Patents Issued in February 14, 2008
  • Publication number: 20080037759
    Abstract: Methods and systems are presented for implementing wireless number portability in a wireless communications network, in which an originating switching component determines whether a called number is ported or not based on profile information from a home location register without querying a number portability database.
    Type: Application
    Filed: July 19, 2006
    Publication date: February 14, 2008
    Applicant: LUCENT TECHNOLOGIES INC.
    Inventors: Frances Mu-Fen Chin, Peggy Hasan, Huixian Song, Sandra Lynn True
  • Publication number: 20080037760
    Abstract: The present invention provides a call flow staffing estimation tool. A method in accordance with the present invention includes: generating a staffing impact chart for a future period of time based on historical call volume data to a call center, a schedule of agents servicing the call center, and an average handing time of calls to the call center by the agents; selectively changing an input to the generating step; and immediately updating the staffing impact chart to reflect the change.
    Type: Application
    Filed: June 28, 2006
    Publication date: February 14, 2008
    Inventors: James N. Boughton, Salvatore Cino, Charles R. Simmons
  • Publication number: 20080037761
    Abstract: A system, method, and computer readable medium for remotely monitoring call center statistics, that comprises, monitoring virtual automated call distribution connection status of an agent, scanning agent desktop environment connection status of the agent, surveying server logon status of the agent, auditing computer schedule status of the agent, observing network throughput status of the agent, scoring the call center statistics based upon the monitored virtual automated call distribution connection status, the scanned agent desktop environment connection status, the surveyed server logon status, the audited computer schedule status and the observed network throughput status, and displaying the scored call center statistics by agent.
    Type: Application
    Filed: June 28, 2006
    Publication date: February 14, 2008
    Applicant: West Corporation
    Inventors: Jeffrey William Cordell, Jereomy K. Frum
  • Publication number: 20080037762
    Abstract: Disclosed are apparatus and methods for utilizing the camera or video capability of particular communication devices, such as cell phones, to enhance handling of calls, such as emergency calls. In one implementation, when a call is made to an emergency response center (ERC) using an image/video capable communication device is queued until an agent is available for handling the call, one or more images or video may be collected from such caller by utilizing the image/video capability of the caller's communication device. The images collected from a plurality of different callers may then be sorted into different event groups. For instance, all the images/video that relate to a same emergency event, such as a traffic accident, are grouped together into a same event group. The different groups can then be prioritized for handling by an available agent. Additionally, the individual callers for each group may also be prioritized based on the collected images/video, e.g.
    Type: Application
    Filed: July 11, 2006
    Publication date: February 14, 2008
    Inventors: Shmuel Shaffer, Labhesh Patel, Mukul Jain, Sanjeev Kumar
  • Publication number: 20080037763
    Abstract: A method and system to process communications in an automatic communication distributor is described. The method may comprise receiving a communication and identifying an originating location from which the communication originates. Thereafter, a determination is made when the originating location corresponds to a predefined high priority geographical area and a priority to the communication is assigned based on the originating location. The call may be assigned a higher priority when the originating location corresponds to the high priority geographical area than when the originating location does not correspond with the high priority geographical area. The communication is queued based on the assigned priority. A method is also provided to assign an agent using an automated call distributor based on a distance between the originating location of the communication and the determined geographical locations of the potential respondents.
    Type: Application
    Filed: July 26, 2006
    Publication date: February 14, 2008
    Inventors: Shmuel Shaffer, Labhesh Patel, Mukul Jain, Sanjeev Kumar
  • Publication number: 20080037764
    Abstract: In one embodiment, a method includes detecting termination of a first connection between a first caller and a first agent during a communication session between the first caller and the first agent. The method also includes storing information indicating a state of the communication session at the termination of the first connection, and communicating the information to the first agent or to a second agent in response to establishment of a second connection between the first caller and the first agent or the second agent to facilitate a continuation of the communication session.
    Type: Application
    Filed: July 31, 2006
    Publication date: February 14, 2008
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: ERIC H. LEE, FADI R. JABBOUR, DAVID C. LEE, JOHNNY H. LEE
  • Publication number: 20080037765
    Abstract: A keypad (1200) includes a plurality of keys (1202) and a plurality of key dividers (1204-1210) wherein each of the key dividers includes a plurality of raised guide portions (1212-1214) and at least one tactile cue portion (1214) that is interposed between the plurality of raised guide portions (1212-1214). In one example, the keypad (1200) is a bell keypad and is made up of an elastomeric substrate (44) that includes the key dividers (1212-1214), a keypad dome array (48) that supports the silicone substrate (44) and a keypad sheet (36), such as a top sheet of a front assembly, having keypad indicia thereon and slots operatively sized to receive the plurality of key dividers.
