Patent application number | Description | Published |
20090153340 | METHOD AND SYSTEM FOR MANAGING A COMMUNICATION LINK IN A COMMUNICATION NETWORK - A method for managing a communication link in a communication network ( | 06-18-2009 |
20110287719 | METHOD AND SYSTEM FOR AUDIO ROUTING IN A VEHICLE MOUNTED COMMUNICATION SYSTEM - A system and method for routing audio for a vehicle mounted communication system includes activating ( | 11-24-2011 |
20120135725 | METHOD TO FACILITATE LATE JOINING OF A CALL - Methods of enabling late entry into an on-going spread spectrum call are described. A late join frame replaces, and has the same size as, a traffic frame. A late join slot in the late join frame contains sufficient information in preamble and sync subframes to permit a target to join the call. The traffic slots in the late join frame replicate data such that call quality of the call is substantially unaffected if one of the remaining traffic frames is not received. The preamble and sync subframes frequencies may be the same as, or different from, preamble and sync frames frequencies during a call establishment phase of the call. If different, the preamble and sync subframes frequencies are selected from one or more frequencies. Use of the preamble and sync subframes frequencies is compensated for when selecting the traffic slot frequencies to obtain uniform utilization of the spectrum. | 05-31-2012 |
20130136265 | METHOD AND APPARATUS FOR KEY DISTRIBUTION USING NEAR-FIELD COMMUNICATION - An apparatus and method to provision and distribute a traffic key amongst a plurality of radios enables secure communication, for a predetermined group or a predetermined event. Each radio has a controller, a radio transceiver for electromagnetic radio communications, and a near-field transceiver for near-field communications (NFC). The traffic key (or traffic keys) is provisioned locally at one radio and distributed to the remaining radios utilizing the NFC over a non propagating link. The same traffic key is distributed amongst all radios, and additional restrictions may be applied if desired. The same radios can later be re-provisioned for a different group or event. The local provisioning and distribution is highly advantageous for markets that do not require permanent assignment of radios. | 05-30-2013 |
20140345514 | SAFETY ALERT APPARATUS FOR A PORTABLE COMMUNICATION DEVICE - A safety alert device ( | 11-27-2014 |
20150140936 | TEMPERATURE MONITORING CABLE - A portable communication system ( | 05-21-2015 |
20150347152 | SYSTEM AND METHOD AND FOR SELECTING BOOT CONFIGURATION USING NEAR FIELD COMMUNICATION - A system and method to select boot configuration utilizes a processor, a near field communication (NFC) module coupled to the processor, and a near field communication (NFC) tag proximately located to the NFC module. The NFC tag operates as a system configuration tag to configure boot mode of the processor. | 12-03-2015 |
Patent application number | Description | Published |
20130161285 | AQUEOUS POLISHING COMPOSITION AND PROCESS FOR CHEMICALLY MECHANICALLY POLISHING SUBSTRATE MATERIALS FOR ELECTRICAL, MECHANICAL AND OPTICAL DEVICES - An aqueous polishing composition comprising (A) abrasive particles which are positively charged when dispersed in an aqueous medium having a pH in the range of from 3 to 9 as evidenced by the electrophoretic mobility; (B) water-soluble and water-dispersible hydroxy group containing components selected from (b1) aliphatic and cycloaliphatic hydroxycarboxylic acids, wherein the molar ratio of hydroxy groups to carboxylic acid groups is at least 1; (b2) esters and lactones of the hydroxycarboxylic acids (b1) having at least one hydroxy group; and (b3) mixtures thereof; and (C) water-soluble and water-dispersible polymer components selected from (c1) linear and branched alkylene oxide polymers; (c2) linear and branched, aliphatic and cycloaliphatic poly(N-vinylamide) polymers; and (c3) cationic polymeric flocculents having a weight average molecular weight of less than 100,000 Dalton.; and a process for polishing substrate materials for electrical, mechanical and optical devices. | 06-27-2013 |
20130168348 | AQUEOUS POLISHING COMPOSITION AND PROCESS FOR CHEMICALLY MECHANICALLY POLISHING SUBSTRATES CONTAINING SILICON OXIDE DIELECTRIC AND POLYSILICON FILMS - An aqueous polishing composition has been found, the said aqueous polishing composition comprising (A) at least one type of abrasive particles which are positively charged when dispersed in an aqueous medium free from component (B) and having a pH in the range of from 3 to 9 as evidenced by the electrophoretic mobility; (B) at least one water-soluble polymer selected from the group consisting of linear and branched alkylene oxide homopolymers and copolymers; and (C) at least one anionic phosphate dispersing agent; and a process for polishing substrate materials for electrical, mechanical and optical devices making use of the aqueous polishing composition. | 07-04-2013 |
20130171824 | PROCESS FOR CHEMICALLY MECHANICALLY POLISHING SUBSTRATES CONTAINING SILICON OXIDE DIELECTRIC FILMS AND POLYSILICON AND/OR SILICON NITRIDE FILMS - CMP process for substrates containing silicon oxide dielectric films and polysilicon and/or silicon nitride films comprising the steps of (1) contacting the substrate with an aqueous composition containing (A) abrasive particles which are positively charged when dispersed in an aqueous medium having a pH in the range of from 3 to 9; (B) a water-soluble or water-dispersible linear or branched alkylene oxide homopolymer or copolymer; and (C) a water-soluble or water-dispersible polymer selected from (c1) aliphatic and cycloaliphatic poly(N-vinylamide) homopolymers and copolymers, (c2) homopolymers and copolymers of acrylamide monomers of the general formulas I and II: H | 07-04-2013 |
