Patent application number | Description | Published |
20080216660 | Electrostatic Precipitator with Replaceable Collecting Electrode - A collecting electrode for an electrostatic precipitator in an internal combustion engine, which is easily replaceable during routine maintenance. | 09-11-2008 |
20100276352 | FUEL FILTER WITH FILTER RECOGNITION - The invention relates to a fuel filter comprising a housing, an interchangeable filter cartridge that is located in the housing, a water collection chamber and a water level sensor. Said water level sensor has two electric conductors, which can be electrically interconnected by means of water if there is a correspondingly high water level. The filter is provided with a switching element that can move between a contact position and an interruption position, said switching element making contact with the two conductors in the contact position and the contact between the switching element and at least one of the two conductors is interrupted when the switching element is in the interruption position. The electric resistance that occurs between the two conductors has a first value, when the switching element is in the first contact position and a second value that differs from the first, if the switching element is in the interruption position. | 11-04-2010 |
20110281712 | CENTRIFUGAL SEPARATOR - A centrifugal separator for separating oil mist out of the crankcase vent gas of an internal combustion engine or for separating solid contaminants out of the lubricant oil of an internal combustion engine, wherein the centrifugal separator has a rotationally drivable rotor, a housing which accommodates the rotor and a rotary drive for the rotor, wherein the rotary drive is an electric motor arranged within the housing. The centrifugal separator includes an arrangement for cooling the electric motor. | 11-17-2011 |
Patent application number | Description | Published |
20100048515 | Oxidized lipids and uses thereof in the treatment of inflammatory diseases and disorders - Novel synthetic oxidized lipids and methods utilizing oxidized lipids for treating and preventing an inflammation associated with an endogenous oxidized lipid are provided. | 02-25-2010 |
20110189212 | OXIDIZED LIPIDS AND USES THEREOF IN THE TREATMENT OF INFLAMMATORY DISEASES AND DISORDERS - Novel synthetic oxidized lipids and methods utilizing oxidized lipids for treating and preventing an inflammation associated with an endogenous oxidized lipid are provided. | 08-04-2011 |
20110195937 | OXIDIZED THIOPHOSPHOLIPID COMPOUNDS AND USES THEREOF - Novel oxidized thiophospholipids are provided herein, as well as methods for producing same, and uses thereof in treating or preventing an inflammation associated with endogenous oxidized lipids and related conditions. Exemplary oxidized thiophospholipid according to embodiments described herein have the formula: | 08-11-2011 |
20110207703 | OXIDIZED LIPID COMPOUNDS AND USES THEREOF - Novel oxidized lipids are provided herein, as well as methods for producing same, and uses thereof in treating or preventing an inflammation associated with endogenous oxidized lipids and related conditions. | 08-25-2011 |
20110230450 | PLATELET-ACTIVATING FACTOR (PAF) ANALOGS AND USES THEREOF - Disclosed are novel methods and compositions for treating inflammatory diseases and disorders, utilizing structural analogs of platelet activating factor (PAF). | 09-22-2011 |
20130172294 | Treatment with VB-201 - Unit dosage forms comprising between 1 mg and 100 mg VB-201 and a pharmaceutically acceptable carrier, and formulated for oral administration, are disclosed herein, as well as treatment regimens comprising oral administration of VB-201 once or twice daily for treating an inflammatory disease or disorder. | 07-04-2013 |
20130203707 | Oxidized Lipid Compounds and Uses Thereof - Novel oxidized lipids are provided herein, as well as methods for producing same, and uses thereof in treating or preventing an inflammation associated with endogenous oxidized lipids and related conditions. | 08-08-2013 |
Patent application number | Description | Published |
20130060934 | SECURE ELECTRONIC ELEMENT NETWORK - A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element. | 03-07-2013 |
20130061097 | SYSTEM FOR MONITORING AN OPERATION OF A DEVICE - A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path. | 03-07-2013 |
20130061290 | SYSTEM FOR SECURELY PERFORMING A TRANSACTION - A system and method for performing a transaction are described. A transaction request to perform a transaction is received. Authorization information necessary to perform the transaction is gathered and stored in a secure memory. The gathered authorization information is verified. A final command to perform the transaction is received. When the final command is received, the transaction is performed and the stored authorization information in the secure memory is erased. | 03-07-2013 |
20130061328 | INTEGRITY CHECKING SYSTEM - An integrity checking system provides improved monitoring of an electronic device for unauthorized access and modification. The integrity checking system includes a controller with a secure memory. The secure memory stores test profile information, such as test type, test subject, test action, expected test response, test frequency, and result action. The controller reads the test profile information and executes the defined tests to monitor the integrity of the device, and either permit normal operation, or execute the result action (e.g., terminate program execution) depending on the test results. | 03-07-2013 |