    Type: Application
    Filed: July 24, 2006
    Publication date: February 14, 2008
    Applicant: Motorola, Inc.
    Inventors: Mark D. Finney, Steve C. Emmert
  • Publication number: 20080037766
    Abstract: An uncomfortable feeling due to lack of the speech of a far end speaker and a convergence signal voice (sound) is prevented, and the echo of the far end speaker is removed. A pseudo signal generating circuit has a phase inverter (10) for inverting the phase of a signal, a pseudo hybrid circuit (11) for generating a pseudo echo having the same or substantially the same characteristic as that of the true signal, and a pseudo telephone set (5-2). By generating a pseudo echo having the phase opposite to that of the true signal and having the same or substantially the same characteristics as that of the true signal, the uncomfortable signals (echo, etc.) are cancelled out. When a telephone set is connected to a caller or when an extension transfer occurs, an adaptive filter convergence signal is generated for a predetermined constant time only during “no-voice (sound) (silence)” of the far end speaker's signal.
    Type: Application
    Filed: April 7, 2005
    Publication date: February 14, 2008
    Inventor: Masashi Takada
  • Publication number: 20080037767
    Abstract: A stand for a handset having a display is provided. The stand consists of a fixed portion and an adjustable portion coupled to the fixed portion. The adjustable portion is operable to receive the handset and operable for adjustment of a viewing angle of the handset.
    Type: Application
    Filed: July 26, 2006
    Publication date: February 14, 2008
    Inventors: Mark Solon Kanjitsu Gullickson, Naoki Shimada, Erik Raymond Chin
  • Publication number: 20080037768
    Abstract: A microphone module. The module comprises a carrier having a first side and an opposing second side and comprising a through hole. A microphone is disposed on the first side of the carrier and corresponding to the through hole. A processing chip is disposed on the first side of the carrier and coupled to the microphone. An encapsulant is disposed on the first side of the carrier to encapsulate the microphone and the processing chip.
    Type: Application
    Filed: July 17, 2006
    Publication date: February 14, 2008
    Applicant: FORTEMEDIA, INC.
    Inventors: Wei-Chan Hsu, Li-Te Wu, Bing-Ming Ho
  • Publication number: 20080037769
    Abstract: A substrate (56) for a handset device (10) includes a keypad contact array (108) on the substrate (56) and a display electrode pattern (604) on the substrate (56). In addition, in one example, the substrate (56) for a handset device (10) may include a first surface and a second surface. A keypad contact array (108) and a display electrode pattern (604) may be included on the first surface (96) of the substrate (56). A display (52) may be operatively coupled to the display electrode pattern (604). A portion of the substrate (56) may define at least a portion of an audio port (274).
    Type: Application
    Filed: July 24, 2006
    Publication date: February 14, 2008
    Applicant: Motorola, Inc.
    Inventors: Steve C. Emmert, John P. Boos
  • Publication number: 20080037770
    Abstract: A handset device (10) includes a laminated front sub-assembly (15) and a rear housing (20) supporting the laminated front sub-assembly. In addition, in one example, an integrated circuit substrate (24), a battery (28), and a speaker (32) are held adjacent to each other in a non-stacked arrangement in the rear housing. In one example, the laminated front sub-assembly may include a sheet (32) having operative indicia coupled therewith and a user interface substrate (56) operatively coupled to the sheet. The laminated front assembly 15 can also include a display (52), such as an electrophoretic display, held between the user interface substrate (56) and the sheet (32).
    Type: Application
    Filed: July 24, 2006
    Publication date: February 14, 2008
    Applicant: Motorola, Inc.
    Inventor: Steve C. Emmert
  • Publication number: 20080037771
    Abstract: A handset device (10) includes a substrate (56) defining a first audio port portion (78) and having a contact pad (266). An adhesive (60) is operatively coupled to the substrate (56). The adhesive (60) defines a second audio port portion (276) stacked with the first audio port portion (278) and defines a first electrical port portion (262). A speaker (32) having an electrical connector (238) is operatively coupled to the contact pad (266) through the first electrical port portion (262). The adhesive (60) is operative to seal the first and second audio port portions (278 and 276) from the electrical port portion (262). In addition, in one example, the handset device (10) may include a substrate (56) defining a first audio port portion (278), a speaker (32) operatively coupled to the substrate (56), and a rear housing (20) operatively coupled to the substrate (56) and defining an audio cavity (1104).
