Patents Examined by Tom Gyorfi
  • Patent number: 7624273
    Abstract: Residue calculating sections respectively obtain residues which take a plurality of integers as modulus, with respect to a user ID. The plurality of integers are stored in modulus storage sections and are prime to each other. Based on these residues and parameters stored in a coding parameter storage section, component codes constructed by continuous sequences of 1 and 0 using a predetermined number of bits as a unit are respectively generated by component code generating sections. These component codes are concatenated by a concatenating section, thereby to obtain a code to be embedded, which constructs watermark information.
    Type: Grant
    Filed: January 8, 2004
    Date of Patent: November 24, 2009
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Hirofumi Muratani
  • Patent number: 7380130
    Abstract: Methods and systems are provided for authenticating component(s) in connection with the use of a trusted graphics system. Techniques are provided for authenticating a graphics card in connection with a system that cryptographically secures content routed through a graphics pipeline, such that an application or device can indicate to the trusted graphics platform that the application or device is a trusted user of the trusted graphics platform, and such that the graphics platform can communicate to the trusted application or device that the graphics platform may be trusted by the application or device.
    Type: Grant
    Filed: April 18, 2002
    Date of Patent: May 27, 2008
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Nicholas P. Wilt
  • Patent number: 7373362
    Abstract: A coordinating push and user-initiated synchronization method and system. Initially, changes to a local application data store are detected and records affected by the change are identified. At some point, a record affected by a detected change is pushed to a remote system where it is ascertained whether the pushed record, in its current form as affected by the detected change, has already been replicated in or deleted from a remote application data store through user-initiated synchronization. If not, the pushed record is used to update the remote application data store. Instead, at some point it may be ascertained whether the identified record, in its current form as affected by the detected change, has been replicated in or deleted from the remote application data store through push synchronization as just described. If not, the remote application data store is synchronized with the local application data store.
    Type: Grant
    Filed: November 19, 2001
    Date of Patent: May 13, 2008
    Assignee: Extended Systems, Inc.
    Inventors: Richard Detweiler, David Butler, Srinivasan Ramanujam, Scott A. Jeide
  • Patent number: 7320141
    Abstract: A method, system, apparatus, and computer program product is presented for plugging in a standard authorization system in a manner such that legacy applications can use the authorization APIs and backend remote interfaces of a legacy authorization system. When a legacy application makes a call intended for a routine within the legacy authorization system, the call is redirected to make the appropriate calls to the APIs of the standard authorization system.
    Type: Grant
    Filed: March 21, 2001
    Date of Patent: January 15, 2008
    Assignee: International Business Machines Corporation
    Inventors: David Kurt Hemsath, Donna E. Skibbie
  • Patent number: 7296294
    Abstract: Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
    Type: Grant
    Filed: March 3, 2003
    Date of Patent: November 13, 2007
    Assignee: Microsoft Corporation
    Inventor: Aidan T. Hughes
  • Patent number: 7296042
    Abstract: Methods and systems for enabling arbitrary components to communicate with each other. The communication system includes a first set of components associated with one or more universal interfaces that include mobile code. The one or more universal interfaces comprise a data source interface, a data sink interface, an aggregation interface, a mutable aggregation interface, a context interface, a notification interface or a user interface. Further, the universal interfaces associated with the first set of components can be provided to and implemented by a second set of components to enable the second set of components to communicate with the first set of components despite the first set and the second set of component utilizing different communication mediums or protocols.
    Type: Grant
    Filed: April 20, 2001
    Date of Patent: November 13, 2007
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Warren Keith Edwards, Mark Webster Newman, Jana Zdislava Sedivy
  • Patent number: 7275157
    Abstract: A method and system for pre-authenticating a pre-establishing key management on a roaming device prior to reassociation to facilitate fast hand-off in a wireless network is described. For enhanced mobility, both authentication and key establishment is performed prior to reassociation of the roaming device between access points. When the roaming device enters in contact with one of the access points, a local authentication is performed between the access point and the roaming device prior to reassociation with the access point to allow for fast hand-offs of the device between access points within the network.
    Type: Grant
    Filed: December 5, 2003
    Date of Patent: September 25, 2007
    Assignee: Cisco Technology, Inc.
    Inventor: Nancy Cam Winget
  • Patent number: 7249369
    Abstract: The present invention matches sets of authentication, authorization, and auditing rules to resources in an Access System based on the contents of POST data received in HTTP POST requests. The system of the present invention receives a POST request and matches a set of rules to a resource using POST data referenced by the HTTP request. In one embodiment, the matching is performed by accessing required matching data. A portion of the POST data is selected and compared with the required data. If all of the required data is matched to the POST data, then the resource is successfully matched. The present invention further authorizes a user to access resources in an Access System based on the contents of POST data. An authorization rule is retrieved and authorization is performed using the POST data. If the authorization is successful, the system grants the user access to the resource.
    Type: Grant
    Filed: February 26, 2001
    Date of Patent: July 24, 2007
    Assignee: Oracle International Corporation
    Inventors: Charles W. Knouse, Lakshmi Velandai Thiyagarajan
  • Patent number: 6996555
    Abstract: The present invention provides an apparatus for searching a device on a network. The device searching server acquires a search condition from the device searching client, searches a device on the network and returns the search result to the device searching client. If the number of the device matching the search condition is at least equal to a predetermined number, additional information such as location information and charge information is added to the search result. Also if the device matching the search condition is absent, a device of a high frequency of use, determined on the use history, is outputted as the search result.
    Type: Grant
    Filed: May 24, 2000
    Date of Patent: February 7, 2006
    Assignee: Canon Kabushiki Kaisha
    Inventors: Shin Muto, Noboru Hamada