20130200038 | AQUEOUS POLISHING COMPOSITION AND PROCESS FOR CHEMICALLY MECHANICALLY POLISHING SUBSTRATES FOR ELECTRICAL, MECHANICAL AND OPTICAL DEVICES - An aqueous polishing composition having a pH of 3 to 11 and comprising (A) abrasive particles which are positively charged when dispersed in an aqueous medium free from component (B) and of a pH of 3 to 9 as evidenced by the electrophoretic mobility; (B) anionic phosphate dispersing agents; and (C) a polyhydric alcohol component selected from the group consisting of (c1) water-soluble and water-dispersible, aliphatic and cycloaliphatic, monomeric, dimeric and oligomeric polyols having at least 4 hydroxy groups; (c2) a mixture consisting of (c21) water-soluble and water-dispersible, aliphatic and cycloaliphatic polyols having at least 2 hydroxy groups; and (c22) water-soluble or water-dispersible polymers selected from linear and branched alkylene oxide homopolymers and copolymers (c221); and linear and branched, aliphatic and cycloaliphatic poly(N-vinylamide) homopolymers and copolymers (c222); and (c3) mixtures of (c1) and (c2); and a process for polishing substrates for electrical, mechanical and optical devices. | 08-08-2013 |
20130200039 | AQUEOUS POLISHING COMPOSITIONS CONTAINING N-SUBSTITUTED DIAZENIUM DIOXIDES AND/OR N'-HYDROXY-DIAZENIUM OXIDE SALTS - An aqueous polishing composition comprising (A) at least one water-soluble or water-dispersible compound selected from the group consisting of N-substituted diazenium dioxides and N′-hydroxy-diazenium oxide salts; and (B) at least one type of abrasive particles; the use of the compounds (A) for manufacturing electrical, mechanical and optical devices and a process for polishing substrate materials for electrical, mechanical and optical devices making use of the aqueous polishing composition. | 08-08-2013 |
Patent application number | Description | Published |
20090028327 | SECURE CONTENT KEY DISTRIBUTION USING MULTIPLE DISTINCT METHODS - Systems and methods of secure content key distribution using multiple distinct methods are disclosed herein. Example embodiments include receiving multiple distinct control words from multiple conditional access systems and encrypting packets or a group of packets using the multiple distinct control words. | 01-29-2009 |
20090080648 | CONTROLLED CRYPTOPERIOD TIMING TO REDUCE DECODER PROCESSING LOAD - Systems and methods are disclosed for enabling encryptor devices to provide real-time messages having offset cryptoperiods according to an offset algorithm within common crypto-sync pulse boundaries. A master clock aligns the encryptor devices to a common crypto-sync pulse. Subsequently, a cryptoperiod offset aligner assigns a different offset value according to an algorithm to each encrypted service. The corresponding encryptor device then begins the cryptoperiod, during which real-time messages are transmitted, at the assigned offset value from the common crypto-sync pulse. | 03-26-2009 |
20090089369 | Apparatus for Entitling and Transmitting Service Instances to Remote Client Devices - A server in a subscriber television network receives service instances from a headend of the subscriber television network. The server is adapted to encrypt according to an encryption scheme and re-transmit service instances to a client-receiver. The server reformats the service instance from a first format into a second format the client-receiver can access the service instance. | 04-02-2009 |
20100241872 | Partially Reversible Key Obfuscation - Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is performed that encrypts a value stored in a first memory location using a value stored in the second memory location to produce an encrypted value and the value stored in the first memory location is overwritten with the encrypted value and then applying a constraining function to the value stored in the second memory location to produce a result and the value stored in the second memory location is overwritten with the result, wherein the result contains a less entropy compared an entropy level of the value in the second memory location prior to applying the constraining function. This sequence is repeated, but the values used in the first and second memory locations are used in opposite fashion. Techniques are also provided to perform the reverse operation and de-obfuscate a decryption key. | 09-23-2010 |
20110013773 | USE OF COPYRIGHT TEXT IN KEY DERIVATION FUNCTION - Consistent with embodiments of the present invention, systems and methods are disclosed for deriving a secure key. In some embodiments, a method for deriving a key may be provided comprising: generating a first input value; loading a first register with the first input value; generating a second input value; loading a second register with the second input value; updating the first register and the second register at the same time, where the step of updating comprises: applying a first update function to the current value of the second register to determine a third input value; applying an XOR function to the third input value and a fixed string to determine a fourth input value, wherein the fixed string contains a legal notice; incrementing an offset to the fixed string; storing the fourth input value in the first register; applying a second update function to the current values of the first register and the second register to determine a fifth input value; storing the fifth input value in the second register; repeating the step of updating the first register and the second register a predetermined number of times; and outputting the value of the second register as the key. | 01-20-2011 |
20110091037 | CONTENT PROTECTION KEY ENCRYPTOR FOR SECURITY PROVIDERS - Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are associated with a security provider that provides secure content to the device using the message encrypted with a device key that is securely embedded in the device and also stored on the encryption device. The encryption device is associated with a key provider and the device key is not divulged to the security provider. At the encryption device, the device key is retrieved based on the identifier. The message is encrypted with the device key using a predetermined algorithm, and the encrypted message is then sent to the control device. | 04-21-2011 |
20140245009 | Client Control Through Content Key Format - Client control may be provided. First, content may be encrypted using an actual key. Then an identifier corresponding to a client device may be received and a transformation may be performed on the actual key and the identifier to produce a transmitted key. The transmitted key and the encrypted content may then be sent to the client device where it may be received. The client device may then receive the identifier corresponding to the client device and perform a reverse transformation on the transmitted key using the identifier to produce the actual key. The content may then be decrypted with the actual key. | 08-28-2014 |