Patent application number | Description | Published |
20140240523 | INFORMATION DELIVERY BASED ON IMAGE DATA - Systems, devices and methods described herein provide or possess functionality that enables capturing an image, images associated with video and/or video. The captured image (or captured images associated with video and/or video) may be communicated to a server (e.g., network operator) that compares the captured image to media stored in a database. That media may include images, images associated with video and/or video. Each of the media may have information associated therewith. Such information may include advertisements, uniform resource locators (URLs), company information, promotions, etc. If the server determines that an image stored in the database matches or substantially matches the image received by the server, the server may retrieve the information that is associated with the stored image. The retrieved information may be communicated to a mobile device that captured the image. The retrieved information may then be displayed by the mobile device and/or presented in another manner. | 08-28-2014 |
20140274014 | ENHANCED DEVICE CONFIGURATION - Systems, devices and methods described herein provide or possess functionality that enables providing enhanced device configuration. In one implementation, one or more communication stations are provided. A wireless communication device in close proximity may be configured to communicate with the one or more communication stations. Once a communication session is established between the wireless communication device and the one or more communication stations, configuration particulars, such as configuration data, may be provided to the wireless communication device via the one or more communication stations. | 09-18-2014 |
Patent application number | Description | Published |
20130147827 | METHODS AND DEVICES FOR FILTERING AND DISPLAYING DATA - Described herein, a computing device includes a memory including a display cache configured to store display sections, a filter module configured to filter a display section to create a filtered display section, and a display module. The display module is configured to determine whether a first filtered display section corresponding to a first display section is stored within the display cache, retrieve the first filtered display section from the display cache if the first filtered display section is determined to be stored within the display cache, and cause the first filtered display section to be displayed within the display area. | 06-13-2013 |
20140165166 | LIMITING ACCESS TO A DIGITAL ITEM - In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A one-way hash function is performed on the password based on the number of accesses of the count to generate a password hash based on the count. The password hash is stored as the stored password hash. | 06-12-2014 |
20140165215 | LIMITING ACCESS TO A DIGITAL ITEM - In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A plurality of password hashes is generated by utilizing one-way hash functions based on the number of accesses of the count and the password to generate the plurality of password hashes based on the count. The plurality of password hashes is stored in a password hash file. | 06-12-2014 |
20140320673 | Measurement of Remote Display Performance With Image-Embedded Markers - Methods, systems, and computer programs are provided for measuring the performance of a remote display. One method includes an operation for embedding in display frames a respective frame identifier and a respective frame picture. The respective frame picture is placed in a respective region that depends of the value of the respective frame identifier. Additionally, the method includes operations for sending the plurality of display frames to a remote client, and for extracting each received frame picture from the respective region of each received display frame at the remote client based on the received frame identifier. The received frame quality is calculated for each received display frame based on the comparison of the extracted received frame picture with the respective frame picture. Further, the method includes an operation for calculating a remote display quality for the remote client based on the calculated received frame quality for the received display frames. | 10-30-2014 |
20140325054 | Remote Display Performance Measurement Triggered By Application Display Upgrade - Methods, systems, and computer programs are provided for measuring the performance of display images received on a remote computer display. One method includes an operation for detecting calls from an application to an application programming interface (API), which is provided for rendering images on a display image, each call causing an update of the display image. Further, the method includes an operation for embedding data for measuring performance in display frames of the display image based on the detecting. The embedding results in modified displayed frames with respective data for measuring performance. The modified displayed frames are transmitted to a remote client, which results in received modified display frames having respective received data for measuring the performance. In addition, the method includes an operation for calculating the remote display quality for the given application based on the received modified display frames and the respective received data for measuring performance. | 10-30-2014 |
20150026784 | Hash Synchronization for Preventing Unauthorized Server Access Using Stolen Passwords - Techniques for preventing unauthorized access to a server system using stolen passwords are provided. In one embodiment, the server system can store an ordered set of hash values for a user, where each hash value in the ordered set of hash values is generated by applying a hash function in an ordered set of hash functions to the user's password. The server system can further receive, from a client device, a login request for the user that includes a hashed version of the password, and can select a hash value in the ordered set of hash values using a server-side index that is synchronized with a client-side index on the client device. The server system can then grant the login request if the selected hash value matches the hashed version of the password. | 01-22-2015 |
