Patent application number | Description | Published |
20100192209 | PASSIVE SECURITY ENFORCEMENT - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels. | 07-29-2010 |
20100192230 | PROTECTING TRANSACTIONS - Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating the switching component, which can cause the mobile device to switch into a secure mode. In the secure mode, the mobile device may prevent the mobile device from conducting various normal activities, such as executing applications, receiving input, providing output, and so forth. The switching component may disable other processing temporarily. Upon receiving the confirmation from the user, the switching component may send a confirmation communication to complete the transaction. | 07-29-2010 |
20130145112 | TIME MANAGED READ AND WRITE ACCESS TO A DATA STORAGE DEVICE - Time managed read and write access to a data storage device. As a part of time managed read and write access to a data storage device, a request for read and/or write access to the data storage device is accessed and it is determined whether the request for read and/or write access to the data storage device is to be granted. Based on the determination, read and/or write access to the data storage device is either allowed or blocked. If read and/or write access is allowed, read and/or write access is terminated after passage of a predetermined period of time. | 06-06-2013 |
20140223522 | PASSIVE SECURITY ENFORCEMENT - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels. | 08-07-2014 |
Patent application number | Description | Published |
20080235513 | Three Party Authentication - A trust provider uses established relationships with a client device and a server of an e-commerce merchant or service provider to assure the identity of each to the other. The e-commerce merchant can request an encrypted token from the client. The client may use a trust-provider key to generate the encrypted token. The server then passes the token to the trust provider, who only accepts tokens from known, authenticated entities. The trust provider then verifies the token and returns a response to the server. The response may include a client verification for use by the server and an encrypted server verification that is forwarded by the server to the client. In this fashion, both the server and client may be authenticated without prior knowledge of each other. | 09-25-2008 |
20080319910 | Metered Pay-As-You-Go Computing Experience - A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected. The scalable performance level components may include a processor, memory, graphics controller, etc. Software and services may include word processing, email, browsing, database access, etc. To support a pay-per-use business model, each selectable item may have a cost associated with it, allowing a user to pay for the services actually selected and that presumably correspond to the task or tasks being performed. An administrator may use a similar user interface to set performance levels for each computer in a network, allowing performance and cost to be set according to a user's requirements. | 12-25-2008 |
20090094455 | Frequency Managed Performance - A computer or other electronic device may use a security module to securely control a system or processor clock to set a predetermined performance level. In an exemplary embodiment, the performance level may be high, medium, or low, supporting a range of application performance requirements. Changes to the performance level may be authorized by a third party presenting cryptographic rights to alter the performance level. Alternatively, postpaid ro pre-paid value may be accumulated at a rate corresponding to the predetermined performance level set by the security module. | 04-09-2009 |
20090287917 | SECURE SOFTWARE DISTRIBUTION - To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation. | 11-19-2009 |
20100037325 | Enhanced Packaging for PC Security - A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers. | 02-11-2010 |
Patent application number | Description | Published |
20090087404 | METHODS OF TREATING CANCER USING IL-21 AND MONOCLONAL ANTIBODY THERAPY - Methods for treating cancer by co-administering a therapeutic monoclonal antibody with IL-21 are described. Exemplary monoclonal antibodies that can be used are rituximab, trastuzumab and anti-CTLA-4 antibodies. The enhanced antitumor of the combination therapy is particularly useful for patient populations that are recalcitrant to monoclonal therapy, relapse after treatment with monoclonal antibodies or where the enhanced IL-21 antitumor effect reduces toxicities associated with treatment using the monoclonal antibodies. | 04-02-2009 |
20090269304 | METHODS OF TREATING CANCER USING IL-21 AND MONOCLONAL ANTIBODY THERAPY - Methods for treating cancer by co-administering a therapeutic monoclonal antibody with IL-21 are described. Exemplary monoclonal antibodies that can be used are rituximab, trastuzumab and anti-CTLA-4 antibodies. The enhanced antitumor of the combination therapy is particularly useful for patient populations that are recalcitrant to monoclonal therapy, relapse after treatment with monoclonal antibodies or where the enhanced IL-21 antitumor effect reduces toxicities associated with treatment using the monoclonal antibodies. | 10-29-2009 |
