Patent application number | Description | Published |
20120098651 | Method and Apparatus for Displaying System Status with a Wide Range of Viewing Angle - A network device and method for improving performance monitoring capabilities using wide view angle indicators are disclosed. The network device or system, in one embodiment, includes a first plate, a second plate, and a first light source. The first plate includes an edge lip or lip containing a graphic viewing surface. Various ultraviolet (“UV”) inked icons indicating functional performance are inscribed in or on the graphic viewing surface. The second plate is situated substantially perpendicular to the first plate, wherein an edge of the second plate is positioned adjacent to the graphic viewing surface. The first light source is configured to selectively project a UV light onto at least a portion of the graphic viewing surface to active at least one UV inked icon. | 04-26-2012 |
20120098673 | Method and Apparatus for Displaying System Status with a Wide Range of Viewing Angle - Network device includes a plate, an OTST plate, and a light source. First plate is situated at a first side of the network device wherein the first side can be the front side of device. OTST plate is situated at a second side of the network device and positioned substantially perpendicular to the plate, wherein the OTST plate having a first surface and a second surface further includes status indicators showing performance status associated with the network device. The light source, in one embodiment, can be an LED device capable of projecting a light beam with a predefined angle onto the first surface of OTST plate illuminating one or more status indicators. At least one status indicator is viewable from the second surface or bottom surface of OTST second plate when at least a portion of OTST plate is illuminated. | 04-26-2012 |
20140035757 | Method and Apparatus for Displaying System Status with a Wide Range of Viewing Angle - Network device includes a plate, an OTST plate, and a light source. First plate is situated at a first side of the network device wherein the first side can be the front side of device. OTST plate is situated at a second side of the network device and positioned substantially perpendicular to the plate, wherein the OTST plate having a first surface and a second surface further includes status indicators showing performance status associated with the network device. The light source, in one embodiment, can be an LED device capable of projecting a light beam with a predefined angle onto the first surface of OTST plate illuminating one or more status indicators. At least one status indicator is viewable from the second surface or bottom surface of OTST second plate when at least a portion of OTST plate is illuminated. | 02-06-2014 |
20140035758 | Method and Apparatus for Displaying System Status with a Wide Range of Viewing Angle - A network device and method for improving performance monitoring capabilities using wide view angle indicators are disclosed. The network device or system, in one embodiment, includes a first plate, a second plate, and a first light source. The first plate includes an edge lip or lip containing a graphic viewing surface. Various ultraviolet (“UV”) inked icons indicating functional performance are inscribed in or on the graphic viewing surface. The second plate is situated substantially perpendicular to the first plate, wherein an edge of the second plate is positioned adjacent to the graphic viewing surface. The first light source is configured to selectively project a UV light onto at least a portion of the graphic viewing surface to active at least one UV inked icon. | 02-06-2014 |
Patent application number | Description | Published |
20080215891 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 09-04-2008 |
20080301452 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 12-04-2008 |
20090178022 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 07-09-2009 |
20100229002 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 09-09-2010 |
20100268958 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 10-21-2010 |
20110035733 | Software Self-Defense Systems and Methods - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 02-10-2011 |
20130191644 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 07-25-2013 |
20130232343 | SOFTWARE SELF-DEFENSE SYSTEMS AND METHODS - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 09-05-2013 |
Patent application number | Description | Published |
20100302600 | SYSTEM AND METHOD FOR EMBEDDING INFORMATION IN A PRINTED MEDIA - A system and method is disclosed for embedding information in a printed media. The method discloses using a print production system to apply a first set of physical structures for carrying a first data stream onto a media; and using the print production system to apply a second set of physical structures which both carries a second data stream onto the media and also performs at least one other print production function. The system discloses a printing mechanism for applying a first set of physical structures modulated by a first data stream onto a media, thereby creating a printed media; and a coating mechanism for applying a second set of physical structures modulated by a second data stream onto the printed media, thereby creating a coated printed media. | 12-02-2010 |
20110279866 | METHOD OF PROCESSING A PRINT JOB - The present invention is drawn to a method of processing a print job. The method includes encoding a print job post-print processing instructions. The method additionally includes printing the print job including the post-print processing instructions on a media substrate. The post-print processing instructions can be printed with a non-visible ink. The post-print processing instructions can be read, and the post-print processing can be performed according to the instructions. | 11-17-2011 |
20120107008 | PRINTERS AND APPARATUS TO REDUCE EMISSIONS FROM A PRINT SUBSTRATE EXIT PORT - Printers and apparatus to reduce emissions from a print substrate exit port are disclosed. An example apparatus to reduce emissions from a print substrate exit port includes a first member coupled to a hinge adjacent a printer substrate exit port, the first member to substantially cover a travel path of a print substrate in a first position and to pivot from the exit travel path of the print substrate in response to air pressure associated with the print substrate when the print substrate travels through the print substrate exit port. | 05-03-2012 |
20140369717 | Printing With Metal-Surface Charge Element in Glow Discharge Regime - Techniques related to printing using a metal-surface charge element. A metal-surface charge element includes at least one metal charge roller to deposit electric charge on an imaging surface. Each metal charge roller includes a metal external surface in charge-transferring relation with the imaging surface and in a glow discharge regime during operation of the printing system for printing. | 12-18-2014 |
20150037070 | Printing Using a Metal-Surface Charging Element - Techniques related to printing using a metal-surface charging element. A printing system includes a metal-surface charging element and a power supply. The charging element is disposed to deposit electric charge on an imaging surface. The power supply may provide electric power with an alternating current (AC) component and a direct current (DC) component to the charging element. | 02-05-2015 |