Patents Examined by David Jung
-
Patent number: 11421874Abstract: A system for controlling digital gas valves of an appliance utilizing a configurable duty cycle that includes a configurable ON time, a configurable cycle period and one or more configurable burner power level variables. In some instances, the configurable duty cycle may be configured at least in part by operation of a control knob, and in some instances, multiple burner power levels may be specified such that cycling may be performed between multiple burner power levels.Type: GrantFiled: March 19, 2019Date of Patent: August 23, 2022Assignee: MIDEA GROUP CO., LTD.Inventors: Richard W. Cowan, Daniel J. Trice
-
Patent number: 11346550Abstract: A burner of a gas stove includes a burner body, a partition member, and at least one flame cover. The burner body includes an inlet portion and a base. The inlet portion has at least one inlet passage for injecting gas and air, and the base has at least one mixture passage for mixing the gas and the air. The at least one mixture passage communicates with the at least one inlet passage. The partition member has a plurality of through holes and covers the at least one mixture passage. The at least one flame cover has a plurality of flame holes and covers the partition member. Whereby, the size of the burner of the gas stove could be reduced significantly, and the gas could mix with the air effectively and uniformly.Type: GrantFiled: October 24, 2019Date of Patent: May 31, 2022Assignee: GRAND MATE CO., LTD.Inventors: Chung-Chin Huang, Chin-Ying Huang, Hsin-Ming Huang, Hsing-Hsiung Huang, Yen-Jen Yeh, Wei-Long Chen, Kuan-Chou Lin, Tang-Yuan Luo
-
Patent number: 7502937Abstract: A variety of systems responsive to watermarked documents are detailed. In one, watermarking is employed to facilitate system access. In another, security is provided through analyzing digitally watermarked documents. In yet another, a digital watermark-based combination lock is adapted to analyze a sequence (and perhaps an orientation) of presented digitally watermarked cards.Type: GrantFiled: March 4, 2003Date of Patent: March 10, 2009Assignee: Digimarc CorporationInventors: Tyler J. McKinley, Matthew M. Weaver, Tony F. Rodriguez, Ravi K. Sharma, Marc D. Miller
-
Patent number: 7487363Abstract: A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.Type: GrantFiled: October 18, 2001Date of Patent: February 3, 2009Assignee: Nokia CorporationInventors: Jukka Alve, Peter K. Chiu, Zheng Yan, Juha Hietasarka
-
Patent number: 7454796Abstract: Obtaining exclusive control of a printing device by deferring printing of print data in a print queue. To obtain control, the recipient performs a process which may include authentication of the recipient. Control may be obtained either before the recipient is authenticated or after a successful authentication process. After the recipient has obtained control, print data in the print queue is temporarily deferred from being printed. The recipient may then select a print job to print, including selecting a print job from among the print jobs deferred in the print queue, or selecting a file to print over a network, including the Internet or an intranet. Further, printing device resources utilized in printing data during the period of exclusive control may be tracked and correlated to the recipient who has control.Type: GrantFiled: December 22, 2000Date of Patent: November 18, 2008Assignee: Canon Kabushiki KaishaInventors: Craig Mazzagatte, Don Hideyasu Matsubayashi, Royce E. Slick
-
Patent number: 7447673Abstract: A scalable enterprise computer system having the capability to provide transaction security as well as providing subscription filtering is described. As a method of transacting an event in the enterprise computer system a connection with an information broker by the publishe established after which it is determined if the event registered with the information broker. Next, a subscription corresponding to the registered event by a subscriber is accepted by the information broker, after which a platform neutral event is created that is then populated with event content which is then published to and received by the information broker.Type: GrantFiled: May 3, 2006Date of Patent: November 4, 2008Assignee: Software AGInventors: Rafael Bracho, Steven M. Jankowski
-
Patent number: 7448070Abstract: A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner.Type: GrantFiled: October 17, 2003Date of Patent: November 4, 2008Assignee: Microsoft CorporationInventors: Warren V. Barkley, Vivek Bhanu, Sean Lyndersay, Timothy M. Moore, Yinghua Yao
-