20100197575 | SOLUBLE INTERLEUKIN-20 RECEPTOR - A soluble receptor to IL-20 having two polypeptide subunits, IL-20RA (formerly called ZcytoR7) and IL-20RB (formerly called DIRS1). The two subunits are preferably linked together. In one embodiment one subunit is fused to the constant region of the light chain of an immunoglobulin, and the other subunit is fused to the constant region of the heavy chain of the immunoglobulin. The light chain and the heavy chain are connected via a disulfide bond. | 08-05-2010 |
20100222557 | CYTOKINE ZALPHA11LIGAND ANTIBODIES - Antibodies that bind to polypeptides and peptides comprising the sequence of zalpha11 Ligand as shown in SEQ ID NO: 2 are described. The antibodies may bind the full length sequence of 162 amino acid residues or a fragment thereof, including a mature polypeptide of 131 amino acid residues and smaller polypeptide and peptide sequences. The antibodies may include antibodies that are polyclonal, monoclonal, murine, humanized or neutralizing. Methods for producing the antibodies are also described. | 09-02-2010 |
20100297063 | CYTOKINE ZALPHA11 LIGAND ANTIBODIES - Antibodies that bind to polypeptides and peptides comprising the sequence of zalpha11 Ligand as shown in SEQ ID NO: 2 are described. The antibodies may bind the full length sequence of 162 amino acid residues or a fragment thereof, including a mature polypeptide of 131 amino acid residues and smaller polypeptide and peptide sequences. The antibodies may include antibodies that are polyclonal, monoclonal, murine, humanized or neutralizing. Methods for producing the antibodies are also described. | 11-25-2010 |
20100297064 | CYTOKINE ZALPHA11 LIGAND ANTIBODIES - Antibodies that bind to polypeptides and peptides comprising the sequence of zalpha11 Ligand as shown in SEQ ID NO: 2 are described. The antibodies may bind the full length sequence of 162 amino acid residues or a fragment thereof, including a mature polypeptide of 131 amino acid residues and smaller polypeptide and peptide sequences. The antibodies may include antibodies that are polyclonal, monoclonal, murine, humanized or neutralizing. Methods for producing the antibodies are also described. | 11-25-2010 |
20110027263 | SOLUBLE INTERLEUKIN-20 RECEPTOR - A soluble receptor to IL-20 having two polypeptide subunits, IL-20RA (formerly called ZcytoR7) and IL-20RB (formerly called DIRS1). The two subunits are preferably linked together. In one embodiment one subunit is fused to the constant region of the light chain of an immunoglobulin, and the other subunit is fused to the constant region of the heavy chain of the immunoglobulin. The light chain and the heavy chain are connected via a disulfide bond. | 02-03-2011 |
20110086004 | METHODS OF TREATING CANCER USING IL-21 AND MONOCLONAL ANTIBODY THERAPY - Methods for treating cancer by co-administering a therapeutic monoclonal antibody with IL-21 are described. Exemplary monoclonal antibodies that can be used are rituximab, trastuzumab and anti-CTLA-4 antibodies. The enhanced antitumor of the combination therapy is particularly useful for patient populations that are recalcitrant to monoclonal therapy, relapse after treatment with monoclonal antibodies or where the enhanced IL-21 antitumor effect reduces toxicities associated with treatment using the monoclonal antibodies. | 04-14-2011 |
20110150872 | SOLUBLE HETERODIMERIC CYTOKINE RECEPTOR - A soluble receptor that binds to IL-20 having two polypeptide subunits, IL-22R and IL-20RB. The two subunits are preferably linked together. In one embodiment one subunit is fused to the constant region of the light chain of an immunoglobulin, and the other subunit is fused to the constant region of the heavy chain of the immunoglobulin. The light chain and the heavy chain are connected via a disulfide bond. | 06-23-2011 |
20110300098 | METHODS OF TREATING CANCER USING IL-21 AND MONOCLONAL ANTIBODY THERAPY - Methods for treating cancer by co-administering a therapeutic monoclonal antibody with IL-21 are described. Exemplary monoclonal antibodies that can be used are rituximab, trastuzumab and anti-CTLA-4 antibodies. The enhanced antitumor of the combination therapy is particularly useful for patient populations that are recalcitrant to monoclonal therapy, relapse after treatment with monoclonal antibodies or where the enhanced IL-21 antitumor effect reduces toxicities associated with treatment using the monoclonal antibodies. | 12-08-2011 |
20120208772 | CYTOKINE ZALPHA11 LIGAND - Antibodies that bind to polypeptides and peptides comprising the sequence of zalpha11 Ligand as shown in SEQ ID NO: 2 are described. The antibodies may bind the full length sequence of 162 amino acid residues or a fragment thereof, including a mature polypeptide of 131 amino acid residues and smaller polypeptide and peptide sequences. The antibodies may include antibodies that are polyclonal, monoclonal, murine, humanized or neutralizing. Methods for producing the antibodies are also described. | 08-16-2012 |
