Patent application number | Description | Published |
20150057359 | METHODS OF COLCHICINE ADMINISTRATION - The invention provides improved methods for coadministration of colchicine with drugs metabolized by CYP3A4 (anciently referred to as cytochrome P450 isozyme 3A4) or the P-glycoprotein transporter, but not both. The method enables non-toxic coadministration of colchicine and the second drug at their ordinary levels safely and effectively without reducing the dose or frequency for either drug. | 02-26-2015 |
20150094317 | METHODS OF COLCHICINE ADMINISTRATION - The invention provides improved methods for coadministration of colchicine with drugs metabolized by CYP3A4 (anciently referred to as cytochrome P450 isozyme 3A4) or the P-glycoprotein transporter, but not both. The method enables non-toxic coadministration of colchicine and the second drug at their ordinary levels safely and effectively without reducing the dose or frequency for either drug. | 04-02-2015 |
20150094318 | METHODS OF COLCHICINE ADMINISTRATION - The invention provides improved methods for coadministration of colchicine with drugs metabolized by CYP3A4 (anciently referred to as cytochrome P450 isozyme 3A4) or the P-glycoprotein transporter, but not both. The method enables non-toxic coadministration of colchicine and the second drug at their ordinary levels safely and effectively without reducing the dose or frequency for either drug. | 04-02-2015 |
20150094375 | METHODS OF COLCHICINE ADMINISTRATION - The invention provides improved methods for coadministration of colchicine with drugs metabolized by CYP3A4 (anciently referred to as cytochrome P450 isozyme 3A4) or the P-glycoprotein transporter, but not both. The method enables non-toxic coadministration of colchicine and the second drug at their ordinary levels safely and effectively without reducing the dose or frequency for either drug. | 04-02-2015 |
Patent application number | Description | Published |
20090086811 | VIDEO ENCODING SYSTEM AND WATERMARKING MODULE FOR TRANSMARKING A VIDEO SIGNAL AND METHOD FOR USE THEREWITH - A watermarking module can be used in a video encoding system that processes a video signal. A watermark recovery module generates recovered watermark data based on watermark data from the video signal. A watermark generation module generates a watermarked video signal in accordance with the recovered watermark data. | 04-02-2009 |
20090086812 | VIDEO ENCODING SYSTEM AND WATERMARKING MODULE FOR WATERMARKING A VIDEO SIGNAL AND METHOD FOR USE THEREWITH - A watermarking module can be used in a video encoding system that processes a video signal. A watermark data module generates original watermark data based on either non-watermark data that is based on the video signal and or that includes a codeword associated with a scrambling of content included in the video signal. A watermark generation module generates a watermarked video signal in accordance with the original watermark data. | 04-02-2009 |
20090147840 | VIDEO ENCODING SYSTEM WITH UNIVERSAL TRANSCODING AND METHOD FOR USE THEREWITH - An encoding system includes a first signal interface for receiving a first video signal in a first format. A second signal interface receives a second video signal in a second format. A first encoding module generates a first processed video signal in a third format. A second encoding module generates a second processed video signal in a fourth format, wherein the second processed signal is generated contemporaneously with the first processed video signal and wherein the first format differs from the third format and the second format differs from the fourth format. | 06-11-2009 |
20090271833 | METHOD AND APPARATUS WITH SUBSCRIPTION QUALITY OF SERVICE IN A VIDEO SYSTEM - A method and apparatus for controlling access to a video system based on bandwidth consumption include processing that begins as the server monitors bandwidth utilization of connections within the video system. The processing continues when the server receives a request to access a video program via the connection from a client device of the video system. The processing then continues as the server determines whether determine whether the client device has subscribed to receive the video program at the first quality level. When the client device has not subscribed to receive the video program at the first quality level, the video quality of the video program is converted from the first quality level to a video quality subscribed to by the client device. | 10-29-2009 |