Patent application number | Description | Published |
20150237013 | SPECIFYING POINT OF ENFORCEMENT IN A FIREWALL RULE - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |
20150237014 | METHOD AND APPARATUS FOR DISTRIBUTING FIREWALL RULES - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |
20150237015 | PROVISIONING FIREWALL RULES ON A FIREWALL ENFORCING DEVICE - Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced). | 08-20-2015 |
Patent application number | Description | Published |
20120229248 | MULTIPURPOSE CONTROLLER FOR ELECTRONIC DEVICES, FACIAL EXPRESSIONS MANAGEMENT AND DROWSINESS DETECTION - A hands-free controller, a facial expression management system, a drowsiness detection system and methods for using them are disclosed. The controller monitors facial expressions of the user, monitors motions of the user's body, generates commands for an electronic device based on the monitored facial expressions and body motions, and communicates the commands to the electronic device. Monitoring facial expressions can include sensing facial muscle motions using facial expression sensors. Monitoring user body motions can include sensing user head motions. Facial expression management can includes monitoring user facial expressions, storing monitored expressions, and communicating monitored expressions to an electronic device. Drowsiness detection can include monitoring eye opening of the user, generating an alert when drowsiness is detected, monitoring proper usage of the device, and generating a warning when improper usage is detected. | 09-13-2012 |
20140078049 | MULTIPURPOSE CONTROLLERS AND METHODS - Method and apparatus is disclosed for a user to communicate with an electronic device. A processor receives user intention actions comprising facial expression (FE) information indicative of facial expressions and body information indicative of motion or position of one or more body parts of the user. When the FE or body information crosses a first level, the processor starts generating first signals based on the FE or body information to communicate with the electronic device. When the FE or body information crosses a second level, the processor can end generation of the first signals or modify the first signals. An image processing or eye gaze tracking system can provide some FE information or body information. The signals can modify attributes of an object of interest. | 03-20-2014 |
Patent application number | Description | Published |
20080244572 | METHOD AND APPARATUS FOR ADAPTIVE INTEGRITY MEASUREMENT OF COMPUTER SOFTWARE - Systems and methods are described herein that discuss how a computing platform executing a virtualized environment, in one example, can be integrity verified adaptively and on demand. This may occur at initial runtime, as well as during continued operations, and allows the platform user to install software from various vendors without sacrificing the integrity measurement and therefore the trustworthiness of the platform. | 10-02-2008 |
20080244573 | METHOD AND APPARATUS FOR MANAGING PAGE TABLES FROM A NON-PRIVILEGED SOFTWARE DOMAIN - A virtual machine monitor; and an executive virtual machine to manage page tables in place of the virtual machine monitor are described. Other embodiments may be described and claimed. | 10-02-2008 |
20080244725 | METHOD AND APPARATUS FOR MANAGING PACKET BUFFERS - According to one example embodiment of the inventive subject matter, there is described herein a method and apparatus for securely and efficiently managing packet buffers between protection domains on an Intra-partitioned system using packet queues and triggers. According to one embodiment described in more detail below, there is provided a method and apparatus for optimally transferring packet data across contexts (protected and unprotected) in a commodity operating system. | 10-02-2008 |
20080244758 | SYSTEMS AND METHODS FOR SECURE ASSOCIATION OF HARDWARD DEVICES - An apparatus to protect one or more hardware devices from unauthorized software access is described herein and comprises, in one embodiment, a virtual machine manager, a memory protection module and an integrity measurement manager. In a further embodiment, a method of providing secure access to one or more hardware devices may include, modifying a page table, verifying the integrity of a device driver, and providing memory protection to the device driver if the device driver is verified. | 10-02-2008 |
20120124579 | METHOD AND APPARATUS FOR ADAPTIVE INTEGRITY MEASUREMENT OF COMPUTER SOFTWARE - Systems and methods are described herein that discuss how a computing platform executing a virtualized environment, in one example, can be integrity verified adaptively and on demand. This may occur at initial runtime, as well as during continued operations, and allows the platform user to install software from various vendors without sacrificing the integrity measurement and therefore the trustworthiness of the platform. | 05-17-2012 |
Patent application number | Description | Published |
20130036291 | GENERATING MULTIPLE ADDRESS SPACE IDENTIFIERS PER VIRTUAL MACHINE TO SWITCH BETWEEN PROTECTED MICRO-CONTEXTS - Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk. | 02-07-2013 |
20140006746 | VIRTUAL MEMORY ADDRESS RANGE REGISTER | 01-02-2014 |
20140173275 | SECURING DATA TRANSMISSIONS BETWEEN PROCESSOR PACKAGES - Embodiments of an invention for securing transmissions between processor packages are disclosed. In one embodiment, an apparatus includes an encryption unit to encrypt first content to be transmitted from the apparatus to a processor package directly through a point-to-point link. | 06-19-2014 |
20140205085 | PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION - In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted. | 07-24-2014 |
