Patent application number | Description | Published |
20100289097 | Integrated Microphone - A method of forming a microphone having a variable capacitance first deposits high temperature deposition material on a die. The high temperature material ultimately forms structure that contributes to the variable capacitance. The method then forms circuitry on the die after depositing the deposition material. The circuitry is configured to detect the variable capacitance. | 11-18-2010 |
20110103622 | Support Apparatus for Microphone Diaphragm - A microphone includes a diaphragm assembly supported by a substrate. The diaphragm assembly includes at least one carrier, a diaphragm, and at least one spring coupling the diaphragm to the at least one carrier such that the diaphragm is spaced from the at least one carrier. An insulator (or separate insulators) between the substrate and the at least one carrier electrically isolates the diaphragm and the substrate. | 05-05-2011 |
20110165720 | Microphone with Irregular Diaphragm - A microphone is formed to have a diaphragm that is configured to improve signal to noise ratio. To that end, the microphone has a backplate having a hole therethrough, and a diaphragm movably coupled with the backplate. The diaphragm has a bottom surface (facing the backplate) with a convex portion aligned with the hole in the backplate. | 07-07-2011 |
20130065344 | Process of Forming a Microphone Using Support Member - A method of forming a microphone forms a backplate, and a flexible diaphragm on at least a portion of a wet etch removable sacrificial layer. The method adds a wet etch resistant material, where a portion of the wet etch resistant material is positioned between the diaphragm and the backplate to support the diaphragm. Some of the wet etch resistant material is not positioned between the diaphragm and backplate. The method then removes the sacrificial material before removing any of the wet etch resistant material added during the prior noted act of adding. The wet etch resistant material then is removed substantially in its entirety after removing at least part of the sacrificial material. | 03-14-2013 |
20130101151 | Noise Mitigating Microphone System and Method - A microphone system has a base coupled with first and second microphone apparatuses. The first microphone apparatus is capable of producing a first output signal having a noise component, while the second microphone apparatus is capable of producing a second output signal. The first microphone apparatus may have a first back-side cavity and the second microphone may have a second back-side cavity. The first and second back-side cavities may be fluidly unconnected. The system also has combining logic operatively coupled with the first microphone apparatus and the second microphone apparatus. The combining logic uses the second output signal to remove at least a portion of the noise component from the first output signal. | 04-25-2013 |
20130104384 | Microphone with Irregular Diaphragm | 05-02-2013 |
20130236036 | Support Apparatus for Microphone Diaphragm - A microphone includes a diaphragm assembly supported by a substrate. The diaphragm assembly includes at least one carrier, a diaphragm, and at least one spring coupling the diaphragm to the at least one carrier such that the diaphragm is spaced from the at least one carrier. An insulator (or separate insulators) between the substrate and the at least one carrier electrically isolates the diaphragm and the substrate. | 09-12-2013 |
20130236037 | Multi-Microphone System - A microphone system implements multiple microphones on a single base. To that end, the microphone system has a base, and a plurality of substantially independently movable diaphragms secured to the base. Each of the plurality of diaphragms forms a variable capacitance with the base and thus, each diaphragm effectively forms a generally independent, separate microphone with the base. | 09-12-2013 |
Patent application number | Description | Published |
20130036872 | Modular Fixed Cutter Earth-Boring Bits, Modular Fixed Cutter Earth-Boring Bit Bodies, and Related Methods - A modular fixed cutter earth-boring bit body includes a blade support piece and at least one blade piece fastened to the blade support piece. A modular fixed cutter earth-boring bit and methods of making modular fixed cutter earth-boring bit bodies and bits also are disclosed. | 02-14-2013 |
20130043615 | INJECTION MOLDING FABRICATION METHOD - A method of forming a composite article by injecting at least two composite materials comprising metal carbides into a mold to form a green compact is disclosed. The composite materials may be metal powders comprising a binder metal, a hard particle. The composite material may further comprise a plastic binder. The two different composite materials are injected into the mold to form the green compact. Additionally, the composite materials may be injected through a die before entering the mold. In a specific embodiment, the die forms at least one internal channel within the green compact. | 02-21-2013 |
20140097553 | COMPOSITE ARTICLE WITH COOLANT CHANNELS AND TOOL FABRICATION METHOD - Embodiments of the present invention include composite articles comprising at least a first region and a second region and methods of making such articles. The first region may comprise a first composite material, wherein the first region comprises less than 5 wt. % cubic carbides by weight, and the second region may comprise a second composite material, wherein the second composite material differs from the first composite material in at least one characteristic. The composite article may additionally comprise at least one coolant channel. In certain embodiments, the first and second composite material may individually comprise hard particles in a binder, wherein the hard particles independently comprise at least one of a carbide, a nitride, a boride, a silicide, an oxide, and solid solutions thereof and the binder comprises at least one metal selected from cobalt, nickel, iron and alloys thereof. In specific embodiments, the first composite material and the second composite material may individually comprise metal carbides in a binder, such as a cemented carbide. | 04-10-2014 |
Patent application number | Description | Published |
20080250244 | SYSTEM AND METHOD FOR DISTRIBUTION OF CREDENTIALS - The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key. | 10-09-2008 |
20090132808 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 05-21-2009 |
20090248580 | SECURE ONLINE BANKING TRANSACTION APPARATUS AND METHOD - A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents off the inputted data. | 10-01-2009 |
20120233465 | Distribution of Credentials - The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key. | 09-13-2012 |
Patent application number | Description | Published |
20080222427 | DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE - The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information. | 09-11-2008 |
20080226076 | PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES - A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device. | 09-18-2008 |
20100125729 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 05-20-2010 |