20130171130 | SOLUBLE INTERLEUKIN-20 RECEPTOR - A soluble receptor to IL-20 having two polypeptide subunits, IL-20RA (formerly called ZcytoR7) and IL-20RB (formerly called DIRS1). The two subunits are preferably linked together. In one embodiment one subunit is fused to the constant region of the light chain of an immunoglobulin, and the other subunit is fused to the constant region of the heavy chain of the immunoglobulin. The light chain and the heavy chain are connected via a disulfide bond. | 07-04-2013 |
20130302795 | CYTOKINE ZALPHA11 LIGAND - Antibodies that bind to polypeptides and peptides comprising the sequence of zalpha11 Ligand as shown in SEQ ID NO: 2 are described. The antibodies may bind the full length sequence of 162 amino acid residues or a fragment thereof, including a mature polypeptide of 131 amino acid residues and smaller polypeptide and peptide sequences. The antibodies may include antibodies that are polyclonal, monoclonal, murine, humanized or neutralizing. Methods for producing the antibodies are also described. | 11-14-2013 |
Patent application number | Description | Published |
20110047126 | USER-INPUT SCHEDULING OF SYNCHRONIZATION OPERATION ON A MOBILE DEVICE BASED ON USER ACTIVITY - Data is synchronized between a mobile device and a computing device over a wireless link. Synchronization operations are scheduled according to a synchronization schedule that is based on a current time of day. In one embodiment, the day can be divided into different time periods by the user. The user can also specify the frequency with which synchronization operations are to be performed during each specified period. Further, the user can specify an override schedule which overrides the ordinary synchronization schedule established by the user when override criteria are present. For instance, if the mobile device is roaming, the synchronization schedule will be dictated by the override schedule, which may sync much less often, or not until a specific user synchronization request has been received. The present invention can be embodied both as a method and as a apparatus. Also, the user interface associated with the present invention provides for user input to specify time periods during the day, synchronization frequency information, and an override schedule. | 02-24-2011 |
20110264622 | USER-INPUT SCHEDULING OF SYNCHRONIZATION OPERATION ON A MOBILE DEVICE BASED ON USER ACTIVITY - Data is synchronized between a mobile device and a computing device over a wireless link. Synchronization operations are scheduled according to a synchronization schedule that is based on a current time of day. In one embodiment, the day can be divided into different time periods by the user. The user can also specify the frequency with which synchronization operations are to be performed during each specified period. Further, the user can specify an override schedule which overrides the ordinary synchronization schedule established by the user when override criteria are present. For instance, if the mobile device is roaming, the synchronization schedule will be dictated by the override schedule, which may sync much less often, or not until a specific user synchronization request has been received. The present invention can be embodied both as a method and as a apparatus. Also, the user interface associated with the present invention provides for user input to specify time periods during the day, synchronization frequency information, and an override schedule. | 10-27-2011 |
20120246344 | USER-INPUT SCHEDULING OF SYNCHRONIZATION OPERATION ON A MOBILE DEVICE BASED ON USER ACTIVITY - Data is synchronized between a mobile device and a computing device over a wireless link. Synchronization operations are scheduled according to a synchronization schedule that is based on a current time of day. In one embodiment, the day can be divided into different time periods by the user. The user can also specify the frequency with which synchronization operations are to be performed during each specified period. | 09-27-2012 |
20130290252 | USER-INPUT SCHEDULING OF SYNCHRONIZATION OPERATION ON A MOBILE DEVICE BASED ON USER ACTIVITY - Data is synchronized between a mobile device and a computing device over a wireless link. Synchronization operations are scheduled according to a synchronization schedule that is based on a current time of day. In one embodiment, the day can be divided into different time periods by the user. The user can also specify the frequency with which synchronization operations are to be performed during each specified period. | 10-31-2013 |
Patent application number | Description | Published |
