Patent application number | Description | Published |
20090088967 | Systems, techniques, and methods for providing location assessments - Methods and systems for providing location assessments are provided. Example embodiments provide a Location Assessment Provider System, which generates and provides assessments of various characteristics of specified locations. In one embodiment, the Location Assessment Provider System receives a specified location, determines a location assessment for the specified location, generates a visual representation of the determined location assessment, and provides the generated visual representation to a client system. Determining a location assessment may be based on geographic-related information about, or associated with, the specified location, such as the presence and location of geographic-related features associated with the specified location. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 04-02-2009 |
20090089149 | Systems, techniques, and methods for providing location assessments - Methods and systems for providing location assessments are provided. Example embodiments provide a Location Assessment Provider System, which generates and provides assessments of various characteristics of specified locations. In one embodiment, the Location Assessment Provider System receives a specified location, determines a location assessment for the specified location, generates a visual representation of the determined location assessment, and provides the generated visual representation to a client system. Determining a location assessment may be based on geographic-related information about, or associated with, the specified location, such as the presence and location of geographic-related features associated with the specified location. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 04-02-2009 |
20130046586 | SYSTEM AND METHOD FOR ASSESSING QUALITY OF TRANSIT NETWORKS AT SPECIFIED LOCATIONS - A system and method is disclosed for generating and providing assessments of transit network characteristics for specified locations. The system receives a specified location, generates an assessment of the received location, and provides a generated visual representation of the received location to a client system. Determining a location assessment may be based on transit network information related to the distance between a specified location and the nearest point of access/egress on transit network routes that are accessible from the specified location, the frequency at which the transit network routes stop at the point of access/egress on the transit network routes that are accessible from the indicated location, or the transportation mode used for at least one of the transit network routes that are accessible from the specified location. The initial location assessment may be updated periodically, in response to changes in system status, or on demand by user request. | 02-21-2013 |
Patent application number | Description | Published |
20120276331 | CORRUGATED AND APERTURED WEB - Corrugated and apertured web materials are disclosed. More specifically, the webs comprise alternating ridges and grooves, wherein apertures are located in the grooves. In one embodiment, a web comprises alternating ridges and grooves as well as alternating regions of lower basis weight and higher basis weight. The higher basis weight regions are located in the ridges and grooves and the lower basis weight regions are located in the sidewalls between the ridges and grooves. The higher basis weight regions located in the grooves comprise apertures. The apertures have greater open area than previous apertures in similar webs. | 11-01-2012 |
20120276337 | Methods of Making Bulked Absorbent Members - Absorbent members, especially bulked absorbent members, and methods of making the same are disclosed. The absorbent member may be in the form of a unitary absorbent fibrous layer comprising at least some cellulose fibers. The unitary absorbent fibrous layer is at least partially stratified through its thickness. The absorbent member may also have a plurality of discrete deformations, such as depressions and/or apertures in its surfaces. The method involves subjecting a precursor web to at least one cycle (or pass) through a mechanical deformation process. The mechanical deformation process utilizes a first forming member and a second forming member that form a nip therebetween through which the precursor web is passed. The first and second forming members are moving at different speeds relative to each other when they come together to form the nip. | 11-01-2012 |
20120276341 | Method and Apparatus for Deforming a Web - Methods and apparatuses for deforming a web are disclosed. In one embodiment, the method involves feeding a web into a nip that is formed between at least two intermeshing rolls. The rolls are configured for deforming a web with at least two sets of deformations that are oriented in different directions relative to the surfaces of the web. | 11-01-2012 |
20120277393 | Methods of Mechanically Deforming Materials - Methods of mechanically deforming a material are disclosed. The methods of mechanically deforming a material involve using forming members that are moving at different surface speeds relative to each other to form deformed web materials. | 11-01-2012 |
