Patents Assigned to Computer Corporation
-
Patent number: 7590859Abstract: A method of accomplishing two-factor user authentication, comprising providing two separate user authentication methods, enabling a user to communicate authentication data for both authentication methods to a first web site using the internet, and enabling the communication of at least some of the authentication data from the first web site to a second web site also using the internet. Both web sites are thus involved in user authentication using the authentication data.Type: GrantFiled: January 16, 2002Date of Patent: September 15, 2009Assignee: Secure Computing CorporationInventor: Sean Brennan
-
Publication number: 20090222690Abstract: A system and method for automatic disaster recovery of a computing appliance including reconstruction of its previous operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover the device's operation state. The system and method can also be utilized to recover a not fully functional member of a clustered computing system from the configuration information stored on other members of the cluster.Type: ApplicationFiled: November 25, 2008Publication date: September 3, 2009Applicant: Secure Computing CorporationInventors: David Seelig, Stephen Czeck
-
Publication number: 20090219491Abstract: An illumination system for transforming at least one laser light beam having a non-uniform distribution in a first axis and a second axis to a beam having a substantially uniform distribution in the first axis while preserving the non-uniform distribution in the second axis. The transformed beam may be imaged as a line image onto a one-dimensional light modulation device. The illumination system may comprise a light tunnel having two sides that interact with the at least one laser light beam in the first axis and two sides that do not interact with the light in the second axis.Type: ApplicationFiled: October 20, 2008Publication date: September 3, 2009Applicant: Evans & Sutherland Computer CorporationInventors: Forrest Williams, Robert Christensen, David M. Bloom, Allen Tanner
-
Publication number: 20090222466Abstract: A system and method for automatically cloning or migrating a computing appliance while maintaining its operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover or duplicate a device's operation state. The system and method can also be utilized to migrate a computing appliance between different operating system while maintaining or replicating the previous operational state.Type: ApplicationFiled: November 20, 2008Publication date: September 3, 2009Applicant: Secure Computing CorporationInventors: Tylor Allison, Aaron Miller, Andrew Nissen, Michael James Silbersack
-
Publication number: 20090222812Abstract: A system and method for automatic disaster recovery and synchronization of computing appliances configured for operation in a cluster. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover or duplicate the computing appliance's operation state. Upon entering a clustered configuration, the primary node creates a clustered configuration bundle from individual configuration bundles for the registered nodes in the cluster. The clustered configuration bundle can then be used for disaster recovery or synchronization of any of the registered nodes.Type: ApplicationFiled: December 13, 2008Publication date: September 3, 2009Applicant: Secure Computing CorporationInventors: Andrew Nissen, Aaron Miller, Michael James Silbersack
-
Publication number: 20090199290Abstract: One embodiment of the application provides a method and system for receiving at a gateway device a plurality of virtual private network tunnels to be routed to a Local Area Network (LAN), routing a first portion of the plurality of virtual private network tunnels to at least one slave device coupled to the gateway device, performing IPsec processing of the first portion of the plurality of virtual private network tunnels using at least one slave device, forwarding the first portion of the plurality of virtual private network tunnels after IPsec processing to at the gateway device and routing the plurality of virtual private network tunnels to the LAN.Type: ApplicationFiled: March 17, 2008Publication date: August 6, 2009Applicant: Secure Computing CorporationInventors: David McCullough, Tom Essebier, Philip Craig
-
Patent number: 7564250Abstract: A system and method for measuring resistance of a polarizing material are disclosed. The system includes a voltage divider circuit having a first resistive element of known resistance and the polarizing material of unknown resistance and a processing unit. The processing unit is electrically-coupled to the voltage divider circuit and adapted to apply a voltage across the voltage divider circuit. A first input/output (I/O) pin is electrically-coupled between the processing unit and the first resistive element. A second pin is electrically-coupled between the processing unit and a junction between the polarizing material and the first resistive element. A controller is adapted to cause the second pin to short the polarizing material after a measurement is completed, to bleed off any residual polarization from the capacitive element of the polarizing material.Type: GrantFiled: January 30, 2007Date of Patent: July 21, 2009Assignee: Onset Computer CorporationInventor: Lon Hocker
