Slawek
Slawek Ligier, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20110162053 | SERVICE ASSISTED SECRET PROVISIONING - A method for providing a secret that is provisioned to a first device to a second device includes generating a One-Time Password at the first device using the secret and obtaining an identifier of the secret. The method also includes providing the One-Time Password and the identifier to the second device and sending the One-Time Password and the identifier to a remote provisioning service. The method also includes verifying that the One-Time Password corresponds to the secret, and sending to the second device an encrypted secret and a decryption key for decrypting the encrypted secret. The encrypted secret and the decryption key may be sent using different communications methods. The method also includes decrypting the encrypted secret using the decryption key to provide the secret and storing the secret at the second device. | 06-30-2011 |
Slawek Luksik, Kosina PL
Patent application number | Description | Published |
---|---|---|
20110304963 | ELECTRONIC DEVICE HOLDER, ESPECIALLY FOR A MOBILE PHONE, FOR USE IN A MECHANICAL VEHICLE - The holder for an electronic device, especially for a mobile phone, for use in a mechanical vehicle, which can also accommodate various replaceable electronic modules, especially a GPS module, or a GPS supporting module, including at least a holding unit | 12-15-2011 |
Slawek Smyl, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20100306781 | DETERMINING AN IMBALANCE AMONG COMPUTER-COMPONENT USAGE - The present invention is directed to determining an imbalance among computer-component usage. Based on a performance value (e.g. utilization value, response time, queuing delay, Input/Output operations, bytes transferred, work threads used, connections made, etc) that describes a respective computer component among a set of computer components, and an average performance value of the set, a component value of each computer component in the set can be determined. Each component value quantifies a contribution of the usage of a respective computer component toward an imbalanced assignment of computer operations. Component values are information rich and comparisons of component values suggest levels of over-utilization and under-utilization of the computer components. Based on the component values of a set of computer components, decisions can be made as to what portion of computer operations should be reassigned to enable computer operations to be executed in a more balanced manner by the set of computer components. | 12-02-2010 |