Abstract: An inventive security framework for supporting kernel-based hypervisors within a computer system. The security framework includes a security master, one or more security modules and a security manager, wherein the security master and security modules execute in kernel space.
Type:
Grant
Filed:
December 2, 2003
Date of Patent:
August 28, 2007
Assignee:
Secure Computing Corporation
Inventors:
Richard O'Brien, Raymond Lu, Terrence Mitchem, Spencer Minear
Abstract: A method is provided for correlating imprecise source data in a local coordinate system to a precise global eyepoint position for a global coordinate system within which the local coordinate system is located. The method includes the step of identifying key correlation points for the local coordinate system which has modeling inaccuracies. Global coordinates are also identified for each of the key correlation points. Another step is computing delta values for each of the key correlation points that represent the difference between key correlation points' local system coordinates and the global coordinate system's coordinate values for the key correlation points. An additional step is modifying the global eyepoint position based on delta values for selected key correlation points as the global eyepoint position moves in relation to the local coordinate system within the global coordinate system.
Abstract: An EMI-resistant circuit board assembly includes a plurality of circuit boards arranged in a stack and a metal shielding frame respectively sandwiched in between each two adjacent circuit boards. One of the circuit boards has at least one high-speed device producing high-frequency noises to the ambient, which result in EMI effect. The metal shielding frame is electrically connected to the ground potential of the circuit boards and shields the high-speed device on the circuit board to guide the high-frequency noises to the ground potential.
Abstract: A novel system and method for transmitting and receiving secure data in a virtual private group (VPG). In one embodiment, a method for transmitting secure data from a first node to a second node includes accessing a group membership table on the first node, the group membership table having group membership information for each group, including a first group, to which the first node belongs and group security information associated with each group, wherein the first group has two or more members, and checking the group membership table to determine if the second node is a member of the first group. If the second node is a member of the first group, the method further includes encrypting a data packet using the group security information associated with the first group, processing the encrypted data packet, and transmitting the encrypted data packet from the first node to the second node.
Type:
Grant
Filed:
September 4, 2002
Date of Patent:
June 12, 2007
Assignee:
Secure Computing Corporation
Inventors:
Thomas R. Markham, Lynn Marquette Meredith, Robert Otto Hanzlik, Geoffrey A. Lowe
Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
Abstract: Embodiments of the present invention define a modular architecture that provides the physical level of interconnect that is used to cost effectively deploy high performance and high flexibility communication networks. Aspects of the physical communications are described to deliver scalable computer to computer communications as well as scalable computer to I/O communications, scalable I/O to I/O communications, and scalable function to function communications with a low cable count. Embodiments of the present invention focus on the physical switched communications layer, as the interconnect physical layer, functions, chassis; modules have been designed as an integrated solution.
Abstract: A tunable fiber optic component providing environmental isolation, thermal tuning, and mechanical tuning and a method of tuning a fiber optic component using application of substantially simultaneous varying of temperature and mechanical strain is disclosed. A method of using a tunable fiber optic component, for example, a distributed feedback fiber laser, to compensate variations in an optical system, and a method of making a tunable fiber optic component are also disclosed.
Type:
Grant
Filed:
March 23, 2006
Date of Patent:
May 8, 2007
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
David Marceau, Dennis F. Elkins, Forrest L. Williams, Allen H. Tanner
Abstract: The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level) a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be propagated to one or more upstream computers in the path from the communication's origin to its destination. Such one or more upstream computers are identified from within the content of the communication, the header of the communication and/or the transfer protocol interactions in receiving the communication. The identified computers are authenticated to limit forgery.
Abstract: A tunable fiber optic component providing environmental isolation, thermal tuning, and mechanical tuning and a method of tuning a fiber optic component using application of substantially simultaneous varying of temperature and mechanical strain is disclosed. A method of using a tunable fiber optic component, for example, a distributed feedback fiber laser, to compensate variations in an optical system, and a method of making a tunable fiber optic component are also disclosed.
Type:
Grant
Filed:
March 23, 2006
Date of Patent:
March 27, 2007
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
David Marceau, Dennis F. Elkins, Forrest L. Williams, Allen H. Tanner
Abstract: The invention provides a system and method for reducing laser speckle and interference patterns in a laser projector display when using a laser projector having a spatial light modulator (SLM) with a defined pixel rate. The method can include the operation of polarizing a laser output of a continuous wave laser such that the laser output is s-polarized with respect to a beam combiner. The s-polarized laser output can be divided into a first laser beam and a second laser beam. A phase of the second laser beam can be modulated with an amplitude sufficient to create a phase delay of approximately half a wavelength of the laser output and at a frequency at least twice that of the SLM's pixel rate.
Type:
Grant
Filed:
March 31, 2005
Date of Patent:
March 20, 2007
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
Robert R. Christensen, Forrest L. Williams, Allen H. Tanner
Abstract: A system, method and computer program product for providing authentication to a firewall using a lightweight directory access protocol (LDAP) directory server is disclosed. The firewall can be configured through a graphical user interface to implement an authentication scheme. The authentication scheme is based upon a determination of whether at least part of one or more LDAP entries satisfy an authorization filter.
