Patents by Inventor James A. Rowson
James A. Rowson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8275745Abstract: Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the hierarchically structured information to unauthorized parties. The present techniques include encrypting the hierarchically structured information such that an arrangement of nodes and corresponding data of the hierarchically structured information is not exposed and each node includes a corresponding node identifier that is not encrypted and updating the hierarchically structured information by referring to the nodes using the node identifiers.Type: GrantFiled: June 4, 2004Date of Patent: September 25, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prakash Reddy, James A. Rowson, Eamonn O'Brien-Strain, Robert N. Mayo, Yuhon Xiong
-
Patent number: 8255953Abstract: Techniques for content arrangement with a custom television (TV) channel in a custom TV system for providing a viewer with custom channels of content based on viewer preferences is described. Various examples of channel content ordering criteria upon which arrangement of content selections within a custom TV channel is based are also described. The custom TV system is suitable for execution on a digital video recorder.Type: GrantFiled: June 30, 2005Date of Patent: August 28, 2012Assignee: Hewlett-Packard Devlopment Company, L.P.Inventors: James A. Rowson, Richard C. Gossweiler, III, Kurt W. MacDonald
-
Patent number: 8208477Abstract: A data-dependent overlay network includes a plurality of data clouds. Each data cloud includes related data stored in a plurality of nodes in the data cloud. A peer list is maintained by each node in the data cloud. A peer list update process is used by each node in the data cloud for adding or removing nodes from peer lists for nodes in the data cloud.Type: GrantFiled: August 24, 2005Date of Patent: June 26, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yuhong Xiong, Robert N. Mayo, James A. Rowson, Eamonn O'Brien-Strain
-
Patent number: 7751627Abstract: In a method of evaluating an image for a dominant line, warped mesh information regarding saliency of the image is received. Displacements of components of the warped mesh information are determined relative to corresponding components in un-warped mesh information. Statistical representations of the displacements are utilized to evaluate the image for a dominant line.Type: GrantFiled: July 31, 2006Date of Patent: July 6, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Simon Widdowson, James A. Rowson, Eamonn O'Brien-Strain, Parkesh Reddy
-
Patent number: 7721085Abstract: The invention provides for encryption of hierarchically structured information. In one embodiment, a method is provided for encrypting hierarchically structured information. The hierarchically structured information includes a particular node and zero or more descendent nodes, each node having a name and zero or more additional data for the node. The name of the particular node is encrypted and the encrypted name is stored. The one or more descendent nodes are stored with the parent-child relationships of the one or more descendent nodes exposed. Additional data for the particular node may be encrypted. Further, some, none or all of the data for the descendent nodes may be encrypted.Type: GrantFiled: September 21, 2004Date of Patent: May 18, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yuhong Xiong, Robert N. Mayo, Eamonn O'Brien-Strain, James A. Rowson, Prakash Reddy
-
Patent number: 7620978Abstract: A single sign-on technique suitable for a network of devices with no centralized device or synchronized clocks such as a personal area network (PAN) is described. Responsive to a user signing-on to a first device via its user interface, the first device securely propagates authentication of the user for enabling one or more other devices in the network, each for a near-expiry time period measured from the device specific time of the respective device; thus providing for expiration of authentication to minimize how long data is vulnerable in case a device is lost or stolen. Described also is a device enabling protocol using authentication accumulation to secure against threats from a rogue device pretending to be another device in the network such as in man-in-the-middle and replay attacks.Type: GrantFiled: July 29, 2005Date of Patent: November 17, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prakash Reddy, James A. Rowson, Eamonn O'Brien-Strain
-
Patent number: 7596751Abstract: Methods, systems and machine-readable instructions for managing images are described. In one aspect, images are segmented into image clusters. A page layout for a contact sheet comprising thumbnail clusters each comprising thumbnails of the images in respective ones of the image clusters is generated. The page layout divides at least a portion of the contact sheet into regions each containing a respective one of the thumbnail clusters and at least one associated user input field. A description of the page layout is stored on a machine-readable medium.Type: GrantFiled: April 22, 2005Date of Patent: September 29, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: James A. Rowson, Eamonn O'Brien-Strain, John C. Schettino, Jr., Gary E. Herman
-
Patent number: 7529370Abstract: An aspect of the present invention is a digital media-playing device. The digital media-playing device includes a controller and a compensation-enabled component for playing digital media coupled to the controller wherein the compensation-enabled component is non-bypassable.Type: GrantFiled: April 29, 2004Date of Patent: May 5, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Kan Zhang, James A. Rowson
-
Patent number: 7454021Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.Type: GrantFiled: October 29, 2004Date of Patent: November 18, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prakash Reddy, James Rowson
-
Patent number: 7342900Abstract: A method and apparatus for estimating device availability in a pervasive peer to peer environment is presented. The method and apparatus include a linear estimation approach and a bin estimation approach, where the bin estimation approach may include enhanced bin estimation or adaptive bin estimation. A central node queries available contacted devices and builds a history of times and availability indications for the contacted device, and subsequently computes an availability probability curve based on assumptions regarding the availability indications and the time since the last received availability indication.Type: GrantFiled: May 19, 2004Date of Patent: March 11, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yuhong Xiong, Xiaofan Lin, James A Rowson