    Type: Application
    Filed: July 24, 2006
    Publication date: February 14, 2008
    Inventors: Greg R. Black, Steve C. Emmert, Yi-Lin Pei
  • Publication number: 20080037772
    Abstract: A telephone interface circuit comprising a speech circuit, a control circuit turning on upon receiving a supply of a forward direction trigger current so as to connect first and second telephone lines and the speech circuit, and going off upon receiving a supply of a reverse direction trigger current so as to disconnect the first and second telephone lines and the speech circuit, a capacitor charging and discharging charge supplied from the first telephone line, and a hook switch supplying charge accumulated at the capacitor when off-hook to the control circuit as a forward direction trigger current, and supplying charge discharged from the capacitor when on-hook to the control circuit as a reverse direction trigger current.
    Type: Application
    Filed: July 6, 2006
    Publication date: February 14, 2008
    Inventor: Yoshinobu Fujiwara
  • Publication number: 20080037773
    Abstract: A telephone interface circuit comprises a first transistor for controlling opening and closing between a speech circuit and subscriber lines, a second transistor for controlling the first transistor to turn on and off, a positive feedback circuit connecting a collector terminal of the first transistor and a base terminal of the second transistor, an overcurrent detection circuit detecting overcurrent applied to the subscriber lines, and a breaker circuit for turning off the first transistor by lowering the base potential of the second transistor to a low potential when overcurrent is detected at the overcurrent detection circuit. Here, the base terminal of the first transistor and a collector terminal of the second transistor are connected. Further, when off-hook, the base potential of the second transistor is controlled in such a manner as to become a high potential by a microcomputer.
    Type: Application
    Filed: July 6, 2006
    Publication date: February 14, 2008
    Inventor: Yoshinobu Fujiwara
  • Publication number: 20080037774
    Abstract: The invention provides techniques for secure messages transmission using a public key system to exchange secret keys. A first entity creates public and private keys by generating a product n of two large, randomly chosen prime numbers, and then generating random matrices {A, C}, in the group GL(r,Zn) with a chosen matrix rank r such that AC is not equal to CA, and then generating a matrix B=CAC, and finding a matrix G that commutes with C. Matrices A, B, G and the integers n and r are then published as the public key and matrix C is then kept as the private key. A second entity then obtains the public key and calculates a secret matrix D that commutes with G, and further calculates the matrices K=DBD and E=DAD. The message to be sent is then encrypted using matrix K as the secret key and then sent to the first entity with matrix E. First entity then retrieves secret matrix K using K=CEC and then decrypts the received encrypted message using the retrieved secret matrix K.
    Type: Application
    Filed: July 26, 2006
    Publication date: February 14, 2008
    Inventor: Keith R. Slavin
  • Publication number: 20080037775
    Abstract: The present invention provides a method, system, and device for producing cryptographic keys. More specifically, the cryptographic keys may be produced such that they have an effective key size and an apparent key size that differs from the effective key size. Generally, the effective key size is not restricted by export regulations and the apparent key size may be restricted by export regulations.
    Type: Application
    Filed: March 31, 2006
    Publication date: February 14, 2008
    Applicant: Avaya Technology LLC
    Inventor: Robert R. Gilman
  • Publication number: 20080037776
    Abstract: A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold A(x, y, s, t) which is expressed by x-coordinate, y-coordinate, parameter s, and parameter t and is defined on finite field Fq, x-coordinate and y-coordinate of section being expressed by functions of parameter s and parameter t, calculates hash value of message m, generates hash value polynomial by embedding hash value in 1-variable polynomial h(t) defined on finite field Fq, and generates digital signature Ds(Ux(t), Uy(t), t) which is curve on section, the x-coordinate and y-coordinate of curve being expressed by functions of parameter t, by substituting hash value polynomial in parameter s of section.
    Type: Application
    Filed: July 24, 2006
    Publication date: February 14, 2008
    Inventors: Koichiro Akiyama, Yasuhiro Goto
  • Publication number: 20080037777
    Abstract: In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored are written into data chunks. The method includes generating an encryption key associated with a first archive file to be stored when encryption is requested for the storage operation, encrypting the archive data from the data stream using the encryption key to create an encrypted data chunk when a data stream containing the archive file is processed in the pipeline storage system, storing the encrypted data chunk on a storage medium, and storing the encryption key in a manner accessible during a restore operation of the encrypted data chunk.