20120282436 | APPARATUS AND PROCESS FOR APERTURING AND STRETCHING A WEB - Apparatuses and processes for aperturing and stretching a web are disclosed. In one embodiment, the method involves feeding a web into a nip that is formed between at least one pair of intermeshing rolls. The first roll is a raised ridge rotary knife aperturing roll and the second roll is a ring roll; both rolls comprise ridges and grooves. The first roll comprises a plurality of spaced-apart teeth extending outwardly from the top surface of the ridges, said teeth having tips, wherein the top surface of said ridges are disposed between the tips of said teeth and the bottom surface of said grooves. These apparatuses and processes enable a web to be formed which comprises apertures having greater open area than previously achievable with traditional processes and apparatuses. | 11-08-2012 |
20140120323 | Method and Apparatus for Deforming a Web - Methods and apparatuses for deforming a web are disclosed. In one embodiment, the method involves feeding a web into a nip that is formed between at least two intermeshing rolls. The rolls are configured for deforming a web with at least two sets of deformations that are oriented in different directions relative to the surfaces of the web. | 05-01-2014 |
20150230993 | Methods of Making Bulked Absorbent Members - Absorbent members, especially bulked absorbent members, and methods of making the same are disclosed. The absorbent member may be in the form of a unitary absorbent fibrous layer comprising at least some cellulose fibers. The unitary absorbent fibrous layer is at least partially stratified through its thickness. The absorbent member may also have a plurality of discrete deformations, such as depressions and/or apertures in its surfaces. The method involves subjecting a precursor web to at least one cycle (or pass) through a mechanical deformation process. The mechanical deformation process utilizes a first forming member and a second forming member that form a nip therebetween through which the precursor web is passed. The first and second forming members are moving at different speeds relative to each other when they come together to form the nip. | 08-20-2015 |
20150321414 | Method and Apparatus for Deforming a Web - Methods and apparatuses for deforming a web are disclosed. In one embodiment, the method involves feeding a web into a nip that is formed between at least two intermeshing rolls. The rolls are configured for deforming a web with at least two sets of deformations that are oriented in different directions relative to the surfaces of the web. | 11-12-2015 |
Patent application number | Description | Published |
20100091982 | DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING - Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack. | 04-15-2010 |
20110113248 | Leak-Resistant Cryptographic Token - Chip cards are used to secure credit and debit payment transaction. To prevent fraudulent transaction, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card. | 05-12-2011 |
20110138192 | Verifiable, Leak-Resistant Encryption and Decryption - This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described. | 06-09-2011 |
20110255690 | REPROGRAMMABLE SECURITY FOR CONTROLLING PIRACY AND ENABLING INTERACTIVE CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities. | 10-20-2011 |
20110264923 | SELF-PROTECTING DIGITAL CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities. | 10-27-2011 |
20120017089 | CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION - Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token. | 01-19-2012 |
20140247944 | CRYPTOGRAPHIC DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. | 09-04-2014 |
20150052368 | DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING - Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack. | 02-19-2015 |
20150178478 | PROTECTING MEDIA ITEMS USING A MEDIA SECURITY CONTROLLER - A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device. | 06-25-2015 |
20150180652 | MODULAR EXPONENTIATION OPTIMIZATION FOR CRYPTOGRAPHIC SYSTEMS - A processing device, such as logic on an integrated circuit may identify a cryptographic message stored in a first register. The processing device may determine a plurality of components for a second power of the cryptographic message using a plurality of components of the cryptographic message. The processing device may determine the plurality of components for the second power of the cryptographic message without storing the entire second power of the cryptographic message. Further, the processing device may determine a third power of the cryptographic message using modular arithmetic. The processing device may determine the third power by transforming the plurality of components for the second power of the cryptographic message and the plurality of components of the cryptographic message. | 06-25-2015 |
20150280907 | DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A device includes storage hardware to store a secret value and processing hardware coupled to the storage hardware. The processing hardware is to receive an encrypted data segment with a validator and derive a decryption key using the secret value and a plurality of entropy distribution operations. The processing hardware is further to verify, using the received validator, that the encrypted data segment has not been modified. The processing hardware is further to decrypt the encrypted data segment using the decryption key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 10-01-2015 |
20150326540 | GENERATING AND DISTRIBUTING PRE-COMPUTED DATA (PCD) ASSETS TO A TARGET DEVICE - The embodiments described herein describe technologies for pre-computed data (PCD) asset generation and secure deployment of the PCD asset to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to generate a unique PCD asset for a target device. In response, the RA device generates the PCD asset and packages the PCD asset for secure deployment of the PCD asset to the target device and to be used exclusively by the target device. The RA device deploys the packaged PCD asset in a CM system for identification and tracking of the target device. | 11-12-2015 |