20130094650 | SECURE DATA TRANSFER USING RANDOM ORDERING AND RANDOM BLOCK SIZING - Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key may be determined allowing the content of other encrypted blocks to be obtained. Embodiments of a system, method and computer program product described herein can overcome this deficiency by securely transferring information through random ordering and random block sizing. An original data set to be transferred is divided into a plurality of blocks, where at least two blocks have different sizes. The blocks are encrypted and inserted into a sequence of data transfer slots. The blocks are then selected for transfer in random order by selecting a slot to transfer based on a generated random number. | 04-18-2013 |
20130145429 | System Utilizing a Secure Element - An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function. | 06-06-2013 |
20130340090 | System Utilizing A Secure Element - A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode. | 12-19-2013 |
Patent application number | Description | Published |
20140077928 | System, Method and Computer Program Product for Detecting Tampering in a Product - A system for detecting tampering in a product having a tamper-detector seal, including a secure element configured to store a digital signature and a data associated with the digital signature, transmit the digital signature and the data associated with the digital signature in response to a request, detect tampering of the tamper-detector seal, and modify the data associated with the digital signature if tampering is detected. The system further includes a seal validation device configured to receive a public key associated with the product, request the digital signature and the data associated with the digital signature from the secure element, and validate the digital signature utilizing the data associated with the digital signature and the public key associated with the product. | 03-20-2014 |
20140082720 | Method and System for Authentication of Device Using Hardware DNA - Methods and systems for authentication of a device are disclosed. An exemplary method includes transmitting an energy towards the device including a material, monitoring a response of the device to the transmitted energy, generating a signature of the device based on the response of the device to the transmitted energy, comparing the device signature to an enrolled signature for the device, and indicating that authentication of the device is successful when the generated signature matches the enrolled signature. An exemplary system includes a transmitter configured to transmit an energy towards the device, a receiver configured to monitor a response of the device, and a processor configured to generate a signature of the device based on the response of the device, compare the device signature to an enrolled signature for the device, and indicate that authentication of the device is successful when the generated signature matches the enrolled signature. | 03-20-2014 |
20140122342 | Host based content security and protection - Host based content security and protection. Security is achieved via a third-party device serving as an intermediary or host (e.g., certificate authority (CA)) between two or more user device is associated with two or more users. Any number of security measures may be employed to ensure that the content and/or identity associated with a given user is protected, including on a per communication or content basis. Various authentication, authorization, and accounting (AAA) protocols may be employed to govern the respective sharing of content and/or identity between respective users within the system, and such AAA protocols may be dynamically allocated differently with respect to different pairings of users at different respective times. In addition, with respect to digital rights management (DRM) employed to govern the security of content and/or identity between users, a third-party device (e.g., intermediary) and/or any respective user may establish specific rules for secure content and/or identity communications. | 05-01-2014 |
20140123209 | INPUT/OUTPUT GATEKEEPING - Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output (I/O) channels to host processing circuitry of a mobile communication device. The secure element includes an application executable by the secure element, the application being configured to obtain a policy via an I/O channel of the set of I/O channels. The application is further configured to prevent the host processing circuitry from accessing data corresponding to at least a portion of the set of I/O channels according to the policy. | 05-01-2014 |
20140156872 | SECURE ELEMENT SYSTEM INTEGRATED HARD MACRO - Systems and methods are provided that allow a secure processing system (SPS) to be implemented as a hard macro, thereby isolating the SPS from a peripheral processing system (PPS). The SPS and the PPS, combination, may form a secure element that can be used in conjunction with a host device and a connectivity device to allow the host device to engage in secure transactions, such as mobile payment over a near field communications (NFC) connection. As a result of the SPS being implemented as a hard macro isolated from the PPS, the SPS may be certified once, and re-used in other host devices without necessitating re-certification. | 06-05-2014 |