20100061555 | DEVICE WITH PRIVILEGED MEMORY AND APPLICATIONS THEREOF - A device includes a key store memory, a rule set memory, a plurality of cryptographic clients, and a key store arbitration module. The key store memory stores a plurality of cryptographic keys and the rule set memory stores a set of rules for accessing the cryptographic keys. A cryptographic client is operable to issue a request to access a cryptographic key(s) and, when access to the cryptographic key is granted, execute a cryptographic function regarding at least a portion of the cryptographic key to produce a cryptographic result. The key store arbitration module is operable to determine whether the request to access the cryptographic key is valid; when the request is valid, interpret the request to produce an interpreted request; access the rule set memory based on the interpreted request to retrieve a rule of the set of rules; and grant access to the cryptographic key in accordance with the rule. | 03-11-2010 |
20100161975 | PROCESSING SYSTEM WITH APPLICATION SECURITY AND METHODS FOR USE THEREWITH - A processing system includes an interface for receiving application data at the processing system corresponding to an application, the application data including authentication data. A one-time programmable memory stores at least one application key. A processing module executes an operating system that includes a security routine to authenticate the application data based on the authentication data and the at least one application key. The security routine permits the execution of the application by the processing module when the authentication data is authenticated, and prevents the execution of the application by the processing system when the authentication data is not authenticated. | 06-24-2010 |
Patent application number | Description | Published |
20100189262 | SECURE KEY ACCESS WITH ONE-TIME PROGRAMMABLE MEMORY AND APPLICATIONS THEREOF - A device includes a key store memory that stores one or more cryptographic keys. A rule set memory stores a set of rules for accessing the cryptographic keys. A key store arbitration module grants access to the cryptographic keys in accordance with the set of rules. The device can be used in conjunction with a key ladder. The device can include a one-time programmable memory and a load module that transfers the cryptographic keys from the one one-time programmable memory to the key store memory and the set of rules to the rule set memory. A validation module can validate the cryptographic keys and the set of rules stored in the key store and rule set memories, based on a signature defined by a signature rule. | 07-29-2010 |
20110026712 | CONCEALING PLAIN TEXT IN SCRAMBLED BLOCKS - An apparatus generally having a first circuit and a second circuit is disclosed. The first circuit may be configured to (i) divide a plain text into at least three input blocks and (ii) generate at least three scrambled blocks by scrambling the input blocks using a first cipher process. The first cipher process may be configured such that a first of the input blocks does not affect the generation of a last scrambled block. The second circuit may be configured to (i) generate at least three output blocks by de-scrambling the scrambled blocks using a second cipher process and (ii) reconstruct the plain text from the output blocks. The second cipher process may be configured such that a first of the scrambled blocks affects the generation of all of the output blocks. | 02-03-2011 |
20120221846 | CRYPTOGRAPHIC SANCTION SERVER AND METHODS FOR USE THEREWITH - A sanction server includes a network interface that receives a request for media content from a client device and transmits first sanction data to a caching server and second sanction data to the client device. A sanction processing module generates the first sanction data based on a random number and generates the second sanction data based on the random number. The caching server generates first cryptographic data based on the first sanction data and sends the first cryptographic data to the client device. The client device generates second cryptographic data based on the first sanction data and sends the second cryptographic data to the caching server. The caching server generates a scrambling control word based on the first sanction data and the second cryptographic data. The client device generates the scrambling control word based on the second sanction data and the first cryptographic data. | 08-30-2012 |
20120221847 | SANCTIONED CLIENT DEVICE AND METHODS FOR USE THEREWITH - A client device includes a network interface that transmits a request for the media content to the sanction server, receives second sanction data from the sanction server, transmits second cryptographic data to the caching server, receives first cryptographic data from the caching server and that receives scrambled media content from the caching server. A random number generator generates a random number. A client processing module, in response to the second sanction data, generates the second cryptographic data based on the random number and the second sanction data, generates a scrambling control word based on the second sanction data and the first cryptographic data and descrambles the scrambled media content based on the scrambling control word. | 08-30-2012 |