Patent number: 7426752Abstract: A system, method, and computer program product to automatically eliminate the distribution information available for reconstruction from a disguised dataset. The invention flattens input numerical values into a substantially uniformly distributed dataset, then maps the uniformly distributed dataset into equivalent data in a target distribution. The invention allows the incremental encryption of new values in an encrypted database while leaving existing encrypted values unchanged. The flattening comprises (1) partitioning, (2) mapping, and (3) saving auxiliary information about the data processing, which is encrypted and not updated. The partitioning is MDL based, and includes a growth phase for dividing a space into fine partitions and a prune phase for merging some partitions together.Type: GrantFiled: January 5, 2004Date of Patent: September 16, 2008Assignee: International Business Machines CorporationInventors: Rakesh Agrawal, Gerald George Kiernan, Ramakrishnan Srikant, Yirong Xu
-
Patent number: 7424614Abstract: A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver's identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver generates a private key for the receiver. The encrypted message may be decrypted by the receiver using the receiver's private key. The system may have multiple private key generators, each with a separate set of public parameters. Directory services may be used to provide a sender that is associated with one private key generator with appropriate public parameters to use when encrypting messages for a receiver that is associated with a different private key generator. A certification authority may be used to sign directory entries for the directory service. A clearinghouse may be used to avoid duplicative directory entries.Type: GrantFiled: January 25, 2005Date of Patent: September 9, 2008Assignee: Voltage Security, Inc.Inventors: Guido Appenzeller, Matthew J. Pauker, Rishi R. Kacker
-
Method and apparatus for mutual authentication at handoff in a mobile wireless communication network
Patent number: 7421582Abstract: A method for mutual authentication in a mobile wireless communication network (100) that includes the steps of: verifying a second authenticating device (20) by a mobile node (30) based on a first authentication between the mobile node and a first authenticating device (10); and verifying the mobile node by the second authenticating device based on the first authentication, whereby the mobile node and the second authenticating device perform a second authentication.Type: GrantFiled: May 28, 2004Date of Patent: September 2, 2008Assignee: Motorola, Inc.Inventors: Zhi Fu, Gregory W. Cox, Aaron M. Smith -
Patent number: 7418593Abstract: The present invention relates to a method and a system for performing testing in a device (1), in which at least one program (110, 112) is loaded and at least one item of mode data relating to the program is determined. Furthermore, at least one key (111) is generated for use in said program. In the method, at least two different security levels are determined for the keys to be used in the device (1). In the method, said security level determined for the key and at least one mode data relating to the program are examined, and on the basis of the examination, it is decided if said key is available for use in the mode indicated in the mode data of the program. The invention also relates to a device, a mobile communication device and a storage medium.Type: GrantFiled: February 3, 2004Date of Patent: August 26, 2008Assignee: Nokia CorporationInventors: Lauri Paatero, Antti Kiiveri
-
Patent number: 7415450Abstract: A centralized personal data base is disclosed that is accessible through the Internet and secured by a combination of identification numbers, including a basic, a primary and a secondary number. The secure personal data base is accessible to the user by the combination of the basic and a primary number. The secure personal data base is accessible to others who have been supplied with a primary and a secondary number.Type: GrantFiled: June 25, 2001Date of Patent: August 19, 2008Assignee: International Business Machines CorporationInventor: Prabhakar Gopalan
-
Patent number: 7412601Abstract: An illegal data use prevention system includes a registrar which issues first authentication information for a game machine reproducing data and second authentication information for a user-identifying IC card. The data is identified by the first authentication information and the second authentication information. The game machine contains the first authentication information and, for example, executes a game program in accordance with a result of determination as to whether the IC card contains the second authentication information. Thus, illegal use of data is effectively prevented.Type: GrantFiled: May 19, 2004Date of Patent: August 12, 2008Assignee: Sharp Kabushiki KaishaInventors: Yoshiki Shibata, Kunio Sensui, Kazuhiro Yamamoto
-
