Patent application number | Description | Published |
20090027881 | THEATRE LIGHT APPARATUS INCORPORATING LED TRACKING SYSTEM - A multiparameter light is disclosed, which incorporates an LED (light emitting diode) tracking ring surrounding a main output lens. The LED tracking ring is capable of additive color mixing and in turn can simulate the color of the main projected light projecting from the main output aperture or output lens of the multiparameter light. | 01-29-2009 |
20090190345 | MULTIPARAMETER STAGE LIGHTING APPARATUS WITH GRAPHICAL OUTPUT - A multiparameter stage lighting apparatus is provided comprising a lamp housing, which may include a plurality of sets of light emitting diodes, each set of light emitting diodes having a plurality of colors, the plurality of sets of light emitting diodes forming an additive color mixing system. The multiparameter stage lighting apparatus may further include a plurality of pie shaped light emitting circuit boards, one light emitting circuit board for each set of the plurality of sets of light emitting diodes, each set of the plurality of sets of light emitting diodes mounted to its respective light emitting circuit board. The multiparameter stage lighting apparatus may further include a plurality of light emitting diode signaling circuit boards, one for each of the plurality of pie shaped light emitting circuit boards. Each of the plurality of light emitting diode signaling circuit boards may be connected to its corresponding pie shaped light emitting circuit boards by a corresponding one of a plurality of multiconductor cables. | 07-30-2009 |
20120020072 | MULTIPARAMETER STAGE LIGHTING APPARATUS WITH GRAPHICAL OUTPUT - A multiparameter stage lighting apparatus is provided comprising a lamp housing, which may include a plurality of sets of light emitting diodes, each set of light emitting diodes having a plurality of colors, the plurality of sets of light emitting diodes forming an additive color mixing system. The multiparameter stage lighting apparatus may further include a plurality of pie shaped light emitting circuit boards, one light emitting circuit board for each set of the plurality of sets of light emitting diodes, each set of the plurality of sets of light emitting diodes mounted to its respective light emitting circuit board. The multiparameter stage lighting apparatus may further include a plurality of light emitting diode signaling circuit boards, one for each of the plurality of pie shaped light emitting circuit boards. | 01-26-2012 |
20130182429 | PROGRAMMABLE DE-FOGGER SYSTEM FOR A LIGHT PROJECTOR - A light projector for operation during a show that contains theatrical haze. The light projector may include a light source, a lens, a fan, and a housing having an inner chamber. The lens may have a first side and a second side. The first side of the lens may be contained within the inner chamber of the housing. The second side the lens may be outside of the inner chamber of the housing. The fan may be configured to be operated to generate air flow inside the inner chamber of the housing. A substantial portion of the air flow may be directed to impinge upon the first side of the lens to cause de-fogging of theatrical haze condensate on the first side of the lens. | 07-18-2013 |
Patent application number | Description | Published |
20120265517 | Dedicated Memory Window for Emulation Address - This invention allows code emulation in a memory system by implementing a fixed location and size emulation segment that is only accessible to emulation requests, and may be mapped to any area of the physical memory space by the Extended Memory Controller. All areas of the memory space are visible to the emulation process, whether there is a functional segment mapped to that area or not. | 10-18-2012 |
20140032974 | METHOD FOR GENERATING DESCRIPTIVE TRACE GAPS - A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and inserting a trace data gap into the trace data stream. The gap may contain additional information relating to the amount and type of data that is being lost during the overflow condition. In an alternate embodiment the generated trace may be throttled to ensure the available bandwidth is not exceeded. | 01-30-2014 |
20140053023 | PSEUDO DEDICATED DEBUG PORT WITH AN APPLICATION INTERFACE - A method is shown to provide remote access to one or more debug access points whose functions include capabilities other than accessing memories across an application interface such as USB, IEEE 802.3 (Ethernet) and other protocols. The capabilities available include all or many of the capabilities provided by a dedicated debug interface. | 02-20-2014 |
20140095940 | DEBUG TRACE STREAM TIMESTAMPING USING DOWNSTREAM CORRELATION - A method of correlating the timing of multiple interleaved trace data streams. A Time Stamp Trace stream logic monitors the event trace stream for a synchronization point. When a synchronization point is detected a time stamp value is inserted into the trace stream along with any relevant identification markers available in the detected synchronization point. | 04-03-2014 |
20140115397 | DEBUG TRACE STREAM TIMESTAMPING USING UPSTREAM CORRELATION - A method of correlating the timing of multiple interleaved trace data streams. A Time Stamp Trace stream logic monitors the event trace stream for a synchronization request. When a synchronization request, a CTI trigger or both are detected the EEP ID is incremented and the time stamp value is inserted into the trace stream along with the EEP ID and any relevant identification markers available in the detected synchronization request. | 04-24-2014 |
20140157039 | USING DATA WATCHPOINTS TO DETECT UNITIALIZED MEMORY READS - A method of detecting uninitialized memory reads is shown where either all or a subset of a random access memory system is initialized to a know value. One or more watch points are implemented where after a memory read is detected the value read is compared to the value written during initialization. If the values match debug information is captured and appropriate corrective action is taken. | 06-05-2014 |
