Matthew Z.
Matthew Z. Straayer, Acton, MA US
Patent application number | Description | Published |
---|---|---|
20110169340 | 2-PHASE THRESHOLD DETECTOR BASED CIRCUITS - A switched capacitor circuit includes a threshold detector to generate a threshold detection signal when a difference between first and second input signals crosses a predetermined level. A variable current source produces a varying amount of current in response to the difference between the input signals. A voltage measurement means produce a measurement signal in response to the difference between the input signals. A correction means produces a correction signal in response to the measurement signal to produce an optimum coarse phase overshoot. A timing comparison means produces a timing signal in response to the difference between the input signals. A correction means produces a correction signal in response to the timing signal to produce an optimum coarse phase overshoot. | 07-14-2011 |
Matthew Z. Tamayo-Rios, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110154505 | UNOBTRUSIVE ASSURANCE OF AUTHENTIC USER INTENT - Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions. | 06-23-2011 |
Matthew Z. Tamayo-Rios, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130067243 | Secure Data Synchronization - Techniques for secure data synchronization are described. In one or more implementations, techniques may be employed to conserve high cost data storage by storing larger portions of encrypted data in low cost storage, while storing relatively smaller encryption keys in higher cost storage. A device that is granted access to the encryption keys can retrieve the encrypted data from the low cost storage and use the encryption keys to decrypt the encrypted data. | 03-14-2013 |