20140157000 | SECURE DELIVERY OF PROCESSING CODE - An apparatus may comprise a secure portion of a chip and an external memory device. The secure portion of the chip may be configured to receive an encryption key, and the memory device may be configured to receive an encrypted processing code. The secure portion of the chip may be configured to verify the encrypted processing code by decrypting the encrypted processing code using the encryption key. A non-secure portion of the chip may be configured to write the encrypted processing code on the memory device while the memory device is coupled to the chip. The encryption key may be associated with an identifier of the chip. | 06-05-2014 |
20140233732 | MOBILE PAYTV DRM ARCHITECTURE - A secure element operating in conjunction with a secure partition of a system-on-a-chip (SoC) having set top box (STB) functionality allows for digital rights management (DRM) key handling in a mobile platform. The secure element can include a secure processing system (SPS) to be implemented as a hard macro, thereby isolating the SPS from a peripheral processing system (PPS). The secure element and the secure partition of the SoC may be operatively connected by a secure cryptographic channel. | 08-21-2014 |
20140325594 | Methods and Systems for Secured Authentication of Applications on a Network - A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate with an authentication front end of a communication device. A server applet can be associated with the authentication backend. The server applet can authenticate an access right associated with the communication device and establish a security level for the communication with the communication device based on information received from the authentication front end. | 10-30-2014 |
20150271181 | System Utilizing a Secure Element - A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode. | 09-24-2015 |
Patent application number | Description | Published |
20140164639 | Method and System for Transparent Network Acceleration - A method includes duplicating, by an acceleration engine that is associated with a software application executing in a computing environment, a state of a kernel stack of an operating system of the computing environment to generate a duplicate network stack; receiving, by the acceleration engine, a request by the software application to send traffic over a network interface; and sending, by the acceleration engine, the request to a network driver relating to the network interface. | 06-12-2014 |
20140165073 | Method and System for Hardware Assisted Semaphores - A method includes receiving a request to access a resource; determining a presence of a memory buffer in a hardware-assisted memory pool; and determining a response to the request to access the resource based on the presence of the memory buffer. A system includes a plurality of processors, a resource, and a hardware-assisted memory pool including a memory buffer; one of the plurality of processors receives a request to access the resource, determines a presence of the memory buffer, and determines a response to the request to access the resource based on the presence of the memory buffer. | 06-12-2014 |
20150195122 | Method and System for Transparent Network Acceleration - A method including selecting a prospective local port from a plurality of available local ports for a computing environment; determining a hash value based on the prospective local port, the hash value being further determined based on a hash value determination method of a network interface of the computing environment; determining whether the hash value results in incoming traffic being delivered to a selected one of a plurality of cores of the computing environment; and sending data relating to an application executed by the selected core over the network interface using the prospective local port, if the hash value results in incoming traffic being delivered to the selected core. | 07-09-2015 |
Patent application number | Description | Published |
20100074387 | Frequency to Phase Converter with Uniform Sampling for all Digital Phase Locked Loops - This disclosure relates to systems and methods for frequency to phase conversion using uniform sampling, where a uniform or constant clock period is used. | 03-25-2010 |
20110081863 | Phase-Lock in All-Digital Phase-Locked Loops - This disclosure relates to an all digital phase-lock loop (ADPLL). The ADPLL determines an error generated by a digitally controlled oscillator (DCO) which is operated using a tuning word, stores information related to the error, and compensates for the error based on the stored information. | 04-07-2011 |
20130162355 | PHASE-LOCK IN ALL-DIGITAL PHASE-LOCKED LOOPS - This disclosure relates to an all digital phase-lock loop (ADPLL). The ADPLL determines an error generated by a digitally controlled oscillator (DCO) which is operated using a tuning word, stores information related to the error, and compensates for the error based on the stored information. | 06-27-2013 |
20150031315 | RF DEVICE AND METHOD WITH IMPROVED ACTIVE LOAD MODULATION CAPABILITY - There is described an RF bidirectional communication device utilizing active load modulation, the device comprising (a) a resonance circuit including an antenna ( | 01-29-2015 |