20150113336 | METHOD FOR GENERATING DESCRIPTIVE TRACE GAPS - A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and inserting a trace data gap into the trace data stream. The gap may contain additional information relating to the amount and type of data that is being lost during the overflow condition. In an alternate embodiment the generated trace may be throttled to ensure the available bandwidth is not exceeded. | 04-23-2015 |
20150212921 | DEBUG TRACE STREAM TIMESTAMPING USING DOWNSTREAM CORRELATION - A method of correlating the timing of multiple interleaved trace data streams. A Time Stamp Trace stream logic monitors the event trace stream for a synchronization point. When a synchronization point is detected a time stamp value is inserted into the trace stream along with any relevant identification markers available in the detected synchronization point. | 07-30-2015 |
Patent application number | Description | Published |
20110289324 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 11-24-2011 |
20120159192 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 06-21-2012 |
20140177842 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 06-26-2014 |
Patent application number | Description | Published |
20090316907 | SYSTEM AND METHOD FOR AUTOMATED VALIDATION AND EXECUTION OF CRYPTOGRAPHIC KEY AND CERTIFICATE DEPLOYMENT AND DISTRIBUTION - A method for automated validation and execution of cryptographic key and certificate deployment and distribution includes providing one or more keys; providing one or more key deployment points; and distributing the one or more keys to the one or more key deployment points in an automated manner based on a matrix or pattern mapping of each of the one or more keys to be distributed to each of the one or more key deployment points. | 12-24-2009 |
20110258458 | METHOD AND APPARATUS FOR MANAGING KEYS USED FOR ENCRYPTING DATA - A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information. | 10-20-2011 |
20120170749 | SECURE MANAGEMENT OF KEYS IN A KEY REPOSITORY - A method, system or computer usable program product for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity. | 07-05-2012 |
20120191985 | Managing Keys used for Encrypting Data - A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information. | 07-26-2012 |
20120213369 | SECURE MANAGEMENT OF KEYS IN A KEY REPOSITORY - A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity. | 08-23-2012 |
Patent application number | Description | Published |
20130044878 | Extending credential type to group key management interoperability protocol (KMIP) clients - A key management protocol (such as KMIP) is extended to provide an extended credential type to pass information from clients to the server to enable the server to deduce pre-provisioned cryptographic materials for the individual clients. Preferably, KMIP client code communicates device information to a key management server in a value in the headers of KMIP requests that flow to the server. In this manner, KMIP requests are associated with pre-provisioned cryptographic materials for particular devices or device groups. | 02-21-2013 |
20130044882 | Enhancing provisioning for keygroups using key management interoperability protocol (KMIP) - A key management protocol (such as Key Management Interoperability Protocol (KMIP)) is extended via set of one or more custom attributes to provide a mechanism by which clients pass additional metadata to facilitate enhanced key provisioning operations by a key management server. The protocol comprises objects, operations, and attributes. Objects are the cryptographic material (e.g., symmetric keys, asymmetric keys, digital certificates and so on) upon which operations are performed. Operations are the actions taken with respect to the objects, such as getting an object from a key management server, modifying attributes of an object and the like. Attributes are the properties of the object, such as the kind of object it is, the unique identifier for the object, and the like. According to this disclosure, a first custom server attribute has a value that specifies a keygroup name that can be used by the key management server to locate (e.g., during a Locate operation) key material associated with a named keygroup. A second custom server attribute has a value that specifies a keygroup name into which key material should be registered (e.g., during a Register operation) by the server. A third custom server attribute has a value that specifies a default keygroup that the server should use for the device passing a request that include the attribute. Using these one or more custom server attributes, the client taps into and consumes/contributes to the key management server's provisioning machinery. | 02-21-2013 |
20150180656 | Using key material protocol services transparently - An application that consumes key management information (e.g., keys and certificates) through a conventional keystore API is configured to recognize a new keystore type. In addition, the services of that API are pointed to a management server component associated with a key management protocol (e.g., KMIP), and a client component of the key management protocol is instantiated as a “semi-remote” keystore in association with the application. Once configured to use the new keystore type, the consuming application uses the keystore API in a conventional manner, but calls to the new keystore type are directed to the KMIP client. The client intercepts these calls and then interacts with the KMIP server on behalf of the consuming application, and without the application being aware of the interaction over the KMIP client-server API. This approach enables the consuming application to take advantage of the full benefits provided by the key management protocol transparently. | 06-25-2015 |