    Type: Application
    Filed: August 22, 2007
    Publication date: February 14, 2008
    Inventors: Paul Ignatius, Anand Prahlad, Mahesh Tyagarajan, Manoj Retnamma, Arun Amarendran, Rajiv Kottomtharayil
  • Publication number: 20080037778
    Abstract: A set of users is divided into subsets, and a decipher key is generated for each subgroup by using different key generation polynomials. A session key, that is, a decipher key for ciphered data is distributed so as to be deciphered with the decipher key of each user. Decipher keys of an arbitrary number of users can be revoked. On confiscating a pirate deciphering unit, the black-box tracing is performed by assuming users subject to revocation to be suspects. The tracer assumes the suspects, and investigates the suspects n times (n being the total number of users), so that all pirates in a coalition can be identified.
    Type: Application
    Filed: October 9, 2007
    Publication date: February 14, 2008
    Inventor: Tatsuyuki MATSUSHITA
  • Publication number: 20080037779
    Abstract: A method and system for authenticating a smart battery having a smart battery and an electronic device. Both the device and the smart battery generate encrypted random strings using key material based by A/D noise bits as a seed value. A pseudo random number is generated from the A/D noise that is transmitted to both the electronic device and the smart battery. The pseudo random number is used by both devices as a key index to select one of a plurality of keys stored in separate key libraries. The keys, or key material, is used to execute an encryption algorithm. The two encryption data streams are then compared to authenticate the smart battery.
    Type: Application
    Filed: November 20, 2006
    Publication date: February 14, 2008
    Inventors: Andrew Seman, Daniele Brotto, Danh Trinh, Fugen Qin
  • Publication number: 20080037780
    Abstract: A content protection system including: a user interface for providing data modification parameters for protected and unprotected digital content, the protected digital content being encrypted; a software driver application for receiving the data modification parameters, processing the unprotected content in accordance with the modification parameters, and distributing the modification parameters to a protected content application; a protected content application having a protected data area wherein the protected data is decrypted into computer readable data, processed according to the data modification parameters, and re-encrypted for delivery to a rendering device; a rendering device including a rendering interface for decrypting the modified protected data, mixing it with the unprotected data to produce mixed data and outputting the mixed data.
    Type: Application
    Filed: July 17, 2007
    Publication date: February 14, 2008
    Inventor: Leonard Layton
  • Publication number: 20080037781
    Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.
    Type: Application
    Filed: October 15, 2007
    Publication date: February 14, 2008
    Applicant: Cryptography Research, Inc.
    Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Matthew Carter, Peter Pearson
  • Publication number: 20080037782
    Abstract: A method, apparatus, and system are directed towards reducing a channel change time contribution related to security for digital media devices by using key management and a virtual smart card. In one embodiment, Entitlement Control Messages (ECMs) used to provide access to content keys for decrypting of content are provided over the network to the digital media device at an increased frequency over traditional systems. In another embodiment, use of the virtual smart card is directed towards removing physical limitations that may arise due to the use of a physical smart card, separate secure microprocessor, or the like, and associated physical interface, thereby further reducing channel change times contributed to content protection components of the digital media device.
    Type: Application
    Filed: July 19, 2007
    Publication date: February 14, 2008
    Applicant: Widevine Technologies, Inc.
    Inventor: Glenn A. Morten
  • Publication number: 20080037783
    Abstract: Provided are a device and method for providing a video stream, in which a hash value of a frame is included in the header of a video stream, and authentication information about the header is inserted into the video stream, thus ensuring integrity against the forgery of the video stream. The device includes a base frame encoding unit which encodes a base frame, an enhancement frame encoding unit which encodes an enhancement frame, a frame encryption unit which encrypts the encoded base frame and the encoded enhancement frame, a hash processing unit which calculates hash values for the encrypted base frame and the encrypted enhancement frame and hash values included in headers of previous and subsequent video streams, a header management unit which includes information about the encoded base frame and the encoded enhancement frame and the calculated hash values, in a header, and manages the header, and an authentication information creation unit which creates authentication information about the header.
    Type: Application
    Filed: March 23, 2007
    Publication date: February 14, 2008
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Hyoung-shick Kim, Kyung-mo Park, Myung-soo Chang
  • Publication number: 20080037784
    Abstract: The repeater of the present invention communicates data signals over power lines. The repeater of one embodiment includes at least one modem that receives a data packet and attempts to decrypt the data packet with a first and/or second encryption key. If the packet is successfully decrypted using the first encryption key, the packet is encrypted using the second encryption and transmitted over the power line. If the packet is successfully decrypted using the second encryption key, the packet is encrypted using the first encryption and transmitted over the power line.
