Patent application number | Description | Published |
20090097784 | WRAP FOR A BOTTLE OR OTHER PRODUCT - A wrap for a bottle or other product includes a pair of T-shaped panels coupled together to define a bottle-receiving pocket and a collar. Trim panels are coupled to the T-shaped panels to define at least one channel that extends around the collar and receives a tie. Tightening the tie gathers the collar together to close the pocket. | 04-16-2009 |
20090261050 | BAG STORAGE AND LOADING UNIT - A bag storage and loading unit includes a first arm and a second arm substantially parallel with and spaced a distance from the first arm to define an interior space having a width measured between the first and second arms. A first upwardly-open hook member extends laterally from the first arm into the interior space. The first hook member is configured to retain a plurality of handles of a plurality of bags that are in a storage orientation in the interior space. A second upwardly-open hook member extends laterally from the second arm into the interior space. The second hook member is configured to retain one handle of one of the plurality of bags that is in a loading orientation, such that the plurality of bags may be opened with a side-to-side movement. | 10-22-2009 |
20100146731 | REMOVABLE ERASER FOR A PENCIL - An eraser to cap a pencil includes a top and a base, with a projection extending between them. The projection helps to secure the top and base together by fitting into and filling a mating cavity within either or both of the top and base. The base has a cavity open at the bottom of the base, sized and shaped to receive the used or unused portion of an original pencil eraser, if any, and the ferrule on the pencil. | 06-17-2010 |
20130266362 | ELECTRICALLY POWERED NOVELTY ITEM WITH MOVABLE FLECKS - A writing instrument generally includes a barrel having a tip and an end distal from the tip. A housing is coupled to the distal end. Movable flecks are inside the housing. A blade is operable to move air and the flecks within the housing. A switch is electrically coupled to the blade. A power supply is electrically coupled to the blade and the switch. | 10-10-2013 |
Patent application number | Description | Published |
20080279386 | METHOD AND APPARATUS FOR ENCRYPTING MEDIA PROGRAMS FOR LATER PURCHASE AND VIEWING - A system and method for storing and retrieving program material for subsequent replay is disclosed. The method includes accepting a receiver ID associated with a receiver key stored in a memory of the receiver, determining a pairing key for encrypting communications between the conditional access module and the receiver, encrypting the pairing key with the receiver key, and transmitting a message comprising the encrypted pairing key to the receiver. The apparatus comprises a receiver for receiving a data stream transmitting a media program encrypted according to a media encryption key and an encrypted media encryption key and a conditional access module, communicatively coupleable with the receiver. | 11-13-2008 |
20080313474 | SUPER ENCRYPTED STORAGE AND RETRIEVAL OF MEDIA PROGRAMS WITH SMARTCARD GENERATED KEYS - A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. In summary, the present invention describes a system and method for storing and retrieving program material for subsequent replay. The method comprises the steps of accepting encrypted access control information and the program material encrypted according to a first encryption key, the access control information including a first encryption key and control data; decrypting the received access control information to produce the first encryption key; decrypting the program material using the first encryption key; re-encrypting the program material using according to a second encryption key; encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and providing the re-encrypted program material and a fourth encryption key for storage. The apparatus comprises a conditional access module, for accepting encrypted access control information and the program material encrypted according to a first encryption key, the encrypted access control information including the first encryption key and temporally-variant control data, the control access module comprising a first decryption module, for decrypting the access control information to produce the first encryption key; a first encryption module, for encrypting a second encryption key with a third encryption key to produce a fourth encryption key; and a second decryption module for decrypting the fourth encryption key to produce the second encryption key. | 12-18-2008 |
20120155837 | SECURE STORAGE AND REPLAY OF MEDIA PROGRAMS USING A HARD-PAIRED RECEIVER AND STORAGE DEVICE - A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream comprising the program material encrypted according to a first (CW) encryption key, decrypting the program material; re-encrypting the program material according to a second encryption key, and storing the re-encrypted material in a media storage device. The program material is played back by retrieving the re-encrypted material from the media storage device and decrypting the re-encrypted program material. In one embodiment, the media storage device also stores the second encryption key which has been further encrypted by a key that is unique to the device used to receive the program material. | 06-21-2012 |
