Patent application number | Description | Published |
20090062210 | Methods for promoting erythropoiesis - The present invention provides methods, compounds, pharmaceutical compositions, and kits for the augmentation of erythropoiesis by potentiating erythropoietin-induced differentiation with angiotensinogen, angiotensin I (AI), AI analogues, AI fragments and analogues thereof, angiotensin II analogues, AII fragments or analogues thereof or AII AT | 03-05-2009 |
20090069246 | Methods for promoting hematopoietic and mesenchymal cell proliferation and differentiation - The present invention provides methods, improved cell culture medium and kits for promoting hematopoietic and mesenchymal stem and lineage-specific cell proliferation and differentiation by growth in the presence of angiotensinogen, angiotensin I (AI), AI analogues, AI fragments and analogues thereof, angiotensin II (AII), AII analogues, AII fragments or analogues thereof or AII AT | 03-12-2009 |
20120071397 | Methods for Hematopoietic Stem Cell Transplantation - The present invention provides methods for treating a subject undergoing hematopoietic stem cell transplantation, methods for increasing a subject's resistance to bacterial or viral infection during and/or following hematopoietic stem cell transplantation, and methods for treating norovirus infection. | 03-22-2012 |
20120329729 | Methods for treating diabetic foot ulcers - The present invention provides methods and pharmaceutical formulations for treating diabetic foot ulcers. | 12-27-2012 |
20130123190 | Methods for Treating Combined Radiation and Thermal Injury - The present invention provides methods for treating a subject that has suffered combined exposure to total body ionizing irradiation and burns. | 05-16-2013 |
20130230485 | Methods for Treating Patients Undergoing Multi-Cycle Chemotherapy - The present invention provides methods for treating a patient undergoing multi-cycle chemotherapy that provides significantly improved platelet counts in the patients, and facilitates retention of dose intensity from cycle to cycle of the chemotherapy. | 09-05-2013 |
20140031286 | Angiotensin (1-7) Dosage Forms and Uses Thereof - The present invention provides angiotensin (1-7) pharmaceutical compositions, dosage forms, and methods for their use, and methods for treating or limiting development of acquired immune deficiency syndrome. | 01-30-2014 |
20140205631 | Stimulation of vaccination by angiotensin peptides - The present invention provides angiotensin peptide compositions and methods for use of the compositions in vaccination. | 07-24-2014 |
20150147283 | Methods for limiting development of a skin wound - The present invention provides methods for limiting development of skin wounds, and also for treatment of one or more of erythemas, blisters, rashes, pruritis, contact dermatitis, psoriasis, eczema, acne, and athlete's foot. | 05-28-2015 |
Patent application number | Description | Published |
20090147985 | METHOD AND SYSTEM FOR secure WATERMARK EMBEDDING AND EXTRACTION DATA FLOW ARCHITECTURE - Methods and systems for secure watermark embedding and extraction data flow architecture are disclosed and may include embedding a watermark in a video signal utilizing an embedded CPU. The embedded CPU may be controlled utilizing a security processor via a secure bus. The watermark may be embedded in a compressed video signal that may be diverted around a compression/decompression engine. The watermark may be embedded in a decompressed video signal and may be directed through a compression/decompression engine. Requests may be sent to the embedded CPU from the main CPU via the security processor and the secure bus. The watermark may be encrypted utilizing the security processor. The secure bus may be inaccessible to the main CPU or any device not on the chip. The chip may be disabled when the embedded CPU may be disabled. Sections of the video signal may be classified and selected for embedding. | 06-11-2009 |
20090150676 | METHOD AND SYSTEM FOR ROBUST WATERMARK INSERTION AND EXTRACTION FOR DIGITAL SET-TOP BOXES - Methods and systems for robust watermark insertion and extraction for digital set-top boxes are disclosed and may include descrambling, detecting watermarking messages in a received video signal utilizing a watermark message parser, and immediately watermarking the descrambled video signal utilizing an embedded CPU. The embedded CPU may utilize code that may be signed by an authorized key, encrypted externally to the chip, decrypted, and stored in memory in a region off-limits to other processors. The video signal may be watermarked in a decompressed domain. The enabling of the watermarking may be verified utilizing a watchdog timer. The descriptors corresponding to the watermarking may be stored in memory that may be inaccessible by the main CPU. The watermark may comprise unique identifier data specific to the chip and a time stamp, and may be encrypted utilizing an on-chip combinatorial function. | 06-11-2009 |