    Type: Application
    Filed: October 16, 2007
    Publication date: February 14, 2008
    Inventors: Kevin Corcoran, James Mollenkopf
  • Publication number: 20080037785
    Abstract: A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device an a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secret key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.
    Type: Application
    Filed: September 27, 2006
    Publication date: February 14, 2008
    Inventors: Alexander Gantman, Tolga Yalcinkaya, Gregory Gordon Rose, Lu Xiao
  • Publication number: 20080037786
    Abstract: A station and a method of collecting information corresponding to security. A wireless communicator transmits a request packet to search a wireless network to at least one external device and receives a response packet to the request packet. An authentication method determiner analyzes the response packet to search for at least one wireless network and determines an authentication method supported by each of the searched wireless networks. A storage unit stores the determined authentication method of each of the searched wireless networks. Thus, necessary information corresponding to security during a connection to a wireless network can be searched in advance and provided to a user.
    Type: Application
    Filed: February 8, 2007
    Publication date: February 14, 2008
    Applicant: Samsung Electronics Co., Ltd
    Inventor: Sung-joon Park
  • Publication number: 20080037787
    Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
    Type: Application
    Filed: October 19, 2007
    Publication date: February 14, 2008
    Applicant: Seven Networks, Inc.
    Inventors: Lee Boynton, Trevor Fiatal, Scott Burke, Mark Sikes
  • Publication number: 20080037788
    Abstract: A data decryption apparatus that decrypts encrypted data, includes a first data-receiving unit that receives a first data set, in which information on an encryption specification is embedded, through a first communication path; a time-information obtaining unit that obtains time information on a reception of the first data set by the first data receiving unit; a time-information storage unit that stores the time information with the information on the encryption specification associated therewith; a second data-receiving unit that receives a second data set through a second communication path, the second data set being encrypted based on the encryption-specification and appended by time information on performing data encryption; and an encryption-specification selecting unit that selects an encryption specification for use in decryption of the second data set based on the time information stored in the time-information storage unit and the time information appended to the second data set.
    Type: Application
    Filed: July 23, 2007
    Publication date: February 14, 2008
    Applicant: FUJITSU LIMITED
    Inventors: Taro Togawa, Kaori Endo, Takeshi Otani, Masakiyo Tanaka, Yasuji Ota
  • Publication number: 20080037789
    Abstract: Document management that offers improved ease-of-use is realized. A document storage unit 240 stores a document file to be encrypted. A document display unit 210 displays the contents of the document file on a screen. An encryption region specifying unit 214 allows a document editor to input data that specifies the region of the encryption target data in the document file displayed on the screen. A public key storage unit 242 stores public key data that corresponds to private key data held by document checkers. A checker level setting unit 216 allows the document editor to input data that specifies the access level for the encryption target data. A key search unit 232 detects the public key data that corresponds to the private key data of the document checker thus specified. An encryption processing unit 234 encrypts the encryption target data according to the public key encryption method using the public key data thus detected.
    Type: Application
    Filed: June 21, 2005
    Publication date: February 14, 2008
    Applicant: JUSTSYSTEMS CORPORATION
    Inventor: Daisuke Motohashi
  • Publication number: 20080037790
    Abstract: Systems and methods for exchanging and processing encoded quantum signals in quantum key distribution (QKD) systems in real time. A stream of quantum signals is sent from Alice to Bob. Alice only encodes sets or “frames” of the streamed quantum signals based on receiving a “ready” message from Bob. This allows for Bob to finish processing the previous frame of data by allowing different bit buffers to fill and then be used for data processing. This approach results in gaps in between frames wherein quantum signals in the stream are sent unencoded and ignored by Bob. However, those quantum signals that are encoded for the given frame are efficiently processed, which on the whole is better than missing encoded quantum signals because Bob is not ready to receive and process them.
    Type: Application
    Filed: August 14, 2006
    Publication date: February 14, 2008
    Inventors: Audrius Berzanskis, Brandon Kwok, Harry Vig, Jonathan Young
  • Publication number: 20080037791
    Abstract: Disclosed is a method and apparatus for evaluating actions performed on a client device. For each of the performed actions, a current key is generated from a previous key and an associated action attestation value is generated from the previous key and information about each action (stored in a log file). The previous key is then deleted. A final attestation value is also generated using a publicly non-invertible function and is based at least on the current key. The client device transmits information about the performed actions (stored in a log file), the plurality of action attestation values, and the final attestation value to the server so that the server can authenticate the action attestation values and the final attestation value. If the server cannot authenticate these attestation values, then the server can determine that the log file has been tampered with.