Patent application number | Description | Published |
20090183140 | Automatic generation of application domain specific graphical programs - System and method for generating an application domain specific graphical program. A graphical user interface (GUI) for specifying functionality of a graphical program in an application domain is displayed, where the GUI corresponds specifically to the application domain. User input to the GUI specifying the functionality of the graphical program is received, and the graphical program generated in response, where the graphical program is executable to perform the specified functionality, and comprises multiple interconnected graphical program nodes that visually represent the graphical program functionality. The GUI includes graphical interface elements operable to indicate and/or specify, e.g., via user input, respective attributes of the graphical program such as timing, triggering, analog and/or digital input/output (I/O), resource allocation, processing option, inclusion of one or more external files, and one or more target devices, among others, and may determine the graphical interface elements based on the specified one or more target devices. | 07-16-2009 |
20110078662 | Debugging a Graphical Program Deployed on a Programmable Hardware Element - Debugging a graphical program deployed on a programmable hardware element. The graphical program may be received. The graphical program may include a plurality of nodes and connections between the nodes which visually represents functionality of the graphical program. A hardware description may be generated based on the graphical program. The hardware description may describe a hardware implementation of the graphical program. The hardware description may be deployed to the programmable hardware element and the programmable hardware element may be executed. The graphical program may be displayed on a display of a host computer system that is coupled to the programmable hardware element. Debugging information may be received from the programmable hardware element during said executing. The debugging information from the programmable hardware element may be displayed in the graphical program displayed on the display. The displayed debugging information may be used to debug the hardware implementation of the graphical program. | 03-31-2011 |
Patent application number | Description | Published |
20090210826 | Network-Based System for Automatically Generating a Graphical Program Based on User Supplied Measurement Task Requirements - A system and method for online configuration of a measurement system. The user may access a server over a network and specify a desired task, e.g., a measurement task, and receive programs and/or configuration information which are usable to configure the user's measurement system hardware (and/or software) to perform the desired task. Additionally, if the user does not have the hardware required to perform the task, the required hardware may be sent to the user, along with programs and/or configuration information. The hardware may be reconfigurable hardware, such as an FPGA or a processor/memory based device. In one embodiment, the required hardware may be pre-configured to perform the task before being sent to the user. In another embodiment, the system and method may provide a graphical program in response to receiving the user's task specification, where the graphical program may be usable by the measurement system to perform the task. | 08-20-2009 |
20100023866 | Network-Based System for Configuring a Programmable Hardware Element in a Measurement System using Hardware Configuration Programs Generated Based on a User Specification - A system and method for online configuration of a measurement system. The user may access a server over a network and specify a desired task, e.g., a measurement task, and receive programs and/or configuration information which are usable to configure the user's measurement system hardware (and/or software) to perform the desired task. Additionally, if the user does not have the hardware required to perform the task, the required hardware may be sent to the user, along with programs and/or configuration information. The hardware may be reconfigurable hardware, such as an FPGA or a processor/memory based device. In one embodiment, the required hardware may be pre-configured to perform the task before being sent to the user. In another embodiment, the system and method may provide a graphical program in response to receiving the user's task specification, where the graphical program may be usable by the measurement system to perform the task. | 01-28-2010 |
20100088194 | Network-based configuration of a system using software programs generated based on a user specification - A system and method for online configuration of a measurement system. The user may access a server over a network and specify a desired task, e.g., a measurement task, and receive programs and/or configuration information which are usable to configure the user's measurement system hardware (and/or software) to perform the desired task. Additionally, if the user does not have the hardware required to perform the task, the required hardware may be sent to the user, along with programs and/or configuration information. The hardware may be reconfigurable hardware, such as an FPGA or a processor/memory based device. In one embodiment, the required hardware may be pre-configured to perform the task before being sent to the user. In another embodiment, the system and method may provide a graphical program in response to receiving the user's task specification, where the graphical program may be usable by the measurement system to perform the task. | 04-08-2010 |