20090187704 | METHOD AND SYSTEM FOR SECURE CODE ENCRYPTION FOR PC-SLAVE DEVICES - A PC-slave device may securely load and decrypt an execution code and/or data, which may be stored, encrypted, in a PC hard-drive. The PC-slave device may utilize a dedicated memory, which may be partitioned into an accessible region and a restricted region that may only be accessible by the PC-slave device. The encrypted execution code and/or may be loaded into the accessible region of the dedicated memory; the PC-slave device may decrypt the execution code and/or data, internally, and store the decrypted execution code and/or data into the restricted region of the dedicated memory. The decrypted execution code and/or data may be validated, and may be utilized from the restricted region. The partitioning of the dedicated memory, into accessible and restricted regions, may be performed dynamically during secure code loading. The PC-slave device may comprise a dedicated secure processor that may perform and/or manage secure code loading. | 07-23-2009 |
20100083387 | METHOD AND SYSTEM FOR A SECURE POWER MANAGEMENT SCHEME - A security processor integrated within a system may be securely shut down. The security processor may receive shut down requests, and may determine components and/or subsystems that need be shut down during shut down periods. The security processor may determine when each of the relevant components is ready for shut down. Once the relevant components are shut down, the security processor may itself be shut down, wherein the shut down of the security processor may be performed by stopping the clocking of the security processor. A security error monitor may monitor the system during shut down periods, and the security processor may be powered back on when security breaches and/or threats may be detected via the security error monitor. The security error monitor may be enabled to power on the security processor by reactivating the security processor clock, and the security processor may then power on the system. | 04-01-2010 |
20110197054 | METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures. | 08-11-2011 |
20110197069 | METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS - Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box. | 08-11-2011 |
20110219242 | METHOD AND SYSTEM FOR MANAGING SECURE CODE LOADING IN PC-SLAVE DEVICES - A secure processor in a PC-slave device may manage secure loading of execution code and/or data, which may be stored, in encrypted form, in a PC hard-drive. The secure processor may cause decryption of the execution code and/or data by the PC-slave device, and storage of the decrypted execution code and/or data in a restricted portion of a memory that is dedicated for use by the PC-slave device, with the restricted portion of the dedicated memory being only accessible by the PC-slave device. The secure processor may validate decrypted execution code and/or data. The secure processor may block operations of a main processor in the PC-slave device during secure loading of execution code and/or data, and may discontinue that blocking after validating the decrypted execution code and/or data. The secure processor may store encryption keys that are utilized during decryption of the encrypted execution code and/or data. | 09-08-2011 |
20120030391 | METHOD AND SYSTEM FOR MEMORY ATTACK PROTECTION TO ACHIEVE A SECURE INTERFACE - A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device and the host device over that coupling. An integrated memory within the slave device may be configured into a plurality of memory portions or regions based on the received commands. The memory regions may be utilized during operations associated with authentication of subsequent commands from the host device. A first memory region may enable storage of encrypted host commands and data. A second region may enable storage of decrypted host commands and data. A third region may enable storage of internal variables and/or intermediate results from operations performed by the slave device. Another region may comprise internal registers that enable storage of information only accessible to the slave device. Access to some of the memory regions may be controlled and/or restricted by the slave device | 02-02-2012 |
20120216034 | METHOD AND SYSTEM FOR SECURING COMMUNICATION ON A HOME GATEWAY IN AN IP CONTENT STREAMING SYSTEM - A home gateway, which enables communication with a plurality of devices, recovers a root-content key from a key server of a service provider for secure delivery of content requested by a client device. The recovered root-content key is utilized to generate a content key for corresponding content scrambling. The home gateway communicates the scrambled content to the client device. The home gateway utilizes the RSA protocol to request the root-content key from the key server. The root-content key is recovered from the received key index. The content key is encrypted utilizing a public key and delivered to the client device. The key server distributes the public key to the gateway through authentication messages. The client device utilizes its own private key to recover the content key by decrypting the encrypted content key. The scrambled content from the home gateway is descrambled using the recovered content key for content consumption. | 08-23-2012 |