-
Patent number: 7561155Abstract: A method for reducing the transport delay in a computer image generator. The first step is dividing a single frame buffer into a plurality of screen bins. Next is storing primitives in each screen bin the primitives touch. Then the screen bins are rendered by row from top to bottom. Finally, at least one rendered screen bin is displayed from the single frame buffer before the rendering of all the screen bins has completed for the frame buffer. Preferably the step of displaying of the screen bins rendered should be started when the rendering is at least ½ completed. In some cases, the step of displaying of the screen bins rendered can be started after at least one row of screen bins has completed rendering. A hardware interlock can be used to ensure that the rendering process does not advance past the display process.Type: GrantFiled: October 23, 2000Date of Patent: July 14, 2009Assignee: Evans & Sutherland Computer CorporationInventors: Dee Gardiner, Bob Grange, Richard Moon
-
Publication number: 20090177647Abstract: Query inefficiencies are improved and entity-interrelational blindness is overcome by employing two ideas: Consolidation Strings and Inter-Node Consolidation. These ideas can be typically employed in law-enforcement records systems (such as COPLINK systems), but is certainly not limited to such an application. Consolidation Strings represent key pieces of information that are in a text/character format, and may be encrypted/hashed. A system's hierarchy of consolidation rules automatically determine if two different rows in a database actually refer to the same real-world object. These rules are NOT statistical or probabilistic in nature, thus enhancing the confidence and reliability in the results. Three general classifications of Consolidation Strings are encompassed: Those based on positive identifiers, those based on demographic information, and those based on associative information that spans multiple-entity types.Type: ApplicationFiled: June 13, 2008Publication date: July 9, 2009Applicant: Knowledge Computing CorporationInventors: William Oliver, Robert Griffin, Wojciech Wyzga
-
Publication number: 20090172047Abstract: Date-warehouse systems are populated using an enhanced Extraction-Load-Transform (ETL) process and system by employing three ideas: Out-of-order-fill ETL, relative-ordering index (ROI), and dependent queries. Out-of-order-fill ETL allows a data warehouse to accept the loading of data files in any order, and does not require the loading of any previous backup data files in order to provide some functionality to end users under the view that some functionality or data access is better than none at all. Dependent queries are processes that use defined data structures for use in constructing, extracting, and validating each record to be written in said data-warehouse system in order to ensure that referential integrity is maintained and that no orphaned data is pushed into the data warehouse. Finally, ROI is a process wherein a value is determined, based on the constraints of the source data, which indicates the relative newness of the data.Type: ApplicationFiled: July 11, 2008Publication date: July 2, 2009Applicant: Knowledge Computing CorporationInventors: Adrian Boyko, William Oliver, Wojciech Wyzga, Zach Heidepriem
-
Patent number: 7553436Abstract: Rotary press machine including dies, pairs of upper and lower punches with a part of each lower punch being movable in a respective die to selectively enable formation of a cavity in the die, a feeding system for feeding powder material into the cavities, when present, in a feeding stage, a pressing system for pressing the upper and lower punches together in a pressing stage and a tablet ejection system for ejecting formed tablets from the dies in a tablet ejection stage. The upper and lower punches are rotated sequentially through the feeding stage, the pressing stage and the tablet ejection stage to thereby enable formation of tablets if powder material is feed into the cavities in the dies. To enable selective formation of tablets and thereby optimize production thereof, an adjustment mechanism is provided and enables selective formation of the cavities in the dies.Type: GrantFiled: November 2, 2007Date of Patent: June 30, 2009Assignee: Metropolitan Computing CorporationInventors: Semen Dukler, Lev Tsygan, Michael Levin
-
Patent number: 7543329Abstract: A system and method of limiting access from an external network to documents stored on an internal network. A client list is built in which each client is assigned to one or more roles. Each role has access to one or more documents as defined on a document list. A request from an external network is reviewed and, if possible, the request is associated with a client on the client list. The requested document is then compared to the document list associated with the client's role and, if the requested document is in the list of documents available to a client in the client's role, the requested document is fetched, cleaned and sent to the client.Type: GrantFiled: June 30, 2003Date of Patent: June 2, 2009Assignee: Secure Computing CorporationInventors: Richard R. Viets, David G. Motes, Paula Budig Greve, Wayne W. Herberg