20150326541 | AUDITING AND PERMISSION PROVISIONING MECHANISMS IN A DISTRIBUTED SECURE ASSET-MANAGEMENT INFRASTRUCTURE - The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD) asset. A ticket may be a digital file or data that enables enforcement of usage count limits and uniqueness issuance ore sequential issuance of target device parameters. On implementation includes an Appliance device of a cryptographic manager (CM) system that receives a Module and a ticket over a network from a Service device. The Module is an application that securely provisions a data asset to a target device in an operation phase of a manufacturing lifecycle of the target device. The ticket is digital data that grants permission to the Appliance device to execute the Module. The Appliance device verifies the ticket to execute the Module. The Module, when executed, results in a secure construction of a sequence of operations to securely provision the data asset to the target device. | 11-12-2015 |
20150326567 | MODULES TO SECURELY PROVISION AN ASSET TO A TARGET DEVICE - The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a command to create a Module and executes a Module Template to generate the Module in response to the command. The Module is deployed to an Appliance device. A set of instructions of the Module, when executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device. The Appliance device is configured to distribute the data asset to a cryptographic manager (CM) core of the target device. | 11-12-2015 |
20160026826 | BITSTREAM CONFIRMATION FOR CONFIGURATION OF A PROGRAMMABLE LOGIC DEVICE - A bitstream for configuration of a programmable logic device is received, the bitstream comprising a data segment and authentication data associated with the data segment. The programmable logic device computes a hash of the data segment. The programmable logic device compares the computed hash of the data segment with the authentication data. Configuration of the programmable logic device halts responsive to a determination that the computed hash of the data segment does not match the authentication data. Configuration of the programmable logic device using the data segment continues responsive to a determination that the computed hash of the data segment matches the authentication data. | 01-28-2016 |
20160048684 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 02-18-2016 |
Patent application number | Description | Published |
20090025547 | Highly survivable urban utility vehicle (HSUUV) - The Highly Survivable Urban Utility Vehicle (HSUUV) provides a novel way to balance the concerns of armor, mobility and cost. Prior art distributes armor to protect all areas of the vehicle evenly, thereby distributing the maximum armor weight capacity evenly. The HSUUV provides armored protection in levels, which vary depending on the location of the armor and that location's ballistic threat. Entrance to the HSUUV is located in location(s) other than the traditional side door(s) so as to provide additional armored protection in the area receiving the greatest ballistic threat. Using the HSUUV, soldiers can safely and quickly enter areas that they otherwise would have had to fight and sustain casualties to enter. The vehicle will give United States forces an unprecedented amount of flexibility, allowing for better strategic and tactical decisions. | 01-29-2009 |
20090204533 | Stock trading limit order coupled link (LOCK) - This invention has the potential to generate very good return on investments from stocks that are conservative in movement. This invention will greatly benefit investors that do not have the time to constantly trade stock yet want to take advantage of normal price fluctuations. The Limit Order Coupled LinK (LOCK) invention, for example, will take a buy order, complete the transaction at the specified price, then automatically resubmits a new order to sell at a specified higher price. If specified, the process can automatically cycle through the buy-sell process a set number of time allowing the investor to take advantage of intra-day market moves and normal stock price fluctuations with no personal investor evolvement. The LOCK order, with set profit margins, allows on-line traders and brokers to place one order, which will automatically generate logical, sequenced additional orders returning a profit on each transaction. LOCK will benefit both the investor and the stock trading company. | 08-13-2009 |
20120192708 | Reduced Size, Symmetrical and Asymmetrical Crew Compartment Vehicle Construction - A vehicle construction in which a survivability capsule and underbody V-deflector plate are located off-center relative to the vehicle providing desirable survivability and size characteristics, and minimizing overall vehicle width providing desirable maneuverability characteristics. The survivability capsule is constructed around occupants oriented to minimize capsule width and may incorporate traditional or spaced frame construction. The location of the capsule provides the ability to incorporate a large amount of storage area into the construction of the vehicle, or to use a spaced armor array on one side of the capsule providing protection from road-side threats including EFPs, RPGs, and RKG-3s. | 08-02-2012 |
