Patents by Inventor Gregory Rose

Gregory Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070207873
    Abstract: A infrared method and apparatus for the kinematic analysis of a golfer is disclosed. The method includes selectively positioning a plurality of infrared markers on a golfer, and optionally on a golf club. Images of the golfer may be acquired before, during, and after he/she swings the golf club. The images may be analyzed to determine the kinematic characteristics of the movement of the golfer's body parts. A kinematic analysis of the golfer's body parts may then be correlated with a kinematic analysis of the golf club. The method and apparatus disclosed herein provide the advantage of allowing a golfer's movement to be correlated with a kinematic analysis of their golf swing while minimizing the physical restrictions on the golfer's movement.
    Type: Application
    Filed: March 1, 2006
    Publication date: September 6, 2007
    Inventor: Gregory Rose
  • Patent number: 7254728
    Abstract: Power saving method is achieved by weakly holding a signal line in its last in time state, which is responsive to and may be overcome by the state of an external signal. During sleep mode, the weakly held signal line state tracks and holds the external signal using alternatively a controllable weak pull-up or pull-down device, such that weakly held state may be driven to a different state by the external driving signal with slight power consumption. When sleep mode is off, the keeper function is disabled and the signal line maybe driven alternatively internally or externally depending upon the state of an enable line.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: August 7, 2007
    Assignee: Intel Corporation
    Inventors: Gregory Rose, James R. Feddeler, Zahid Ahsanullah
  • Publication number: 20070174613
    Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.
    Type: Application
    Filed: February 10, 2006
    Publication date: July 26, 2007
    Inventors: Michael Paddon, Gregory Rose, James Semple, Philip Hawkes
  • Publication number: 20070116282
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
    Type: Application
    Filed: January 24, 2007
    Publication date: May 24, 2007
    Applicant: QUALCOMM, INC.
    Inventors: Philip Hawkes, Raymond Hsu, Ramin Rezaiifar, Gregory Rose, Paul Bender, Jun Wang, Roy Quick, Arungundram Mahendran, Parag Agashe
  • Publication number: 20070065790
    Abstract: A method and system for remotely assessing the physical fitness of a golfer is disclosed. Preferably, a golfer performs one or more fitness tests to determine his/her physical fitness level. Based on the golfer's performance of each of the one or more fitness tests, a workout regimen may be generated to assist the golfer in improving his/her performance of the one or more fitness tests, as well as his/her golfing performance. It is desirable for the method and system to be remotely accessible using a webpage accessible via a data network. In this manner, a plurality of golfers may have a customized workout regimen designed for them without the expense typically associated with such services.
    Type: Application
    Filed: September 19, 2005
    Publication date: March 22, 2007
    Inventors: Christopher Ladd, Gregory Rose, David Phillips
  • Publication number: 20070065791
    Abstract: A method and system for remotely assessing the physical fitness of a golfer is disclosed. Preferably, a golfer performs one or more fitness tests to determine his/her physical fitness level. Based on the golfer's performance of each of the one or more fitness tests, a workout regimen may be generated to assist the golfer in improving his/her performance of the one or more fitness tests, as well as his/her golfing performance. It is desirable for the method and system to be remotely accessible using a webpage accessible via a data network. In this manner, a plurality of golfers may have a customized workout regimen designed for them without the expense typically associated with such services.
    Type: Application
    Filed: September 21, 2006
    Publication date: March 22, 2007
    Inventor: Gregory Rose
  • Publication number: 20060253900
    Abstract: Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted network traffic. The method includes executing a web-server and detecting a passive socket has been created. The method also includes establishing contact with a firewall and requesting the firewall to permit flows directed to the passive socket. According to some embodiments, the method can include closing the web-server and destroying the passive socket. The firewall can be contacted with the destroyed passive socket information and can be sent a request to deny flows directed to the destroyed passive socket. If the passive socket is closed, the method can automatically revoke the request to the firewall to permit flows directed to the passive socket.
    Type: Application
    Filed: December 21, 2005
    Publication date: November 9, 2006
    Inventors: Michael Paddon, Philip Hawkes, Gregory Rose
  • Publication number: 20060252849
    Abstract: Conventional building materials such as plywood and wallboard are both widely used in residential and commercial interior construction and highly susceptible to mold and fungal growth when utilized in a moist environment or periodically subjected to wetting. Mold growth has been associated with certain health risks attributed to toxic airborne mold spores, unpleasant smells and, at best, is considered unsightly. The invention provides a two-part antifungal formulation prepared from at least a binder admixture and a preservative admixture that can be applied to surfaces and/or incorporated within materials that are susceptible to mold growth. The antifungal formulation forms an antifungal coating on, and in some instances at least partially through, the substrate that will both inhibit mold and fungal growth while improving the persistence of the antifungal effects and/or reducing the concentration of antifungal agents necessary to achieve a desired level of antifungal activity.
    Type: Application
    Filed: April 11, 2006
    Publication date: November 9, 2006
    Inventors: Gregory Rose, Michael Kanney
  • Publication number: 20060236098
    Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
    Type: Application
    Filed: July 15, 2005
    Publication date: October 19, 2006
    Inventors: Alexander Gantman, Aram Perez, Gregory Rose, Laurence Lundblade, Matthew Hohlfeld, Michael Paddon, Oliver Michaelis, Ricardo Lopez
  • Publication number: 20060205388
    Abstract: A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT.