Patent application number | Description | Published |
20080244754 | System and Method for Software License Management for Concurrent License Management and Issuance - The present invention is a method and system for software license management. The License Management System (LMS) is comprised of three components. These three components are the License Client (LC), the License Server (LS) and the Network License Manager (NLM). For the system to function the LC and LS are required. The NLM exists to facilitate and manage concurrent license usage. | 10-02-2008 |
20090177740 | System and Method for Software License Management for Concurrent License Management and Issuance - The present invention is a method and system for software license management. The License Management System (LMS) is comprised of three components. These three components are the License Client (LC), the License Server (LS) and the Network License Manager (NLM). For the system to function the LC and LS are required. The NLM exists to facilitate and manage concurrent license usage. | 07-09-2009 |
20100189251 | Security Enhanced Data Platform - The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document management system. A set of client side tools provides the user a way to specify classifications and compartments for selected areas of a document, and a way to save the document in the format required by the system in order to allow the system to enforce the rules and privileges dictated to the system. The second subsystem is a security enhanced database management system. In documents the system allows different user privilege requirements on the document as a whole as well as on pages, paragraphs, sentences, words, and/or letters of a word. A history of document changes is maintained to provide an audit trail after the fact of who did what changes, where those changes were made and when those changes were made. | 07-29-2010 |
20140123256 | System and Method for Human Identity Validation via a Mobile Device - Method for establishing and maintaining a person's identity starts at the time the person registers with the system using a mobile device to validate the identity of a person in an inherently anonymous computing environment such as the internet or any other distributed network where face to face communication is not possible. The person will provide information required to establish the person's identity with an authenticator. The authenticator then submits that information to the system administration service to be validated by external databases and services. The external service provides a set of challenge/response questions unique to that person to establish positive identification. Upon successful authentication of the person's identity, the person and their device will be associated with each other and recorded in the system. Each authentication service will define a criterion, labeled as a schema, by which authentication events will be governed. | 05-01-2014 |
Patent application number | Description | Published |
20100325609 | RULE ENGINE SYSTEM CONTROLLING DEVICES OF DISPARATE TYPES AND PROTOCOLS - A rule engine system works with physical systems monitored by Internet-enabled endpoints on one hand and developer custom applications on the other. Endpoints operate in both the domain specific language of the rule engine, and communicate with participating applications in the native protocols thereof. Whether new or legacy, whether hardware, software, or firmware, whether having much, little, or no digital processing or communication capacity, the participating application may be monitored and controlled by an endpoint that communicates over the Internet with the rule engine. Individual developers prepare rule language files, containing data and instructions for the rule engine to implement through the end point. Any apparatus, whether exclusively mechanical, electrical, electronic, highly sophisticated electronic, or some combination may be monitored and controlled. Any participating application, from a mechanical lawn sprinkler to an Internet commerce server may be implemented thus. | 12-23-2010 |
20140157244 | RULE ENGINE SYSTEM CONTROLLING DEVICES OF DISPARATE TYPES AND PROTOCOLS - A rule engine system works with physical systems monitored by Internet-enabled endpoints on one hand and developer custom applications on the other. Endpoints operate in both the domain specific language of the rule engine, and communicate with participating applications in the native protocols thereof. Whether new or legacy, whether hardware, software, or firmware, whether having much, little, or no digital processing or communication capacity, the participating application may be monitored and controlled by an endpoint that communicates over the Internet with the rule engine. Individual developers prepare rule language files, containing data and instructions for the rule engine to implement through the end point. Any apparatus, whether exclusively mechanical, electrical, electronic, highly sophisticated electronic, or some combination may be monitored and controlled. Any participating application, from a mechanical lawn sprinkler to an Internet commerce server may be implemented thus. | 06-05-2014 |