Match Document Document Title
US20140006809 SYSTEM AND METHOD FOR MANAGING BATTERY USAGE OF A MOBILE DEVICE  
A system and method for managing battery usage of a mobile device. The power level of the battery is obtains and compared to a threshold level. When the power level is equal to or less than the...
US20140129834 Providing User Authentication  
In particular embodiments, a user associated with a user account wishes to utilize their computing device to facilitate authentication of their identity. The user may provide a device key to an...
US20100325434 REAL-TIME DELIVERY OF LICENSE FOR PREVIOUSLY STORED ENCRYPTED CONTENT  
Content is stored as ClearText by a content provider within a trusted area. Specific content is requested by an end user, preferably via a service provider, and the requested content is encrypted...
US20130124861 SHIELDING A SENSITIVE FILE  
An apparatus for shielding a sensitive file includes a client computer having various units. An encryption-decryption unit performs a cryptographic operation on the sensitive file with a...
US20120047357 METHODS AND SYSTEMS FOR ENABLING CONTROL TO A HYPERVISOR IN A CLOUD COMPUTING ENVIRONMENT  
A method for enabling control in a cloud computing environment includes initializing a portion of computing resources identified for enabling service to a user system in a cloud computing...
US20140237242 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to systems to indicate and verify the approval of the risk level of a transaction and to...
US20130185565 Efficient, High Volume Digital Signature System for Medical and Business Applications  
The system relates to a method for collecting signatures from pre-validated signers. In one aspect of the method, a pre-validated signer's signature is affixed to an electronic document in an...
US20140344584 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT  
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be...
US20130262874 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT  
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be...
US20110145585 SYSTEM AND METHOD FOR PROVIDING CREDENTIALS  
A method and system is operable to provide credentials by generating a first credential that conforms to a first specified format. A second credential conforming to a second specified format is...
US20140013131 POWER NAPPING TECHNIQUE FOR ACCELERATED NEGATIVE BIAS TEMPERATURE INSTABILITY (NBTI) AND/OR POSITIVE BIAS TEMPERATURE INSTABILITY (PBTI) RECOVERY  
A logic circuit is operated in a normal mode, with a supply voltage coupled to a supply rail of the logic circuit, and with a ground rail of the logic circuit grounded; It is determined that at...
US20120072727 MULTI-ISP CONTROLLED ACCESS TO IP NETWORKS, BASED ON THIRD-PARTY OPERATED UNTRUSTED ACCESS STATIONS  
A mechanism that allows sharing of an existing infrastructure for access to public or private IP networks, such as the public Internet or private LANs is provided. Specifically, infrastructure...
US20110264899 System and Method for Displaying Battery Information  
A system and method are described for displaying battery condition information on a display of a portable computer. After powering on the portable computer, battery condition information of a...
US20120050053 System and Method for Detecting Generator Incipient Failures  
A method, system and computer software for detecting an incipient failure of a generator in a power system including the steps of ascertaining one or more generator reference parameter of the...
US20110258110 Leveraging a Power Distribution System to Provide Establishment Services  
Some embodiments leverage a power distribution system to provide a mobile platform with which establishments can connect to users and provide establishment services to the user. Specifically, the...
US20110087885 METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
US20130212398 METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER  
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously...
US20140122874 Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System  
Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include...
US20110072293 Systems and Methods for Attributing An Amount of Power Consumption To A Workload  
A method for attributing a portion of a level of electrical power consumption by a server to a virtual machine executing on the server, includes determining a level of electrical power consumption...
US20150169026 MANAGING POWER CONSUMPTION AND PERFORMANCE OF COMPUTING SYSTEMS  
A method and system for managing power consumption and performance of computing systems are described herein. The method includes monitoring an overall power consumption of the computing systems...
US20150180931 CONTENT DELIVERY METHODS AND SYSTEMS  
The present invention relates generally to systems and methods for delivering content from content providers to end users using computer networks. Aspects of the invention enable content providers...
US20130205158 DECISION METHOD CONSIDERING TIME AND POWER CONSUMPTION FOR OFFLOADING COMPUTATION AND COMPUTING SYSTEM  
A decision method considering time and power consumption for offloading computations is provided. The method includes: obtaining a computing mission; obtaining a plurality of static effect factors...
US20140075238 SYSTEM AND METHOD FOR INTELLIGENT TIMER SERVICES  
A method is provided for efficiently scheduling timer events within an operating system by allocating a plurality of timers, each of which has an expiry time, to a set of available timer slots....
US20140298067 METHODS AND APPARATUS FOR REDUCING ENERGY CONSUMPTION OF NETWORK EQUIPMENT  
In some embodiments, an equipment unit has a set of visual indicators, a power switch, and a set of compute components. The power switch receives a signal representing a status such that when the...
