAULT AND LENDING OF SAME  
A portable digital vault and related methods are disclosed that can provide a digital equivalent to the physical act of lending copyrighted content (such as a book or CD) while also providing...
US20130297946 SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an...
US20120151244 Method and System for Precise Temperature and Timebase PPM Error Estimation Using Multiple Timebases  
Methods and systems for precise temperature and timebase ppm error estimation using multiple timebases may comprise measuring a coarse reading of a temperature corresponding to the plurality of...
US20110138196 ROUTER COLLABORATION  
A router system is disclosed. The router system comprises a wireless router and a cradle comprising a router interface configured to receive the router. One or more connections are positioned at...
US20100122082 USER IDENTITY VALIDATION SYSTEM AND METHOD  
An identity validation system and method for the Internet provides user accountability while supporting user privacy to counter SPAM, Internet vandalizers, and predators, as well as cyber bullies...
US20100306552 SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED USE OF DIGITAL CONTENT  
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if...
US20140068314 PORTABLE ELECTRONIC DEVICE AND METHOD FOR MANAGING BATTERY POWER CONSUMPTION  
Terminals, apparatuses and methods for managing battery power consumption in a device, including: one or more battery consumption elements; a battery consumption management device to determine a...
US20110258445 Apparatus and method for signaling enhanced security context for session encryption and integrity keys  
Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving...
US20110179278 APPARATUS AND METHOD OF A PORTABLE TERMINAL AUTHENTICATING ANOTHER PORTABLE TERMINAL  
Provided is an apparatus and method of a portable terminal authenticating another portable terminal. The portable terminal may receive a seed generated by the other portable terminal, issue an...
US20140215218 SECURITY TOKEN AND SERVICE ACCESS SYSTEM  
According to an aspect of the invention, a security token for facilitating access to a remote computing service via a mobile device is conceived, said security token comprising an NFC interface, a...
US20150177289 POWER DETECTOR CIRCUIT  
The present disclosure describes a circuit for managing power and heat. The circuit includes a motherboard voltage regulator to supply a current to a loadline. The circuit includes a sense point...
US20110119155 VERIFICATION OF PORTABLE CONSUMER DEVICES FOR 3-D SECURE SERVICES  
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a...
US20130305071 System and Method for Providing Dynamic Power Management  
A power management system suitable for dynamically allocating power provided by a selected power source among one or more associated loads and methods for manufacturing and using same. In a normal...
US20140143549 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM  
An information processing apparatus includes: a storage unit that stores a tree structure formed by nodes, each of which is stores identification information identifying a document; and a...
US20120303993 METHOD AND APPARATUS FOR IMPROVED POWER EFFICIENCY FOR SERVER PLATFORMS  
In one embodiment, a method includes determining if a power load requirement associated with a server arrangement is below a threshold. The server arrangement includes at least a first power...
US20140201517 METHOD AND SYSTEM FOR DISTRIBUTED OFF-LINE LOGON USING ONE-TIME PASSWORDS  
A method and a system for extending distributed logon services to an off-line computing device includes encrypting, on the off-line computing device, a one-time password (OTP), a nonce, and a...
US20060075250 Touch panel lock and unlock function and hand-held device  
A lock and unlock function triggered by a touch panel of a hand-held device. The hand-held device detects a pattern input from the touch panel, and execute the lock/unlock function to enable or...
US20130116849 SYSTEM AND METHOD FOR REAL-TIME COMPUTATION AND REPORTING OF WELDING MACHINE PERFORMANCE AND METRICS  
A welding or cutting system is provided using a performance module which monitors the real-time performance of a welding or cutting system and displays this information on a user interface on the...
US20120084565 CRYPTOGRAPHIC DEVICE THAT BINDS AN ADDITIONAL AUTHENTICATION FACTOR TO MULTIPLE IDENTITIES  
Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider...
US20150046706 System and Method for Controlling Access to Encrypted Files  
Disclosed are systems, methods and computer program products for controlling access to encrypted files. In one aspect, the system detects a request from an application to access an encrypted file....
US20120166847 BATTERIES FOR ELECTRIC TOOLS  
A battery for an electric tool includes at least one battery cell, a peripheral device operable to detect a battery condition of the at least one battery cell, and a microcomputer communicating...
US20080028230 Biometric authentication proximity card  
A biometric proximity card and an access system cooperating with such card are disclosed. The card has a biometric sensor, and a memory storing a reference biometric datum, for example, a...
US20150121085 Cookie Information Sharing Method and System  
This invention discloses a cookie information sharing method that comprises the following steps: reading cookie information in a parent browser, said parent browser being a browser which stores...
US20140059360 POWER SUPPLIES MANAGEMENT IN AN ANALYTE DEVICE HAVING PRIMARY AND SECONDARY BATTERIES  
Described herein are systems and methods (including system and method) to allow users of analyte monitors to continue to perform analyte measurement tests by using a secondary battery when the...
US20130145167 Optimized Integrity Verification Procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
US20140006791 SYSTEMS AND METHODS USING CRYPTOGRAPHY TO PROTECT SECURE COMPUTING ENVIRONMENTS  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20120166807 Systems and Methods Using Cryptography to Protect Secure Computing Environments  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20110131422 Systems and Methods Using Cryptography to Protect Secure Computing Environments  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20120324231 ATTRIBUTES IN CRYPTOGRAPHIC CREDENTIALS  
Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as...
US20110191573 MULTI-MOTHERBOARD SERVER SYSTEM  
A multi-motherboard server system, having a management board and a plurality of motherboards, is disclosed. The multi-motherboard server system is applicable to a sever system. The management...
US20110219227 AUTOMATED CERTIFICATE MANAGEMENT  
A certificate management system provides automated management of certificate lifecycles and certificate distribution. Rather than depend upon an administrator to manually distribute and manage...
US20130326237 UNINTERRUPTABLE PC POWER UNIT FOR USE IN PERSONAL COMPUTER AND SERVERS  
Uninterruptable PC Power Unit (UPCPU) for a personal computer (PC) replaces the power supply of a PC. The UPCPU comprises an internal battery to be used during AC power interruption. The UPCPU may...