Patent number: 7404209Abstract: A content scanner for electronic documents such as email scans objects which are the target of hyperlinks within the document. If they are determined to be acceptable, a copy of the object is attached to the document and the link is replaced by one pointing to the copied object.Type: GrantFiled: August 11, 2003Date of Patent: July 22, 2008Assignee: Messagelabs LimitedInventor: Alexander Shipp
-
Patent number: 7401362Abstract: Systems and/or methods that edit an image having an operating system to alter a security setting and securely deploy the edited image to a bare computer over a network susceptible to malicious communication are described. The systems and/or methods may also enable secure deployment and/or receipt of an operating system and updates for the operating system.Type: GrantFiled: October 15, 2004Date of Patent: July 15, 2008Assignee: Microsoft CorporationInventors: Martin L. Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Patent number: 7398547Abstract: A method and apparatus are disclosed for providing High-Bandwidth Digital Content Protection during a channel change process. The method and apparatus include detection of High-Bandwidth Digital Content Protection capability on a receiver during an interface event. High-Bandwidth Digital Content Protection authentication is delayed for a predetermined time period to allow the channel change process to stabilize. The invention reduces a performance penalty associated with the channel change process.Type: GrantFiled: May 19, 2004Date of Patent: July 8, 2008Assignee: Pace plc.Inventor: Linden deCarmo
-
Patent number: 7398551Abstract: Enrolling devices with a clearinghouse server for Internet telephony and multimedia communications. Enrollment can be the process of taking a network device (such as a router, gateway, gatekeeper, etc.) and exchanging encrypted information with the clearinghouse server, so that later communications with that device can be secured. The enrollment is done with levels of security and verification that ensures the devices and clearinghouse server is legitimate.Type: GrantFiled: August 14, 2006Date of Patent: July 8, 2008Assignee: TransNexus, Inc.Inventors: Stephen Thomas, Rodney Scott McManus, Rick Vaughn
-
Patent number: 7391867Abstract: Systems and methods for graphically displaying statistical information relating to the operation of a quantum key distribution (QKD) system. The method includes exchanging quantum photons between first and second QKD stations for each combination of modulator states, collecting data on the number of quantum photon counts obtained in each of two detectors for each modulator state combination, defining a statistical region for each modulator state combination based on the collected data, and displaying the statistical regions on a graph having indicia indicating ideal locations for the statistical regions. The method also optionally includes adjusting the QKD system based on the graphically displayed information to optimize system performance.Type: GrantFiled: April 22, 2004Date of Patent: June 24, 2008Assignee: MagiQ Technologies, Inc.Inventor: Harry Vig
-
Patent number: 7392400Abstract: The present invention provides an apparatus and method for performing cryptographic operations on a plurality of input data blocks within a processor. In one embodiment, an apparatus for performing cryptographic operations is provided. The apparatus includes a cryptographic instruction and translation logic. The cryptographic instruction is received by fetch logic in a microprocessor as part of an instruction flow. The cryptographic instruction prescribes one of the cryptographic operations. The translation logic translates the cryptographic instruction into micro instructions. The micro instructions are ordered to direct the microprocessor to load a second input text block and to execute the one of the cryptographic operations on the second input text block prior to directing the microprocessor to store an output text block corresponding to a first input text block. Consequently, the output text block is stored during execution of the one of the cryptographic operations on the second input text block.Type: GrantFiled: March 15, 2004Date of Patent: June 24, 2008Assignee: Via Technologies, Inc.Inventors: G. Glenn Henry, Thomas A. Crispin, Terry Parks
-
Patent number: 7388957Abstract: Provided is an elliptic curve exponentiation apparatus that can counter the DFA when an elliptic curve exponentiation technique is used. A computation result verification unit 127 receives, as a computation result, an exponentiation-result-point (X, Y) from an elliptic curve computation unit 124. The computation result verification unit 127 computes X3+a×X+b, and computes Y2, and outputs the received exponentiation-result-point when judging that Y2=X3+a×X+b, and does not output the received exponentiation-result-point when not judging that Y2=X3+a×X+b.Type: GrantFiled: January 23, 2004Date of Patent: June 17, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Takatoshi Ono, Natsume Matsuzaki