20080315400 | MICROELECTROMECHANICAL SYSTEMS DESIGN FEATURE - A device for reducing the chance that a microelectromechanical systems (MEMS) device with moving parts will have those parts stick to a glass cover of the MEMS device, and a method for making the device. An example embodiment of the invention includes a MEMS device wafer, a substrate wafer, and a glass cover. The MEMS device wafer includes perforations corresponding to the location(s) of exposed glass on the cover. An example embodiment of a method of the invention includes applying metal layers to a glass cover, perforating a device wafer at locations corresponding to areas of exposed glass on the glass cover, mounting the device wafer to the substrate wafer, and anodically bonding the glass cover to the substrate wafer or to the device wafer. | 12-25-2008 |
20090025477 | SENSOR WITH POSITION-INDEPENDENT DRIVE ELECTRODES IN MULTI-LAYER SILICON ON INSULATOR SUBSTRATE - A micoroelectromechanical system (MEMS) includes a housing defining an enclosed cavity, stator tines extending from the housing into the cavity, a MEMS device located within the cavity, the MEMS device including a proof mass and rotor tines extending from the proof mass, each rotor tine being positioned at a capacitive distance from a corresponding stator tine. The rotor tines include a first section extending a first distance from an insulating layer of the rotor tines and a second section extending a second distance from the insulating layer in an opposite direction from the first section. The stator tines include a first section extending a first distance from an insulating layer of the stator tines and a second section extending a second distance from the insulating layer in an opposite direction from the first section, the stator tine first distance being greater than the rotor tine first distance. | 01-29-2009 |
20100024552 | SYSTEMS AND METHODS FOR DETECTING OUT-OF-PLANE LINEAR ACCELERATION WITH A CLOSED LOOP LINEAR DRIVE ACCELEROMETER - Systems and methods sense out-of-plane linear accelerations. In an exemplary embodiment, the out-of plane linear accelerometer is accelerated in an out-of-plane direction, wherein the acceleration generates a rotational torque to an unbalanced proof mass. A rebalancing force is applied to at least one plurality of interleaved rotor comb tines and stator comb tines, wherein the rebalancing force opposes the rotational torque, wherein the rotor comb tines are disposed at an end of the unbalanced proof mass, and wherein the stator comb tines are disposed on a stator adjacent to the end of the unbalanced proof mass. An amount of acceleration is then determined based upon the applied rebalancing force. | 02-04-2010 |
Patent application number | Description | Published |
20090175258 | METHOD AND DEVICE OF GENERATING TIME-VARYING PREAMBLE SEQUENCE AND PSEUDORANDOM NOISE (PN) BINARY SEQUENCE IN DIRECT SEQUENCE SPREAD SPECTRUM (DSSS) COMMUNICATIONS - Embodiments of the disclosure provide methods, apparatus, and articles allowing two nodes to communicate in a slot-based direct sequencing spreading communication system. Both a preamble sequence and a payload data spreading PN sequence are generated from the Time of Day and a given user code. Generated sequences are synchronized between two communicating nodes to allow slot-based DSSS communication to take place. Generated sequences also change dynamically from slot to slot to provide waveform security. | 07-09-2009 |
20090196170 | QUALITY OF SERVICE, POLICY ENHANCED HIERARCHICAL DISRUPTION TOLERANT NETWORKING SYSTEM AND METHOD - According to an embodiment, a method includes a Delay Tolerant Network (DTN) software overlay residing in a first plane of a node of the network is used to define hierarchical forwarding behavior for data being generated in the first plane. In a second plane of the network, local buffering and data retransmission is performed in response to at least one intermittent network outage. Communication between the first and second planes is performed to manage the transmission of data between the first and second planes as needed in the event of at network outage that is longer in duration than the at least one intermittent network outage, to thus prevent the loss of data. | 08-06-2009 |
20120084839 | SURVEILLANCE NETWORK SYSTEM - Embodiments of a sensor network system provide surveillance capabilities in multiple contexts/environments (e.g., military, commercial, scientific, civic, urban, wilderness, etc.). Network nodes may include devices such as sensors, network routers, network controllers, etc. Network sensors may be configured so that power management objectives are maximized. Network sensors (both individually and as a group) may be capable of intelligent and cooperative information gathering, so that the output of the sensor network does not contain high levels of irrelevant information. The network nodes may communicate among one another via one or more communication links, and in some cases, multiple routes between any two network nodes may be available. The sensor network may include aspects of both high data rate and low data rate network features. One or more network controllers may provide various network management capabilities, including management of network routing, information collection, information exportation, network configuration, etc. | 04-05-2012 |