-
Publication number: 20080025639Abstract: In a method of evaluating an image for a dominant line, warped mesh information regarding saliency of the image is received. Displacements of components of the warped mesh information are determined relative to corresponding components in un-warped mesh information. Statistical representations of the displacements are utilized to evaluate the image for a dominant line.Type: ApplicationFiled: July 31, 2006Publication date: January 31, 2008Inventors: Simon Widdowson, James A. Rowson, Eamonn O'Brien-Strain, Parkesh Reddy
-
Patent number: 7136947Abstract: A system and method for enabling Intellectual Property (IP) Blocks to be reused at a system level. The present invention represents the IP blocks as blocks that exchange messages without needing to represent the functionality of the IP blocks. The implementations of these IP blocks exchanges messages through complex signaling protocols. In conventional systems, interfacing between IP blocks that use different signaling protocols is a tedious and error prone design task. The present invention uses regular expression based protocol descriptions to show how to map the message onto a signaling protocol. Given two protocols, the present invention builds an interface machine that automatically labels data referenced by all protocols. The present invention is capable of generating the interface even when the data sequencing of the two protocols differs.Type: GrantFiled: June 10, 1999Date of Patent: November 14, 2006Assignee: Cadence Design Systems, Inc.Inventors: Roberto Passerone, James A. Rowson, Alberto Sangiovanni-Vincentelli
-
Publication number: 20060242567Abstract: Methods, systems and machine-readable instructions for managing images are described. In one aspect, images are segmented into image clusters. A page layout for a contact sheet comprising thumbnail clusters each comprising thumbnails of the images in respective ones of the image clusters is generated. The page layout divides at least a portion of the contact sheet into regions each containing a respective one of the thumbnail clusters and at least one associated user input field. A description of the page layout is stored on a machine-readable medium.Type: ApplicationFiled: April 22, 2005Publication date: October 26, 2006Inventors: James Rowson, Eamonn O'Brien-Strain, John Schettino, Gary Herman
-
Publication number: 20060093150Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.Type: ApplicationFiled: October 29, 2004Publication date: May 4, 2006Inventors: Prakash Reddy, James Rowson
-
Publication number: 20050273472Abstract: Techniques for verifying whether an incremental update was correctly applied to a set of hierarchically structured information include determining an overall integrity code for the hierarchically structured information and attaching the overall integrity code to the hierarchically structured information. An incremental update according to the present techniques includes an integrity code that is combined into the overall integrity code attached to the hierarchically structured information when the incremental update is applied to the hierarchically structured information. The integrity code of the incremental update is generated such that when the overall integrity code is recomputed it will match the overall integrity code attached to the hierarchically structured information if the incremental update was correctly applied.Type: ApplicationFiled: June 4, 2004Publication date: December 8, 2005Inventors: Prakash Reddy, James Rowson, Eamonn O'Brien-Strain, Robert Mayo, Yuhong Xiong, Kan Zhang
-
Publication number: 20050273471Abstract: Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the hierarchically structured information to unauthorized parties. The present techniques include encrypting the hierarchically structured information such that an arrangement of nodes and corresponding data of the hierarchically structured information is not exposed and each node includes a corresponding node identifier that is not encrypted and updating the hierarchically structured information by referring to the nodes using the node identifiers.Type: ApplicationFiled: June 4, 2004Publication date: December 8, 2005Inventors: Prakash Reddy, James Rowson, Eamonn O'Brien-Strain, Robert Mayo, Yuhong Xiong
-
Publication number: 20050259607Abstract: A method and apparatus for estimating device availability in a pervasive peer to peer environment is presented. The method and apparatus include a linear estimation approach and a bin estimation approach, where the bin estimation approach may include enhanced bin estimation or adaptive bin estimation. A central node queries available contacted devices and builds a history of times and availability indications for the contacted device, and subsequently computes an availability probability curve based on assumptions regarding the availability indications and the time since the last received availability indication.Type: ApplicationFiled: May 19, 2004Publication date: November 24, 2005Inventors: Yuhong Xiong, Xiaofan Lin, James Rowson
-
Patent number: 5521836Abstract: A process for producing placement information for layouts of circuit elements of networks that are initially represented by netlists such that datapaths can be advantageously placed into a regular array. In one preferred embodiment, the method includes steps of encoding datapath information in instance names of a netlist generated by a datapath compiler; using the encoded datapath information for defining partitioned areas that preserve datapaths; and generating circuit layouts from the netlist, which layouts contain floor plans of the datapaths.Type: GrantFiled: December 12, 1994Date of Patent: May 28, 1996Assignee: VLSI Technology, Inc.Inventors: Mark R. Hartoog, James A. Rowson
-
Patent number: D852038Type: GrantFiled: March 16, 2018Date of Patent: June 25, 2019Assignee: LINPAC PACKAGING LIMITEDInventors: Tom Hirst, James Rowson
-
Patent number: D886583Type: GrantFiled: March 16, 2018Date of Patent: June 9, 2020Assignee: LINPAC PACKAGING LIMITEDInventors: Tom Hirst, James Rowson