20140223197 | METHOD AND APPARATUS FOR MEMORY ENCRYPTION WITH INTEGRITY CHECK AND PROTECTION AGAINST REPLAY ATTACKS - A method and apparatus to provide cryptographic integrity checks and replay protection to protect against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. A tree-based replay protection scheme uses standard XTS-AES to encrypt contents of a cache line in the system memory. A Message-Authentication Code (MAC) for the cache line is encrypted using enhanced XTS-AES and a “time stamp” indicator associated with the cache line. The “time stamp indicator” is stored in a processor. | 08-07-2014 |
20150033012 | SECURE PROCESSING ENVIRONMENT MEASUREMENT AND ATTESTATION - Embodiments of an invention for secure processing environment measurement and attestation are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction associated with a build or a rebuild of a secure enclave. The execution unit is to execute the first instruction. Execution of the first instruction, when associated with the build, includes calculation of a first measurement and a second measurement of the secure enclave. Execution of the first instruction, when associated with the rebuild, includes calculation of the second measurement without calculation of the first measurement. | 01-29-2015 |
20150033316 | FEATURE LICENSING IN A SECURE PROCESSING ENVIRONMENT - Embodiments of an invention for feature licensing in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to initialize a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes determining whether a requested feature is licensed for use in the secure enclave. | 01-29-2015 |
20150095617 | USING SOFTWARE HAVING CONTROL TRANSFER TERMINATION INSTRUCTIONS WITH SOFTWARE NOT HAVING CONTROL TRANSFER TERMINATION INSTRUCTIONS - In an embodiment, the present invention includes a processor having a decode unit, an execution unit, and a retirement unit. The decode unit is to decode control transfer instructions and the execution unit is to execute control transfer instructions. The retirement unit is to retire a first control transfer instruction, and to raise a fault if a next instruction to be retired after the first control transfer instruction is not a second control transfer instruction and a target instruction of the first control transfer instruction is in code using the control transfer instructions. | 04-02-2015 |
20150186659 | MODIFYING MEMORY PERMISSIONS IN A SECURE PROCESSING ENVIRONMENT - Embodiments of an invention for modifying memory permissions in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to modify access permissions for a page in a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes setting new access permissions in an enclave page cache map entry. Furthermore, the page is immediately accessible from inside the secure enclave according to the new access permissions. | 07-02-2015 |
20150188710 | OFFLOADING FUNCTIONALITY FROM A SECURE PROCESSING ENVIRONMENT - Embodiments of an invention for offloading functionality from a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to initialize a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes verifying that a signature structure key matches a hardware key that permits functionality to be offloaded. | 07-02-2015 |
20150205732 | SEAMLESSLY ENCRYPTING MEMORY REGIONS TO PROTECT AGAINST HARDWARE-BASED ATTACKS - Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction. | 07-23-2015 |
Patent application number | Description | Published |
20090104098 | METHOD AND APPARATUS FOR THE REMOVAL OF CARBON DIOXIDE FROM A GAS STREAM - The invention provides methods and apparatuses for removing carbon dioxide from a gas stream. In particular, the invention provides methods and apparatuses for absorbing carbon dioxide from a coal-fired boiler flue gas stream using an absorbing solution and for regeneration of an alkaline component used in the absorbing solution. In one embodiment, the invention provides a method for removing carbon dioxide from a gas stream by contacting a gas stream containing carbon dioxide with an alkaline liquid stream; absorbing at least a portion of the carbon dioxide into the alkaline liquid stream to produce absorbed carbon dioxide; and catalyzing a reaction of the: absorbed carbon dioxide to a form of carbonate. | 04-23-2009 |
20100074828 | Method and Apparatus for the Removal of Carbon Dioxide from a Gas Stream - The invention provides methods and apparatuses for removing carbon dioxide from a gas stream. In particular, the invention provides methods and apparatuses for absorbing carbon dioxide from a coal-fired boiler flue gas stream using an absorbing solution and for regeneration of an alkaline component used in the absorbing solution. In one embodiment, the invention provides a method for removing carbon dioxide from a gas stream by contacting a gas stream containing carbon dioxide with an alkaline liquid stream; absorbing at least a portion of the carbon dioxide into the alkaline liquid stream to produce absorbed carbon dioxide; and catalyzing a reaction of the absorbed carbon dioxide to a form of carbonate. | 03-25-2010 |
20130280152 | Method and Apparatus for the Removal of Carbon Dioxide from a Gas Stream - The invention provides methods and apparatuses for removing carbon dioxide from a gas stream. In particular, the invention provides methods and apparatuses for absorbing carbon dioxide from a coal-fired boiler flue gas stream using an absorbing solution and for regeneration of an alkaline component used in the absorbing solution. In one embodiment, the invention provides a method for removing carbon dioxide from a gas stream by contacting a gas stream containing carbon dioxide with an alkaline liquid stream; absorbing at least a portion of the carbon dioxide into the alkaline liquid stream to produce absorbed carbon dioxide; and catalyzing a reaction of the absorbed carbon dioxide to a form of carbonate. In other embodiments, the invention provides a method for producing salable calcium carbonate, calcium chloride, and carbon dioxide gas. | 10-24-2013 |