20130211992 | STOCK TRADING LIMIT ORDER COUPLED LINK (LOCK) - This invention has the potential to generate very good return on investments from stocks that are conservative in movement. This invention will greatly benefit investors that do not have the time to constantly trade stock yet want to take advantage of normal price fluctuations. The Limit Order Coupled LinK (LOCK) invention, for example, will take a buy order, complete the transaction at the specified price, then automatically resubmits a new order to sell at a specified higher price. If specified, the process can automatically cycle through the buy-sell process a set number of time allowing the investor to take advantage of intra-day market moves and normal stock price fluctuations with no personal investor evolvement. The LOCK order, with set profit margins, allows on-line traders and brokers to place one order, which will automatically generate logical, sequenced additional orders returning a profit on each transaction. LOCK will benefit both the investor and the stock trading company. | 08-15-2013 |
Patent application number | Description | Published |
20090313736 | Varying thickness Helmet for reduced weight and increased protection - A helmet in which the material thickness is optimized to utilize multiple defeat mechanisms against a range of threats and to provide varying levels of protection in different areas based on the expected distribution and orientation of threats. Threat types as well as likely threat locations are both used to determine optimal material types and thickness at different points on the helmet to provide the user with the greatest overall level of personal protection possible with a helmet of a given maximum weight. | 12-24-2009 |
20090320171 | Applique body armor system (A-BAS) - The object of our invention is to provide the military wearer the option for placing hard plate body armor externally over his existing fragmentation vest. Our invention allows the wearer to select plate size and location, and then rapidly attach plates to connectors on the fragmentation vest carrier. Our invention's advantage is allowing the user to rapidly increase area of coverage and increased protection levels based on threats or special mission with no modifications to the solder's outer tactical ballistic vest. Our invention comprises at least one ballistic plate, a carrier pocket for the ballistic plate that surrounds the ballistic plate, attachment loops on the pocket, and a readily attachable and detachable mechanical attachment mechanism. The invention attaches to existing attaching points on the soldier's fragmentation vest. | 12-31-2009 |
20110315000 | ERODING PARTICLE ARMOR - A contained volume of particulate materials that is optimized for eroding ballistic penetrator, explosively formed penetrators, shaped charges, ballistic fragments, and other ballistic threats. The particulate materials include crushed garnet, crushed ceramics and sand. The volume of particulate materials may be mixed with explosive rods or pills. These explosive rods or pills ignite when the ballistic threat reaches a preset area within the armor box. Particulate material and armor boxes can consist of configurations using ballistic balls and irregular shaped stones or gravel. Alternate embodiments may contain configurations utilizing ballistic rods, electronic timing devices, and explosive detonators. | 12-29-2011 |
20120180637 | Gap armor - An armored vehicle with heavy side armor boxes and angled undercarriage armor, utilizing the chassis of overmatch armored vehicles, with a crew compartment for two, a rear door entry, and a blast gap between the side armor and crew compartment. This configuration provides for explosively formed penetrator (EFP) and improvised explosive device (IED) defeat and high levels of crew and vehicle survivability. This configuration allow a light vehicle frame such as a light pick up truck or military HMMWV to withstand very large mine, EFP, IED, and rocket propelled threats. | 07-19-2012 |
20120186425 | Embedding particle armor for vehicles - An armor package in which RPGs, shaped charges, EFPs, other jets, and small arms threats are defeated using a layered solution incorporating particles designed to embed themselves in the incoming threat, thereby disrupting and diminishing the effectiveness of the threat. Additional components of the armor are designed to work in conjunction with this effect to completely defeat the incoming threat. This armor construction can provide alternatively a higher level of protection for either a given weight or space presently required by a conventional armor solution or an equivalent level of protection in reduced space or at reduced weight than is presently achievable with conventional armor solutions. | 07-26-2012 |
20130112072 | HIGHLY SURVIVABLE URBAN UTILITY VEHICLE (HSUUV) - The Highly Survivable Urban Utility Vehicle (HSUUV) provides a novel way to balance the concerns of armor, mobility and cost. Prior art distributes armor to protect all areas of the vehicle evenly, thereby distributing the maximum armor weight capacity evenly. The HSUUV provides armored protection in levels, which vary depending on the location of the armor and that location's ballistic threat. Entrance to the HSUUV is located in location(s) other than the traditional side door(s) so as to provide additional armored protection in the area receiving the greatest ballistic threat. Using the HSUUV, soldiers can safely and quickly enter areas that they otherwise would have had to fight and sustain casualties to enter. The vehicle will give United States forces an unprecedented amount of flexibility, allowing for better strategic and tactical decisions. | 05-09-2013 |