Nin
Carol Noƫlle Nin, Indianapolis, IN US
Patent application number | Description | Published |
---|---|---|
20120285137 | GAS TURBINE ENGINE AND REHEAT SYSTEM - One embodiment of the present invention is a unique gas turbine engine. Another embodiment is a unique reheat system for a gas turbine engine. Other embodiments include apparatuses, systems, devices, hardware, methods, and combinations for gas turbine engines and reheat systems. Further embodiments, forms, features, aspects, benefits, and advantages of the present application shall become apparent from the description and figures provided herewith. | 11-15-2012 |
Frank Nin, Mission Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20110252751 | HORSE HALTER APPARATUS - A horse halter apparatus includes top nose portion with a curved rigid nose bar, a separate left chin portion with a first rigid chin bar, and a separate right chin portion with a second rigid chin bar. Soft, pliable covers enclose each rigid bar and hide the bars from view while protecting the horse's face from scratches or marks. A user holding a leash may apply pressure, via the rigid bars, in three different directions: downward, left and right. Each of the nose portion and chin portions may be adjustable in length. The rigid bars may be removable from the covers. The rigid bars may come in different configurations with varying profiles such as circular or rectangular, and may be formed with protuberances directed towards the horse's face. | 10-20-2011 |
Huaning Nin, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20110141980 | WIRELESS BROADBAND RESOURCE ALLOCATION INDEXING - Wireless broadband resource allocation indexing is generally presented. In this regard a method is introduced comprising determining a total number of allowable continuous logical resource unit (LRU) allocations for a bandwidth, removing allowable allocations to generate a set of allocations that can be indexed with fewer bits than the total number of allowable allocations, and storing an index of the set of allocations in a memory. Other embodiments are also disclosed and claimed. | 06-16-2011 |
Shu-Liang Nin, Taoyuan County TW
Patent application number | Description | Published |
---|---|---|
20090147607 | RANDOM ACCESS MEMORY AND DATA REFRESHING METHOD THEREOF - A random access memory and a data refreshing method thereof are provided. The random access memory includes a memory array having a plurality of word lines; a control logic unit which is used for outputting a refreshment indicating signal, a thermal sensor which is used for outputting a temperature indicating signal; a refresh counter which is used for outputting a row address counting signal; and a row address decoder which is used for performing a decoding operation on the row address counting signal in response to the refreshment indicating signal and the temperature indicating signal, and simultaneously enabling the plurality of word lines of the memory array based on a result of the decoding operation. | 06-11-2009 |
20090166847 | SEMICONDUCTOR CHIP PACKAGE - A semiconductor chip package is provided. The semiconductor chip package comprises a package substrate having a first surface and a second surface opposite to the first surface. A through hole extends through the package substrate. A semiconductor chip is disposed on the first surface of the package substrate, wherein a bottom surface of the semiconductor chip covers one end of the through hole. At least two bonding fingers are disposed on the second surface of the package substrate and arranged on sides of the through hole. A conductive line is disposed on the second surface of the package substrate and between the two bonding fingers and the through hole, wherein two terminals of the conductive line are electrically connected to the two bonding fingers, respectively. | 07-02-2009 |
20090168579 | RANDOM ACCESS MEMORY DATA RESETTING METHOD - A random access memory data resetting method is provided. The method includes following steps. First, a state machine resetting signal is provided to a RAM. Next, the state machine resetting signal is extended for a predetermined time period. Afterwards, a data resetting operation is executed in the RAM within the predetermined time period. | 07-02-2009 |
20090175102 | METHOD FOR CONTROLLING ACCESS OF A MEMORY - A memory access control method is provided. By decoding a read-write command, a mode register set (MRS) signal is generated. When the MRS signal is enabled, a latch outputs a bank-select signal. The bank-select signal is then decoded to generate a register-select signal. Then, an address signal is written into a register selected by the register-select signal. The value of a certain register can be used to determine whether to enable the error check function. Thus, the next generation memory structure with the CRC function can be compatible with the conventional memory structure. | 07-09-2009 |
20120068719 | MEASURED DEVICE AND TEST SYSTEM UTILIZING THE SAME - A measured device coupled to test equipment providing at least two test factors and receiving a test result is disclosed. The measured device includes a combinatorial logic circuit and a main circuit. The combinatorial logic circuit includes a first storage module and a second storage module. The first storage module stores the test factors according to a first operation clock. The second storage module stores and outputs at least two output factors according to a second operation clock. The frequency of the second operation clock is higher than the frequency of the first operation clock. When the test factors are stored in the first storage module, the test factors stored in the first storage module are served as the output factors and the output factors are output and stored in the second storage module. The main circuit generates the test result according to the output factors output by the second storage module. The test equipment obtains information as to whether the main circuit is normal according to the test result. | 03-22-2012 |
20120267776 | CHIP STACK PACKAGE - A chip stack package is provided. The chip stack package includes an n number of chips stacked on each other and an n number of interconnection strands connecting the chips. The interconnection strands are spirally rotated and insulated from each other. In one embodiment, the chips are substantially structurally identical. In another embodiment, each of the interconnection strands is electrically coupled to a chip selection signal. | 10-25-2012 |
Sigfredo I. Nin, Morgan Hill, CA US
Patent application number | Description | Published |
---|---|---|
20090138731 | Tamper-Resistant Trusted JAVA Virtual Machine And Method Of Using The Same - A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary. | 05-28-2009 |
20090323970 | SYSTEM AND METHOD FOR PROTECTING DATA IN A SECURE SYSTEM - A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets. | 12-31-2009 |
Sigfredo I. Nin, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140052996 | EXTENDING THE NUMBER OF APPLICATIONS FOR ACCESSING PROTECTED CONTENT IN A MEDIA USING MEDIA KEY BLOCKS - Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content. | 02-20-2014 |
Sigfredo Ismael Nin, Morgan Hill, CA US
Patent application number | Description | Published |
---|---|---|
20100183148 | RECORDING KEYS IN A BROADCAST-ENCRYPTION-BASED SYSTEM - According to one embodiment of the present invention, a method for protecting content in a broadcast-encryption-based system, where the devices in the system receive a recording key table. Each device generates a set of recording keys from the recording key table using a media key variant calculated from the broadcast encryption system's media key block. The digital content is encrypted in a title key picked by the recorder. The selected title key is also encrypted in each one of the recorder's generated recording keys. To play back the content, a player uses one of its generated recording keys to decrypt the title key and the decrypt the content. The recording key table is designed so that any two devices are guaranteed to have at least one key in common during normal operation, although during a forensic situation, this rule can be abandoned. | 07-22-2010 |
20110158404 | REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS - According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device. | 06-30-2011 |