    Type: Application
    Filed: August 6, 2007
    Publication date: February 14, 2008
    Inventor: Bjorn Jakobsson
  • Publication number: 20080037792
    Abstract: A method and system for key management and distribution are disclosed. A network can comprise plurality of stations, each station is dedicated to a network device and is configured to plug into an electrical receptacle so as to facilitate network communications via home electrical wiring for the network device. A hardware key is used to distribute keys among stations so as to enable access to the network for the dedicated network device. Each hardware key comprises a solid state memory. A key is stored in the solid state memory. The solid state memory is configured such that the key is not user modifiable. Thus, users cannot inadvertently delete or change the key.
    Type: Application
    Filed: November 14, 2006
    Publication date: February 14, 2008
    Inventors: David Becker, Chia Lun Chung
  • Publication number: 20080037793
    Abstract: A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption and decryption algorithms, authentication, and public key processing. The security module also includes separate key caches for key encryption keys and application keys. A security module can also interface a cryptographic accelerator through an application key cache. The security module can authorize a public key and an associated key server. That public key can subsequently be used to authorize additional key servers. Any of the authorized key servers can use their public keys to authorize the public keys of additional key servers. Secure authenticated communications can then transpire between the client and any of these key servers. Such a connection is created by a secure handshake process that takes place between the client and the key server.
    Type: Application
    Filed: October 16, 2007
    Publication date: February 14, 2008
    Applicant: BROADCOM CORPORATION
    Inventor: Mark Buer
  • Publication number: 20080037794
    Abstract: It is an object of the present invention to provide an acoustic system which, when producing a sound from pillow speakers, can provide a natural feeling, without bringing about any incongruity to a listener. The acoustic system is provided with a low pass filter for extracting a low frequency component of a reproduction signal outputted from a signal source and supplying the extracted signal to pillow speakers, and a high pass filter for extracting a high frequency component of the reproduction signal and supplying the extracted signal to a normal position speaker, thereby fixing a sound emitted from the pillow speakers and a sound emitted from the normal position speaker on the normal position speaker side.
    Type: Application
    Filed: April 27, 2005
    Publication date: February 14, 2008
    Applicant: PIONEER CORPORATION
    Inventors: Keitaro Sugawara, Hideyuki Yusa, Atsushi Makino, Shinichi Sato, Kensaku Yoshida
  • Publication number: 20080037795
    Abstract: A decoding method, medium, and system decoding an input compressed multi-channel signal, as a mono or stereo signal, into 2-channel binaural signals. Channel signals making up the multi-channel signals may be reconstructed from the input compressed signal in the quadrature mirror filter (QMF) domain, and head related transfer functions (HRTFs) for localizing channel signals in the frequency domain, represented as values in the time domain, may be transformed into spatial parameters in the QMF domain. Accordingly, channel signals may be localized in the QMF domain in directions corresponding to the channels, thereby decoding the input compressed signal as 2-channel binaural signals.
    Type: Application
    Filed: January 12, 2007
    Publication date: February 14, 2008
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Sangchul Ko, Junghoe Kim
  • Publication number: 20080037796
    Abstract: A method for simulating spatially extended sound sources comprising: panning a first input signal over a plurality of output channels to generate a first multi-channel directionally encoded signal; panning a second input signal over the plurality of output channels to generate a second multi-channel directionally encoded signal; combining the first and second multi-channel directionally encoded signals to generate a plurality of loudspeaker output channels; and applying a bank of decorrelation filters on the loudspeaker output channels.
    Type: Application
    Filed: August 8, 2007
    Publication date: February 14, 2008
    Applicant: CREATIVE TECHNOLOGY LTD
    Inventors: Jean-Marc JOT, Martin WALSH, Adam PHILP
  • Publication number: 20080037797
    Abstract: At least one exemplary embodiment is directed to a system for monitoring a sound pressure level dose at an ear which includes an audio transducer adapted to be placed within an ear to receive sound at the ear. The audio transducer outputs a sound signal. A sound level threshold detector receives the sound signal and determines whether a sound pressure level of the sound signal is at a minimum level and outputs a sound pressure level signal corresponding to a sound pressure level of the sound pressure level when the sound pressure level is not at the minimum level. A clock calculates a time period during which the sound pressure level is not at the minimum threshold level. A listening fatigue calculator receives the sound signal and the time period and determines whether a cumulative effect of exposure to the sound at the ear over a monitored time period will cause harm to the ear. At least a portion of the system is disposed in situ at the ear.