20120221848 | SANCTIONING CONTENT SOURCE AND METHODS FOR USE THEREWITH - A content source includes a random number generator that generates scrambling control word based on at least one random number. A source processing module generates proxy data that includes cryptographic parameters that are based on the scrambling control word, generates cryptographic data and generates scrambled media content based on the scrambling control word. A network interface sends the proxy data to a sanction server, and sends the cryptographic data and the scrambled content to a caching server. | 08-30-2012 |
20120221851 | SOURCE CENTRIC SANCTION SERVER AND METHODS FOR USE THEREWITH - A sanction server includes a network interface that receives proxy data from a content source that includes cryptographic parameters that are based on a scrambling control word used to scramble the media content, receives a request for the media content from a client device, transmits the proxy data to the client device and transmits notification data to a caching server. The content source generates cryptographic data and sends the cryptographic data and the scrambled media content to the caching server. The caching server forwards the cryptographic data and the scrambled media content to the client device. The client device generates the scrambling control word for descrambling the scrambled media content based on the proxy data and the cryptographic data. | 08-30-2012 |
20120221852 | SANCTIONED CACHING SERVER AND METHODS FOR USE THEREWITH - A caching server includes a network interface receives first sanction data from the sanction server and transmits first cryptographic data to a client device, receives second cryptographic data from the device and that transmits scrambled media content to the client device. A random number generator generates a random number. A caching processing module, in response to the first sanction data, generates the first cryptographic data based on the random number and the first sanction data, generates a scrambling control word based on the first sanction data and the second cryptographic data and that generates the scrambled media content based on the scrambling control word. | 08-30-2012 |
20130046981 | SECURE PROVISIONING OF INTEGRATED CIRCUITS AT VARIOUS STATES OF DEPLOYMENT, METHODS THEREOF - An integrated circuit is provisioned after the integrated circuit has been sold and integrated into a customer's product. During provisioning, the integrated circuit is booted in a secure manner using a security value, such as a cryptographic key, owned by a manufacturer of the integrated circuit, or by a purchaser of the integrated circuit, to establish a secure communications channel with a provisioning server. Once the secure communications channel is established, the integrated circuit can be provisioned with a security value that is owned by the purchaser of the integrated circuit and the manufacturer's security value is disabled. | 02-21-2013 |
20130202109 | CONTAINER AGNOSTIC ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device for encrypting a compressed video signal that includes a key storage device for storing at least one encryption key. An encryption processing device retrieves the at least one encryption key from the key storage device, and directly encrypts an elementary bit stream into at least one encrypted elementary bit stream. | 08-08-2013 |
20130202110 | CONTAINER AGNOSTIC DECRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device for decrypting a compressed video signal includes a key storage device for storing at least one decryption key. A decryption processing device retrieves the at least one decryption key from the key storage device, and decrypts an encrypted elementary bit stream into at least one elementary bit stream, wherein first portions of the encrypted elementary bit stream are encrypted and second portions of the encrypted elementary bit stream are unencrypted. | 08-08-2013 |
20130205331 | ENCRYPTED MEMORY DEVICE AND METHODS FOR USE THEREWITH - A video processing device is presented for processing video data. This video processing device protects the security of data via encryption when it is stored on a memory device during processing. In particular, memory input/output (I/O) includes encryption and decryption as part of an atomic operation to receive and format or de-format and either encoded or decode the video data. | 08-08-2013 |
20140056426 | ADAPTABLE ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device includes a data segmentation generator that receives a domain selection, n, and that segments input A/V data into n data blocks. An encryption processing device receives an encryption depth selection, k, and a range selection, m, and sequentially encrypts each of the n data blocks m times using k different keys to generate n encrypted data blocks. An output formatter generates encrypted A/V data from the n encrypted data blocks. | 02-27-2014 |