-
Patent number: 7536715Abstract: A system and method for restricting packet transfer to a computer across a network, wherein the computer includes a network interface device coupled to the network and wherein the network interface device includes a packet filter. A security server is connected to the network. A packet is received at the network interface device and the network interface device determines if the packet is an authorized transaction. If the packet is not an authorized transaction, the packet is routed to the security server, where the security server determines whether the packet is an authorized transaction. If the security server determines that the packet is an authorized transaction, the network interface device is configured to accept similar transactions.Type: GrantFiled: November 25, 2002Date of Patent: May 19, 2009Assignee: Secure Computing CorporationInventor: Thomas R. Markham
-
Publication number: 20090125980Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.Type: ApplicationFiled: November 9, 2007Publication date: May 14, 2009Applicant: Secure Computing CorporationInventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck
-
Patent number: 7519994Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.Type: GrantFiled: July 11, 2006Date of Patent: April 14, 2009Assignee: Secure Computing CorporationInventors: Paul Judge, Guru Rajan
-
Patent number: 7516483Abstract: A method of accomplishing two-factor user authentication, comprising providing two separate user authentication methods, enabling a user to communicate authentication data for both authentication methods to a first web site using the internet, and enabling the communication of at least some of the authentication data from the first web site to a second web site also using the internet. Both web sites are thus involved in user authentication using the authentication data.Type: GrantFiled: February 26, 2007Date of Patent: April 7, 2009Assignee: Secure Computing CorporationInventor: Sean Brennan
-
Publication number: 20090066661Abstract: A handheld electronic apparatus comprises a touch keypad, a circuit board, a base and a support mechanism. The touch keypad is configured to receive a user's touch operation and comprises a plurality of icons. The circuit board is placed below the touch keypad and has a dome switch providing tactile feedback to the user when the user presses the touch keypad. The base is placed between the touch keypad and the circuit board and has a first opening through which the touch keypad can trigger the dome switch. The support mechanism is placed between the touch keypad and the base to support the touch keypad.Type: ApplicationFiled: March 19, 2008Publication date: March 12, 2009Applicant: High Tech Computer CorporationInventors: Chih Wei Tai, Chung Yuan Ou
-
Patent number: 7502222Abstract: A tablet PC and a assembling method thereof are provided. The tablet PC includes a body having a mounting point, a rotating mechanism mounted on the mounting point, and a power device mounted on the rotating mechanism. The power device is rotatable from a first position to a second position around the rotating mechanism so as to sustain the body.Type: GrantFiled: September 20, 2006Date of Patent: March 10, 2009Assignee: Arima Computer CorporationInventors: Ping Yu Cheng, Chien-Chu Lu, Cheung-Shien Tu
-
Patent number: 7501717Abstract: A universal driving apparatus of a computer system inputs two control signals of two different duty cycles through a speed control pin of a receptacle for connecting fans with the electricity supplied continuously. The differentiation percentage of the two speeds is compared with a threshold to identify the fan types. Therefore the computer system is capable of driving the identified fan correctly according to the result of the fan-type identification.Type: GrantFiled: May 18, 2006Date of Patent: March 10, 2009Assignee: Tyan Computer CorporationInventor: Chun-Hsu Chen
-
Publication number: 20090051649Abstract: A wearable display interface that during operation is in short-range, wireless bidirectional communication with a server, related methods, and systems including the interface and server. The wearable interface includes a power supply driving a processor that is operatively coupled to a visual display and a wireless interface where the wearable display interface further includes an attachment interface for linking the display interface to a user's body, such as wrist or neck, or apparel. The server is preferably a mobile telephone where the display interface is a client. In addition, the interface can further function as a speaker and/or microphone to received and/or accept verbalized data, such as input instructions or communication commands. Intentional distribution of processing across the server and client ensures that the interface maintains a small and efficient form factor.Type: ApplicationFiled: July 21, 2008Publication date: February 26, 2009Applicant: Conversational Computing CorporationInventor: Stephen A. Rondel