20120216038 | UNIFIED VIDEO DELIVERY SYSTEM FOR SUPPORTING IP VIDEO STEAMING SERVICE - A home gateway may be used to handle at least a portion of processing of content obtained for consumption by client devices serviced via the home gateway. The home gateway may receive a single copy of content having a first format, and may convert the received content to one or more other formats suitable for presentation by at least one of the client devices based on knowledge of the client devices. The home gateway may maintain secure and/or protected access of the content handled via the home gateway. During protected access the home gateway may partition the content into a plurality of encrypted segments that are forwarded separately to the client devices. The client devices may utilize a corresponding plurality of encryption keys for decrypting the encrypted segments. The encryption keys may be obtained from an external key server. The home gateway may also generate the encryption keys. | 08-23-2012 |
20120328149 | Method and System for Robust Watermark Insertion and Extraction for Digital Set-Top Boxes - Methods and systems for robust watermark insertion and extraction for digital set-top boxes are disclosed and may include descrambling, detecting watermarking messages in a received video signal utilizing a watermark message parser, and immediately watermarking the descrambled video signal utilizing an embedded CPU. The embedded CPU may utilize code that may be signed by an authorized key, encrypted externally to the chip, decrypted, and stored in memory in a region off-limits to other processors. The video signal may be watermarked in a decompressed domain. The enabling of the watermarking may be verified utilizing a watchdog timer. The descriptors corresponding to the watermarking may be stored in memory that may be inaccessible by the main CPU. The watermark may comprise unique identifier data specific to the chip and a time stamp, and may be encrypted utilizing an on-chip combinatorial function. | 12-27-2012 |
20130007452 | METHOD AND SYSTEM FOR COMMAND AUTHENTICATION TO ACHIEVE A SECURE INTERFACE - Aspects of a method and system for command authentication to achieve a secure interface are provided. Command authentication between a host and a slave device in a multimedia system may be achieved by on-the-fly pairing or by an automatic one-time-programming via a security processor. In an on-the-fly pairing scheme, the host may generate a host key based on a host root key and host control words while the slave may generate slave key based the host key, a slave root key and slave control words. The slave key may be stored and later retrieved by the slave device to obtain the host key for authenticating host commands. The host may be disabled from generating and/or passing the host key to the slave. In an automatic one-time programming scheme, the security processor may burn a random number onto a onetime-programmable memory in the host and slave devices for command authentication. | 01-03-2013 |
20130185550 | METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code. | 07-18-2013 |
20130290637 | PER PROCESSOR BUS ACCESS CONTROL IN A MULTI-PROCESSOR CPU - A technique to provide hardware protection for bus accesses for a processor in a multiple processor environment where at least two zones are established to separate or segregate processor functionality. In one implementation, control registers within a cache memory that supports the multiple processors are loaded with addresses associated with access rights for a particular processor. Then, when an access request is generated, the registers are checked to authorize the access. | 10-31-2013 |
20140052975 | PROTECTING SECURE SOFTWARE IN A MULTI-SECURITY-CPU SYSTEM - A computing system includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. In response to a request by the host processor to boot the second CPU, the first CPU is configured to execute secure booting of the second CPU by decrypting encrypted code to generate decrypted code executable by the second CPU but that is inaccessible by the host processor. | 02-20-2014 |