Type:
Grant
Filed:
January 31, 2000
Date of Patent:
February 27, 2007
Assignee:
Secure Computing Corporation
Inventors:
Thomas D. Ashoff, Steve O. Chew, Jeffrey J. Graham, Andrew J. Mullican
Abstract: A system and method for the secure transfer of data between a workstation connected to a private network and a remote computer connected to an unsecured network. A secure computer is inserted into the private network to serve as the gateway to the unsecured network and a client subsystem is added to the workstation in order to control the transfer of data from the workstation to the secure computer. The secure computer includes a private network interface connected to the private network, an unsecured network interface connected to the unsecured network, wherein the unsecured network interface includes means for encrypting data to be transferred from the first workstation to the remote computer and a server function for transferring data between the private network interface and the unsecured network interface.
Type:
Grant
Filed:
May 26, 2004
Date of Patent:
February 20, 2007
Assignee:
Secure Computing Corporation
Inventors:
William E. Boebert, Clyde O. Rogers, Glenn Andreas, Scott W. Hammond, Mark P. Gooderum
Abstract: A mechanism that enables flexible expansion of proxy firewall services is disclosed. In accordance with the present invention, the firewall system can be configured to include a dispatch host computer and one or more load host computers. Proxy firewall services can be provided by proxy applications that reside on either the dispatch host computer and/or the load host computers. In one embodiment, a load host computer can be configured to support multiple proxy applications. In other embodiments, a load host computer can be dedicated to a single resource intensive application. In this framework, a network administrator can flexibly decide how to accommodate the demand for proxy firewall services. Load hosts can be added or removed from the firewall system without disrupting ongoing security services. In one embodiment, this feature is enabled through the inclusion of a configuration file on the dispatch host computer that stores information relating to the load host computers in the firewall system.
Abstract: A system and method is provided for combining independent scene layers to form computer generated environments. The method includes the operation of constructing a terrain layer using stored terrain data. Another operation is generating a feature layer using feature layer data that is stored separately from the stored terrain data. The feature layer and the terrain layer can then be combined to form a composite scene.
Abstract: A system and method is provided for combining independent scene layers to form computer generated environments. The method includes the operation of constructing a terrain layer using stored terrain data. Another operation is generating a feature layer using feature layer data that is stored separately from the stored terrain data. The feature layer and the terrain layer can then be combined to form a composite scene.
Abstract: A camera lens drive mechanism includes a lens cylinder, and the lens hollow is able to fit over a lens. A conductor coil is wound around an outer surface of the lens cylinder, and a coil spring is surrounding the lens hollow cylinder. A magnetic body is opposite to the conductor coil for the magnetic line of force from the magnet can cut across the conductor coil. An active force is induced on the coil when a current is conducted in the conductor coil, and then the lens cylinder is pushed also. The magnitude of the active force can be controlled by adjusting the magnitude of the current in the conductor coil.
Abstract: A tunable fiber optic component providing environmental isolation, thermal tuning, and mechanical tuning and a method of tuning a fiber optic component using application of substantially simultaneous varying of temperature and mechanical strain is disclosed. A method of using a tunable fiber optic component, for example, a distributed feedback fiber laser, to compensate variations in an optical system, and a method of making a tunable fiber optic component are also disclosed.
Type:
Grant
Filed:
March 23, 2006
Date of Patent:
November 7, 2006
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
David Marceau, Dennis F. Elkins, Forrest L. Williams, Allen H. Tanner
Abstract: The present invention relates to a static discharge protection module of LCD display control board of portable computer which have an insulation sleeve, a LCD display control board and a metal foil which pressed on the insulation sleeve. The present invention can reduce errors by human labor to adhere conductive cloth to wrong position below front frame, can reduce materials, such as conductive cloth, conductive foam, and can effectively solve the problems of ESD test failure of LED indicator.
Abstract: A negative-pressure control device for an ink-supply system comprises a box, an ink-jet head, an adapter and a set of releasable check valve mutually communicated. The box has thereon a water outlet, and is provided therein with a liquid level gauge to control and maintain a constant level of the ink in the box; by operation of a releasable check valve set, air in the ink-jet head and the adapter presents the state of negative-pressure, this maintains a balance state preventing the ink from dropping when the ink in the ink-jet head and the water outlet is subjected to attraction of the air with the negative-pressure; when the ink-jet head jet prints downwards, it can automatically supplement ink to get an effect of continuous jet printing; the control device is suitable for a jet-drawing machine to place an advertising board with a propaganda paint or a poster etc. for printing.
Abstract: An extending base for a portable computer is provided. The extending base includes: a base body, an electrical connector fixedly mounted on the base body for being electrically connected with the portable computer, a detachable cover covering the base body for supporting the portable computer, wherein the electrical connector is protrudent out of the detachable cover, a plurality of first engaging elements mounted on the detachable cover, a sliding structure mounted on the base body for sliding along a direction in response to an external force, and a plurality of second engaging elements mounted on the sliding structure for engaging with the first engaging elements so as to fix the detachable cover on the base body.