    Type: Application
    Filed: June 1, 2007
    Publication date: February 14, 2008
    Applicant: Personics Holdings Inc.
    Inventors: Steven Goldstein, John Usher, Brian Fligor
  • Publication number: 20080037798
    Abstract: The method comprises the steps of automatically monitoring and detecting indications indicative of a forthcoming event concerning hearing systems; if such an indication is detected, retrieving identification data identifying at least one device of the hearing system concerned, referred to as specific device, or a user of said hearing system concerned, referred to as specific user; ans using said identification data for retrieving further data related to said specific device as device data or related to said specific user as user data. The method and the corresponding system can be used for adjusting said specific hearing system or other support actions, like dispensing consumables for said specific hearing system, or preparatory actions, like launching a suitable fitting program or loading audiological data related to the user.
    Type: Application
    Filed: August 21, 2006
    Publication date: February 14, 2008
    Applicant: PHONAK AG
    Inventors: Herbert Baechler, Stefan Launer, Bernd Waldmann
  • Publication number: 20080037799
    Abstract: An apparatus and method of enabling equalization of a room parameter with a simple structure and low cost in an audio system using an acoustic transducer array. The apparatus to equalize a room parameter includes an audio signal generation unit to generate two identical audio signals, an audio signal modification unit to modify the audio signals, a sound beam generation unit to transform each of the two modified signals into a sound, to directly transmit one sound to the position of a listener, and to transmit the other sound to the position of the listener such that the other sound is reflected from a reflecting object and transmitted to the position of the listener, a sound magnitude determination unit to collect a sound generated through synthesis of the two sounds at the position of the listener, and a control unit to obtain a delay constant and a filter coefficient.
    Type: Application
    Filed: January 29, 2007
    Publication date: February 14, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Sergey Yarygin, Vladislav Shimanskiy
  • Publication number: 20080037800
    Abstract: An electronic stethoscope having several modes of operation to process acoustic signals to provide filtered signals useful for diagnosis. In one mode of operation the stethoscope substantially provides only acoustic signals generated by biological activity of the heart. In another mode of operation, the acoustic stethoscope substantially provides only acoustic signals generated by biological activity of the lungs. In another mode of operation, the electronic stethoscope disproportionately amplifies abnormal heart sounds and normal heart sounds to enhance diagnosis of heart abnormalities. The electronic stethoscope is operated in a manner similar to a conventional acoustic stethoscope and has similar spectral characteristics, thus allowing a user with acoustic stethoscope experience to easily use the electronic stethoscope.
    Type: Application
    Filed: March 2, 2007
    Publication date: February 14, 2008
    Inventors: James Grasfield, David Winston, John Purbrick, Peter Stark, Daniela Steinhubel
  • Publication number: 20080037801
    Abstract: Improved vocal signals are obtained in headsets and similar devices by including a microphone inside a chamber formed at least in part by the wearer's ear. This second microphone provides a reduced noise input signal. The reduced noise signal is corrected by input from another microphone, located outside the chamber. This correction can include echo cancellation, spectral shaping, frequency extension, and the like.
    Type: Application
    Filed: August 10, 2006
    Publication date: February 14, 2008
    Applicant: Cambridge Silicon Radio, Ltd.
    Inventors: Rogerio G. Alves, Kuan-Chieh Yen
  • Publication number: 20080037802
    Abstract: Electronic teleconferencing configurations use one or more remote microphones for added functionality. A base unit includes an interface to a telecommunications network and at least one remote microphone in wireless communication with the base unit, enabling a carrier of the microphone to speak to a listener through the base unit over the telecommunications network. The base unit may form part of a telephone, and would preferably further include a docking station to receive the remote microphone along with electrical contacts causing the telephone to enter into a speakerphone mode when the remote microphone is removed for use. A speaker may either be provided in the base unit, or may be disposed in the housing of the remote microphone, for example, in the form of a headset. With multiple wireless microphones audio processing circuitry may be added for level control or microphone/speaker discrimination.
    Type: Application
    Filed: October 16, 2007
    Publication date: February 14, 2008
    Inventors: John Posa, Barry Schwab
  • Publication number: 20080037803
    Abstract: Vehicle including an arrangement for controlling audio reception by occupants of a passenger compartment includes a frame defining an interior, at least one seat in the interior defining a plurality of seating positions, and a sound generating system for generating different audio sounds for each seating position. The sound generating system utilizes hypersonic sound, and may be an entertainment system which delivers music or other audio content to the occupants. A monitoring system determines the presence and/or position of occupants in the seating positions relative to the sound generating system. The sound generating system for each seating position may then be automatically adjustable based on the determined presence and/or position of the occupant in the seating position such that different sounds are audible to each occupant.