20140053001 | SECURITY CENTRAL PROCESSING UNIT MANAGEMENT OF A TRANSCODER PIPELINE - A method for managing a transcoder pipeline includes partitioning a memory with a numbered region; receiving an incoming media stream to be transcoded; and atomically loading, using a security central processing unit (SCPU), a decryption key, a counterpart encryption key and an associated region number of the memory into a slot of a key table, the key table providing selection of decryption and encryption keys during transcoding. The atomically loading the decryption and encryption keys and the associated numbered region ensures that the encryption key is selected to encrypt a transcoded version of the media stream when the media stream has been decrypted with the decryption key and the transcoded media stream is retrieved from the associated numbered region of the memory. | 02-20-2014 |
20140053186 | Security Processing Unit with Secure Connection to Head End - A system includes a transport central processing unit of an information appliance device. The transport central processing unit receives a message from a head-end. The transport central processing unit provides access of the message to the security processing unit. A host central processing unit connected with the transport central processing unit is prohibited access to the message. | 02-20-2014 |
20140053230 | MULTI-SECURITY-CPU SYSTEM - A computing system includes a first security central processing unit (SCPU) of a system-on-a-chip (SOC), the first SCPU configured to execute functions of a first security level. The computing system also includes a second SCPU of the SOC coupled with the first SCPU and coupled with a host processor, the second SCPU configured to execute functions of a second security level less secure than the first security level, and the second SCPU executing functions not executed by the first SCPU. | 02-20-2014 |
20140053259 | Security Central Processing Unit Monitoring of On-Chip Conditions - A system includes a security processing unit to monitor inputs from process, voltage and temperature sensors to maintain a security of the system. The security processing unit can operate at a determined clock frequency. A timing path detector can connect with the security processing unit. The timing path detector can monitor a condition near the security processing unit. The timing path detector can switch the clock frequency to a lower frequency before the security processing unit fails from the condition. | 02-20-2014 |
20140053278 | DATA AND KEY SEPARATION USING A SECURE CENTRAL PROCESSING UNIT - A computing system, comprising includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. The second CPU and the host processor may both request the first CPU to generate keys that have access rights to regions of memory to access specific data. The first CPU may be configured to, in response to a request from the second CPU, generate a unique key with a unique access right to a region of memory, the unique key usable only by the second CPU, not the host processor. | 02-20-2014 |
20150128253 | Multi-Security-CPU System - A computing system includes a first security central processing unit (SCPU) of a system-on-a-chip (SOC), the first SCPU configured to execute functions of a first security level. The computing system also includes a second SCPU of the SOC coupled with the first SCPU and coupled with a host processor, the second SCPU configured to execute functions of a second security level less secure than the first security level, and the second SCPU executing functions not executed by the first SCPU. | 05-07-2015 |
Patent application number | Description | Published |
20120224688 | ENFORCING SOFTWARE INDEPENDENT CONTENT PROTECTION IN AN ELECTRONIC DEVICE - A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the communication interface and to the memory. The STB is operable to receive a digital message, extract a key portion from the digital message, decrypt the key portion, descramble the digital content using the decrypted key portion, extract a rights portion from the digital message, decrypt the rights portion, determine protected and unprotected digital content based upon the rights portion, write the unprotected digital content to an unprotected portion of the memory, and write the protected digital content to a protected portion of the memory. The decrypted key portion may include a plurality of Program IDs (PIDs) and the decrypted rights portion may include protection data for each PID. A security processor may prevent a central processing unit from accessing the protected portion of the memory. | 09-06-2012 |
20120224689 | ENFORCING SOFTWARE INDEPENDENT CONTENT PROTECTION IN AN ELECTRONIC DEVICE DURING TRANSCODING - A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory, a transcoder, a central processing unit, and security processing circuitry. The security processor (or other components of the STB) is operable to identify protected digital content of the digital content that is to be isolated from the central processing unit during transcoding and to isolate the protected digital content from the central processing unit during the transcoding. The CPU may be denied access to a protected portion of the memory during the transcoding in which the transcoder stores non-scrambled protected digital content. The protected portion of the memory may be buffer memory accessible by the transcoder and not accessible by the central processing unit. The protected digital content may be identified from the digital message. | 09-06-2012 |