    Type: Application
    Filed: February 3, 2006
    Publication date: September 14, 2006
    Inventors: James Semple, Gregory Rose, John Nasielski
  • Publication number: 20060179336
    Abstract: Power saving method is achieved by weakly holding a signal line in its last in time state, which is responsive to and may be overcome by the state of an external signal. During sleep mode, the weakly held signal line state tracks and holds the external signal using alternatively a controllable weak pull-up or pull-down device, such that weakly held state may be driven to a different state by the external driving signal with slight power consumption. When sleep mode is off, the keeper function is disabled and the signal line maybe driven alternatively internally or externally depending upon the state of an enable line.
    Type: Application
    Filed: March 21, 2006
    Publication date: August 10, 2006
    Inventors: Gregory Rose, James Feddeler, Zahid Ahsanullah
  • Publication number: 20060120531
    Abstract: A communications system and method of bootstrapping mobile station authentication and establishing a secure encryption key are disclosed. In one embodiment of the communications network, a distinguished random challenge is reserved for generation of a secure encryption key, wherein the distinguished random challenge is not used for authentication of a mobile station. The distinguished random challenge is stored at a mobile station's mobile equipment and used to generate a secure encryption key, and a bootstrapping function in the network uses a normal random challenge to authenticate the mobile station and the distinguished random challenge to generate the secure encryption key.
    Type: Application
    Filed: September 2, 2005
    Publication date: June 8, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Patent number: 7058827
    Abstract: Power saving method is achieved by weakly holding a signal line in its last in time state, which is responsive to and may be overcome by the state of an external signal. During sleep mode, the weakly held signal line state tracks and holds the external signal using alternatively a controllable weak pull-up or pull-down device, such that weakly held state may be driven to a different state by the external driving signal with slight power consumption. When sleep mode is off, the keeper function is disabled and the signal line maybe driven alternatively internally or externally depending upon the state of an enable line.
    Type: Grant
    Filed: July 18, 2001
    Date of Patent: June 6, 2006
    Assignee: Intel Corporation
    Inventors: Gregory Rose, James R. Feddeler, Zahid Ahsanullah
  • Publication number: 20060079205
    Abstract: Methods and devices for instructing a subscriber identity module in a cellular communications network to process non-standard authentication information in a standard manner are disclosed. One embodiment of a method comprises receiving a first message authentication code (MAC) and an authentication management field (AMF) at a subscriber identity module as part of an authentication protocol, calculating a second MAC and determining whether the second MAC is equivalent to the first MAC. If the first and second MAC are not equivalent, the SIM calculates a third MAC and determines whether the first MAC is equivalent to the third MAC, and if so, the subscriber identity module processes the AMF in a predefined or standard manner.
    Type: Application
    Filed: September 2, 2005
    Publication date: April 13, 2006
    Inventors: James Semple, Gregory Rose, Michael Paddon, Philip Hawkes
  • Publication number: 20060048235
    Abstract: An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, James Semple, Roy Quick, Philip Hawkes
  • Publication number: 20060046690
    Abstract: Pseudo-secret key generation in a communications system. A subscriber station may be configured with a processing system having first and second security protocols. The processing system uses the first security protocol to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol to generate a response to the challenge from the pseudo-secret key.
    Type: Application
    Filed: January 6, 2005
    Publication date: March 2, 2006
    Inventors: Gregory Rose, Roy Quick, John Nasielski, James Semple
  • Publication number: 20050286522
    Abstract: Embodiments describe a system and/or method for efficient classification of network packets. According to an aspect a method includes describing a packet as a feature vector and mapping the feature vector to a feature space. The method can further include defining a feature prism, classifying the packet relative to the feature prism, and determining if the feature vector matches the feature prism. If the feature vector matches the feature prism the packet is passed to a data recipient, if not, the packet is blocked. Another embodiment is an apparatus that includes an identification component that defines at least one feature of a packet and a classification component that classifies the packet based at least in part upon the at least one defined feature.
    Type: Application
    Filed: June 21, 2005
    Publication date: December 29, 2005
    Inventors: Michael Paddon, Gregory Rose, Philip Hawkes
  • Publication number: 20050257255
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Application
    Filed: June 1, 2005
    Publication date: November 17, 2005
    Inventors: Roy Quick, Gregory Rose
  • Publication number: 20050254656
    Abstract: Efficient transmission of cryptographic information in secure real time protocol. A transmitting terminal may be used to encrypt data with a session key derived from a bit-stream. The bit-stream may be sent with header information to the receiving terminal. To conserve bandwidth, the information may be divided into portions, and each portion transmitted with an encrypted data packet. The receiving terminal may be used to recover the bit-stream from the information portions in the packet headers, and use the bit-stream to derive the session key. The session key may be used to decrypt the data.
    Type: Application
    Filed: March 17, 2005
    Publication date: November 17, 2005
    Inventors: Gregory Rose, Raymond Hsu
  • Publication number: 20050213752
    Abstract: Stream cipher encryption and message authentication. Stream cipher encryption is performed by generating a keystream at the transmitting end from a state value, applying the keystream to plaintext to generate an encrypted message block having at least a portion of the plaintext converted to ciphertext, and updating the state value as a function of said at least a portion of the plaintext. Stream cipher decryption is performed by generating a keystream at the receiving end from the same state value, applying the keystream to the encrypted message block to convert the ciphertext to plaintext, and updating the state value as a function of the plaintext. Message authentication techniques are also described.
    Type: Application
    Filed: February 17, 2005
    Publication date: September 29, 2005
    Inventors: Phillip Hawkes, Michael Paddon, Gregory Rose