US20130191643 ESTABLISHING A CHAIN OF TRUST WITHIN A VIRTUAL MACHINE  
According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion...
US20110202766 METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
US20140351599 SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS  
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an...
US20130007448 SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS  
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an...
US20140298017 METHODS AND SYSTEMS FOR BROADCASTING PICTURES  
A method and system for broadcasting pictures across multiple user terminals are provided. The method includes generating a user signature based on information associated with the picture, and...
US20140101438 STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM  
A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE...
US20120159150 SYSTEM AND METHOD FOR IMPLEMENTING AN ENHANCED TRANSPORT LAYER SECURITY PROTOCOL  
A system and method for implementing an enhanced transport layer security (ETLS) protocol is provided. The system includes a primary server, an ETLS servlet and an ETLS software module. The...
US20110131415 MULTIFACTOR USERNAME BASED AUTHENTICATION  
A hashed value is computed from an encrypted password value and a displayed code value from a hardware token at a client. The encrypted password value is based on a username, a context identifier,...
US20130238893 DIGITAL LOCKER FOR ESTATE PLANNING SYSTEM AND METHOD  
A secure system and method is presented for an individual to gather, organize, store, and share personal and asset information. The system is offered through software-as-service platform to...
US20120109388 Load Shedding by an Electric Utility  
Load shedding by an electric utility, including querying power distribution systems that include a DRG system for present power consumption of the local load of the power distribution system;...
US20110010018 Load Shedding By An Electric Utility  
Load shedding by an electric utility, including querying power distribution systems that include a DRG system for present power consumption of the local load of the power distribution system;...
US20130145148 PASSCODE RESTORATION  
A system method that includes providing a passcode to a user based on presentation of both a recovery key and an active token is described herein.
US20130080774 Two-stage Anonymization of Mobile Network Subscriber Personal Information  
A two-stage anonymization process is applied to monitored network traffic in which unique user identifiers, such as the MSISDN (Mobile Station International Subscriber Directory Number), are...
US20110047393 External Device Charging While Notebook Is Off  
A computer comprises a power supply that provides operating power for the computer and a connector on the computer through which an external device can be coupled to the computer. The power supply...
US20130159693 Automatic Configuration Sampling for Managing Configuration Parameters of a Computer System  
A computer configuration utility automatically alters system configuration parameters to sample multiple different configurations. At least one workrate metric is measured at each sampled...
US20120137118 Automatic Configuration Sampling for Managing Configuration Parameters of a Computer System  
A computer configuration utility automatically alters system configuration parameters to sample multiple different configurations. At least one workrate metric is measured at each sampled...
US20140215225 METHOD FOR INCREASING THE SECURITY OF SOFTWARE  
A method for increasing security of software is provided. The method includes replacing a part of a code section comprised in a binary source file of the software with a pre-set special command,...
US20130166918 Methods for Single Signon (SSO) Using Decentralized Password and Credential Management  
A method for single sign-on (SSO) that provides decentralized credential management using end-to-end security. Credential (and other personal user information) management is decentralized in that...
US20120198250 PORTABLE TERMINAL EQUIPMENT, A POWER SUPPLY SYSTEM, AND A POWER SUPPLY METHOD AND A POWER SUPPLY PROGRAM FOR PORTABLE TERMINAL EQUIPMENT  
A portable terminal equipment capable of operating for a long time is provided. The portable terminal equipment includes: a plurality of circuits separated galvanically and a power supply...
US20140095865 EXCHANGE OF DIGITAL CERTIFICATES IN A CLIENT-PROXY-SERVER NETWORK CONFIGURATION  
Various techniques are described to authenticate the identity of a proxy in a client-proxy-server configuration. The configuration may have a client-side and a server-side SSL session. In the...
US20110029787 METHODS AND APPARATUS FOR POWER ALLOCATION IN A STORAGE SYSTEM  
Methods and systems for improved management of power allocation among a plurality of devices coupled to a controller. The controller and devices exchange messages to request, grant, and release...
US20110106949 Balancing Server Load According To Availability Of Physical Resources  
According to one embodiment, availability information describing virtual machines running on physical machines is accessed. The availability information associates each virtual machine with a...
US20140281506 SOFT TOKEN SYSTEM  
Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a method is provided for soft token management....
US20150089231 SYSTEMS AND METHODS FOR ESTABLISHING AND USING DISTRIBUTED KEY SERVERS  
Systems and methods in which multiple key servers operate cooperatively to securely provide authorization codes to requesting devices. In one embodiment, a server cloud receives a device...
US20120295574 Battery Management System And Method  
A battery-management method is performed by a battery-operated device. The method includes allocating a first portion of a battery capacity to a first function and a second portion of the battery...
US20110197074 METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD  
The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of...