20120226900 | ENFORCING SOFTWARE UPDATES IN AN ELECTRONIC DEVICE - A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the communication interface and to the memory. The STB is operable to receive a digital message, extract a key portion from the digital message, extract a rights portion from the digital message, determine a code version based upon the rights portion, read a stored code version from the memory, and compare the code version to the stored code version to validate the software instructions. Upon an unfavorable comparison of the code version to the stored code version, initiates an error action that may include sending a message to a service provider device for software instruction reloading, rebooting, and/or disable decryption of the digital content. Extracting the rights portion from the digital message may include decrypting the key portion to produce a decrypted result and decrypting the rights portion using the decrypted result to produce the decrypted rights portion. | 09-06-2012 |
Patent application number | Description | Published |
20080231131 | Commercial Low Cost, High Efficiency Motor-Generator - A motor-generator includes a rotor that rotates about an axis of rotation, and a stator that is stationary and magnetically interacts with the rotor. The rotor is constructed of two spaced apart rotor portions having magnetic poles that drive magnetic flux across an armature airgap formed therebetween. An armature, located in the armature airgap, has a substantially nonmagnetic and low electrical conductivity form onto which wire windings are wound. The form has a free end that extends inside the rotor, and a support end that attaches to the stationary portion of the motor-generator. The form is constructed with a thin backing portion and thicker raised portions extending from the backing portion in the direction of the magnetic flux. The wire windings have multiple individually insulated conductor wire. The conductors of a single wire are electrically connected together in parallel and electrically insulated between each other along their length inside the armature airgap. The wire windings are wound on to the form by inserting the wire to lie between the raised portions; the form provides position location and support for the wire windings during the winding process, and subsequently reacts the electromagnetically induced torque on the windings to the stationary portion of the motor-generator through the support end of the form and prevents the windings from contacting the rotor portions during rotation of the rotor. | 09-25-2008 |
20140172552 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 06-19-2014 |
20140278947 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. Other embodiments use target URL defined conditions of interstitial interaction to determine click validity and monetary value and in the event of a valid click continuing to the target URL and optionally measuring on-site behavior. Further embodiments measure data from an original click, observe interstitial behavior and optionally merge target URL website measured behavior into a database providing user data for each individual click. Other embodiments generate reports specific to seeking credits for payments on invalid clicks and other website intelligence. Exemplary embodiments provide for varying implementations, including e.g. implementations through search engines and standalone services. | 09-18-2014 |
20140324573 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. Other embodiments use target URL defined conditions of interstitial interaction to determine click validity and monetary value and in the event of a valid click continuing to the target URL and optionally measuring on-site behavior. Further embodiments measure data from an original click, observe interstitial behavior and optionally merge target URL website measured behavior into a database providing user data for each individual click. Other embodiments generate reports specific to seeking credits for payments on invalid clicks and other website intelligence. Exemplary embodiments provide for varying implementations, including e.g. implementations through search engines and standalone services. | 10-30-2014 |
20140358678 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 12-04-2014 |
20150032533 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 01-29-2015 |
20150046254 | SYSTEM AND METHOD FOR DISPLAY RELEVANCE WATCH - A system and method for relevancy of display placement, comprising a processor on non-transitory memory that compiles transactional information from advertisers, publishers and users and provides an interface that allows the advertiser to determine relevancy of the placement based on the activity of the user and publisher information. | 02-12-2015 |