20120326998 | MOBILE TOUCH-GENERATING DEVICE AND COMMUNICATION WITH A TOUCHSCREEN - A mobile touch-generating device having logic and a touch-generating system. The touch-generating system includes one or more touch-generating elements. The touch-generating system is operatively coupled to the logic to generate touch events via the one or more touch-generating elements, the touch events detectable by a touchscreen, such as, a capacitive sensing touchscreen. Also provided are: (i) a method of bidirectional communication between a mobile touch-generating device and a touchscreen device; and (ii) a computer readable non-transitory medium containing a computer program which, when executed, causes a computer to execute the steps of the above method. | 12-27-2012 |
20130232584 | METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING FILES - A method, a secure device and a computer program product for securely managing files. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server via a host, the host connected to the server through a telecommunication network, upon receiving a request for using a file stored on the secure device, processing the request at the secure device according to an updated use permission associated to the file, where the updated use permission is obtained by instructing at the secure device to establish a connection between the secure device and the server via the host and updating at the device the use permission associated to the file, according to permission data sent from the server through the established connection. | 09-05-2013 |
20130282762 | METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING USER ACCESS TO A FILE SYSTEM - A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server through a telecommunication network establishing a connection between the secure device and the server, receiving at the secure device, through the established connection, data pertaining to a file system identifying files which are at least partly stored outside the secure device, exposing at the secure device the file system to a user, based on the data received from the server, the file system navigable by the user. | 10-24-2013 |
20140165145 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 06-12-2014 |
20140359228 | CACHE ALLOCATION IN A COMPUTERIZED SYSTEM - A computerized system comprises a solid state memory and a controller adapted to use the solid state memory as a cache for the computerized system. The controller is adapted to add or to remove a chunk of data from the cache based on a detected frequency of occurrence of the chunk of data in the computerized system. | 12-04-2014 |
20150286837 | METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING USER ACCESS TO A FILE SYSTEM - “A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server through a telecommunication network establishing a connection between the secure device and the server, receiving at the secure device, through the established connection, data pertaining to a file system identifying files which are at least partly stored outside the secure device, exposing at the secure device the file system to a user, based on the data received from the server, the file system navigable by the user.” | 10-08-2015 |
Patent application number | Description | Published |
20110173448 | AUTHORIZATION OF SERVER OPERATIONS - An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer interface configured to connect to a local user computer for facilitating communication with the remote server via a data communications network, a user interface configured to present information to a user, and control logic. The control logic is adapted to use security data accessible to the control logic to establish, via the local user computer, a mutually-authenticated connection for encrypted end-to-end communications with the server; collect from the server, via the connection, information indicative of any operation requested via a different connection to the server and requiring authorization by the user; and present the information to the user via the user interface to prompt for authorization of the operation. | 07-14-2011 |
20120291105 | AUTHORIZATION OF SERVER OPERATIONS - An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer interface configured to connect to a local user computer for facilitating communication with the remote server via a data communications network, a user interface configured to present information to a user, and control logic. The control logic is adapted to use security data accessible to the control logic to establish, via the local user computer, a mutually-authenticated connection for encrypted end-to-end communications with the server; collect from the server, via the connection, information indicative of any operation requested via a different connection to the server and requiring authorization by the user; and present the information to the user via the user interface to prompt for authorization of the operation. | 11-15-2012 |
20130120291 | MOBILE TOUCH-GENERATING DEVICE AS SECURE LOUPE FOR TOUCHSCREEN DEVICES - A mobile touch-generating device includes logic; a touch-generating system, including one or more touch-generating elements, operatively coupled to the logic and configured to generate touch events detectable by a touchscreen, via the elements; a network connectivity device operatively coupled to the logic to establish a secure connection with a server via a telecommunication network and receive data through an established secure connection; and a visualization device connectable to the logic to display contents according to data received through the established secure connection. | 05-16-2013 |
20140109212 | AUTHORIZATION OF SERVER OPERATIONS - An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer interface configured to connect to a local user computer for facilitating communication with the remote server via a data communications network, a user interface configured to present information to a user, and control logic. The control logic is adapted to use security data accessible to the control logic to establish, via the local user computer, a mutually-authenticated connection for encrypted end-to-end communications with the server; collect from the server, via the connection, information indicative of any operation requested via a different connection to the server and requiring authorization by the user; and present the information to the user via the user interface to prompt for authorization of the operation. | 04-17-2014 |
20160070715 | STORING DATA IN A DISTRIBUTED FILE SYSTEM - A device for storing data in a distributed file system, the distributed file system including a plurality of deduplication storage devices, includes a determination unit configured to determine a characteristic of first data to be stored in the distributed file system; an identification unit configured to identify one of the deduplication storage devices of the distributed file system as deduplication storage device for the first data based on the characteristic of the first data; and a storing unit configured to store the first data in the identified deduplication storage device such that the first data and second data being redundant to the first data are deduplicatable within the identified deduplication storage device. | 03-10-2016 |