20140063340 | VIDEO PROCESSING DEVICE WITH BUFFER FEEDBACK AND METHODS FOR USE THEREWITH - A video processing device includes a rate controller coupled to receive non-real time audio/video (A/V) data and buffer state feedback data from an input/output (I/O) device. The rate controller generates rate controlled non-real time A/V data from the non-real time A/V data and in response to the buffer state feedback data. A multiplexor multiplexes the rate controlled non-real time A/V data with real-time A/V data to generates multiplexed A/V data for input to the I/O device. | 03-06-2014 |
20140136855 | SECURE KEY ACCESS WITH ONE-TIME PROGRAMMABLE MEMORY AND APPLICATIONS THEREOF - A device includes a key store memory that stores one or more cryptographic keys. A rule set memory stores a set of rules for accessing the cryptographic keys. A key store arbitration module grants access to the cryptographic keys in accordance with the set of rules. The device can be used in conjunction with a key ladder. The device can include a one-time programmable memory and a load module that transfers the cryptographic keys from the one one-time programmable memory to the key store memory and the set of rules to the rule set memory. A validation module can validate the cryptographic keys and the set of rules stored in the key store and rule set memories, based on a signature defined by a signature rule. | 05-15-2014 |
20150143130 | INTEGRATED CIRCUIT PROVISIONING USING PHYSICAL UNCLONABLE FUNCTION - A one-time programmable (OTP) memory of an integrated circuit is provisioned based on identifier data generated by a physical unclonable function (PUF) of the integrated circuit. The identifier data is used as part of cryptographic operations to secure provisioning of security information at an OTP memory of at the integrated circuit. Because of the physical characteristics of the PUF and its incorporation in the integrated circuit, the identifier information is unique to the integrated circuit. Accordingly, the provisioned security information is also unique to the integrated circuit. The OTP memory can therefore be securely provisioned at later stages of the integrated circuit manufacturing and configuration process, such as after the integrated circuit has been packaged or attached to a printed circuit board. | 05-21-2015 |
20150181308 | CONTAINER AGNOSTIC DECRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device for decrypting a compressed video signal includes a key storage device for storing at least one decryption key. An decryption processing device retrieves the at least one decryption key from the key storage device, and decrypts an encrypted elementary bit stream into at least one elementary bit stream, wherein first portions of the encrypted elementary bit stream are encrypted and second portions of the encrypted elementary bit stream are unencrypted. | 06-25-2015 |
Patent application number | Description | Published |
20090054483 | Substituted Quinolines as Inhibitors of Leukotriene Biosynthesis - The instant invention provides compounds of Formula (I) which are leukotriene biosynthesis inhibitors. Compounds of Formula (I) are useful as anti-atherosclerotic, anti-asthmatic, anti-allergic, anti-inflammatory and cytoprotective agents. | 02-26-2009 |
20090075998 | 2-(phenyl or heterocyclic)-1H-phenantrho[9,10-d]imidazoles as mPGES-1 inhibitors - The invention encompasses novel compounds of Formula I | 03-19-2009 |
20090209571 | Phenanthrene derivatives as MPGES-1 inhibitors - The invention encompasses novel compounds of Formula or pharmaceutically acceptable salts thereof. These compounds are inhibitors of the microsomal prostaglandin E synthase-1 (mPGES-1) enzyme and are therefore useful to treat pain and/or inflammation from a variety of diseases or conditions, such as osteoarthritis, rheumatoid arthritis and acute or chronic pain. Methods of treating diseases or conditions mediated by the mPGES-1 enzyme and pharmaceutical compositions are also encompassed. | 08-20-2009 |
20090286772 | 2-(Phenyl or Heterocyclic)-1H-Phenanthro[9,10-D]Imidazoles - The invention encompasses novel compounds of Formula (I) or pharmaceutically acceptable salts thereof. These compounds are inhibitors of the microsomal prostaglandin E synthase-1 (mPGES-1) enzyme and are therefore useful to treat pain and/or inflammation from a variety of diseases or conditions, such as osteoarthritis, rheumatoid arthritis and acute or chronic pain. Methods of treating diseases or conditions mediated by the mPGES-1 enzyme and pharmaceutical compositions are also encompassed. | 11-19-2009 |