    Type: Application
    Filed: October 25, 2007
    Publication date: February 14, 2008
    Applicant: AUTOMOTIVE TECHNOLOGIES INTERNATIONAL, INC.
    Inventor: David Breed
  • Publication number: 20080037804
    Abstract: Neural networks provide efficient, robust and precise filtering techniques for compensating linear and non-linear distortion of an audio transducer such as a speaker, amplified broadcast antenna or perhaps a microphone. These techniques include both a method of characterizing the audio transducer to compute the inverse transfer functions and a method of implementing those inverse transfer functions for reproduction. The inverse transfer functions are preferably extracted using time domain calculations such as provided by linear and non-linear neural networks, which more accurately represent the properties of audio signals and the audio transducer than conventional frequency domain or modeling based approaches. Although the preferred approach is to compensate for both linear and non-linear distortion, the neural network filtering techniques may be applied independently.
    Type: Application
    Filed: August 1, 2006
    Publication date: February 14, 2008
    Inventor: Dmitry V. Shmunk
  • Publication number: 20080037805
    Abstract: Disclosed herein is an audio output device including: an equalizer configured to execute frequency characteristic correction processing for an audio signal from an audio source; an output part configured to supply an audio signal processed by the equalizer to a speaker for audio output from the speaker; a signal analyzer configured to analyze a frequency characteristic of an input audio signal to thereby obtain a gain of each of sample points on a frequency axis; and an arithmetic unit configured to control parameters of the equalizer, the arithmetic unit extracting sample points having substantially equal intervals on a logarithmic-scale frequency axis from sample points of which gains have been obtained by the signal analyzer, the arithmetic unit calculating parameters of the equalizer by using differences between gains of the extracted sample points and gains at frequencies corresponding to the extracted sample points on a target frequency characteristic.
    Type: Application
    Filed: April 9, 2007
    Publication date: February 14, 2008
    Applicant: SONY CORPORATION
    Inventors: Yasuyuki Kino, Tokihiko Sawashi
  • Publication number: 20080037806
    Abstract: The invention is directed at a preamplifier for a musical instrument comprising apparatus for receiving and processing a signal from a sound gathering device and for transmitting the processed signal to an external apparatus; an internal power source; a voltage receiving circuit, for receiving power from the external apparatus; and a voltage determining circuit, connected to the internal power source and the voltage receiving circuit, for determining whether the internal power source or the voltage receiving circuit should power the preamplifier by determining which is providing a higher voltage.
    Type: Application
    Filed: August 13, 2007
    Publication date: February 14, 2008
    Inventor: Leslie M. Schatten
  • Publication number: 20080037807
    Abstract: A digital audio driver having a floating PWM input and for controlling a stage of high voltage, high speed high- and low-side MOSFETs series connected at a node. The driver includes a floating input interface circuit having a protection circuit to provide secure protection sequence against over-current conditions; and high and low side circuits for driving the high- and low-side MOSFETs, each high and low side circuit including a bi-directional current sensing circuit which requires no external shunt resistors that enables capture of over-current conditions at either positive or negative load current direction. The RDS(ON) of the high- and low-side MOSFETs is used as current sensing resistors, once the RDS(ON) exceeds a pre-determined threshold, an over current output signal is fed to the protection block to shutdown the MOSFET to protect the devices.
    Type: Application
    Filed: July 25, 2007
    Publication date: February 14, 2008
    Inventor: Jun Honda
  • Publication number: 20080037808
    Abstract: An ultrasonic transducer in which lead wire connection is facilitated even when piezoelectric devices are divided in order to prevent lateral vibrations from affecting longitudinal vibrations is manufactured by a method comprising: a step in which first dicing grooves are formed on an acoustic matching layer and a piezoelectric device plate that are mounted together in order to form a plurality of piezoelectric devices; a step in which a board and the respective piezoelectric devices are connected together; a step in which surfaces in the vicinity of locations at which the board and the piezoelectric devices are connected together are coated with a conductive sheet; and a step in which the plurality of transducer elements are formed by forming second dicing grooves between the first dicing grooves formed on the piezoelectric devices and the board that is coated with the conductive sheet and on the acoustic matching layer.
    Type: Application
    Filed: October 4, 2005
    Publication date: February 14, 2008
    Inventors: Yukihiko Sawada, Akiko Mizunuma, Katsuhiro Wakabayashi, Takuya Imahashi, Sunao Sato