Patents Issued in April 29, 2008
-
Patent number: 7366887Abstract: A method for booting into computer memory a non-operating system (O.S.) program from a hard disk drive (HDD) prior to booting into memory an O.S. from the HDD. The method includes establishing a table of contents (TOC) on the HDD that contains entries for special O.S. programs. A pointer to the TOC is placed in non-volatile memory of the computer that is associated with the HDD, and when BIOS of the computer is prompted to load into memory one of the special O.S. programs, the pointer is accessed and used to locate the TOC, which in turn is accessed to load the special O.S. program.Type: GrantFiled: July 11, 2005Date of Patent: April 29, 2008Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Rod David Waltermann, Nathan J. Peterson, Joseph Wayne Freeman, Randall Scott Springfield, Mark Charles Davis, Steven Dale Goodman, Isaac Karpel, Scott Edwards Kelso
-
Patent number: 7366888Abstract: A system, computer program product and method for booting to a partition in a non-volatile storage unit without a local operator. In one embodiment, one or more bits in a BOOT register may be set by an operating system indicating if the BIOS should boot to the partition. The BIOS may then read the BOOT register to determine if the BIOS is to boot to the partition as well as any activities to perform if the BIOS is to boot to the partition. In another embodiment, a network interface card may insert directive information received from a packet in a register within the network interface card. The BIOS may then read the register within the network interface card to determine if the BIOS is to boot to the partition as well as any activities to perform if the BIOS is to boot to the partition.Type: GrantFiled: June 7, 2001Date of Patent: April 29, 2008Assignee: Lenovo Singapore Pte. LtdInventors: Richard Alan Dayan, Joseph Wayne Freeman, William Fred Keown, Jr., Randall Scott Springfield
-
Patent number: 7366889Abstract: Apparatus and a method for booting each of a plurality of computer processor nodes in a cluster system to run the same cluster operating system.Type: GrantFiled: August 27, 2004Date of Patent: April 29, 2008Assignee: Sun Microsystems, Inc.Inventor: Edmund J. Kelly
-
Patent number: 7366890Abstract: Provided are a method, system, deployment and article of manufacture, wherein in one embodiment, a mode of operation may be switched to a service mode by detecting a device inserted into a connector of an input/output port of a system. In the illustrated embodiment, the device has a connector and a wire which loops a code received from the input/output port back to the input/output port. Upon detecting receipt of the transmitted code, the mode of operation may be switched to a service mode. Other embodiments are described and claimed.Type: GrantFiled: November 16, 2004Date of Patent: April 29, 2008Assignee: International Business Machines CorporationInventors: Stephen LaRoux Blinick, Paul Matthew Richards
-
Patent number: 7366891Abstract: Methods and apparatus to provide dual-mode drivers in a processor system are disclosed. An example method disclosed herein comprises including operating system (OS) agnostic mode services that are available during an OS agnostic mode to allow a single set of drivers to be used during boot mode and the OS agnostic mode. The example method further comprises including a dual-mode library that is capable of determining the current operating mode of the processor system and binding the drivers to available services accordingly.Type: GrantFiled: December 30, 2004Date of Patent: April 29, 2008Assignee: Intel CorporationInventors: Rahul Khanna, Mallik Bulusu, Vincent Zimmer, Michael A. Rothman
-
Patent number: 7366892Abstract: A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle. The security measures relied on by the security controller can be based on digital certificates that grant rights to certificate holders, e.g., application developers. In the case in which applications are to be used with vehicle resources, procedures are implemented to make sure that certified applications do not jeopardize vehicle resource'0 security and vehicle users' safety. Relationships among interested entities are established to promote and support secure vehicle resource access and usage. The entities can include vehicle makers, communication service providers, communication apparatus vendors, vehicle subsystem suppliers, application developers, as well as vehicle owners/users.Type: GrantFiled: January 28, 2004Date of Patent: April 29, 2008Assignee: Cellport Systems, Inc.Inventors: Charles W. Spaur, Patrick J. Kennedy, Michael F. Braitberg, Axel Fuchs, Nate Klingenstein, Lane Lee
-
Patent number: 7366893Abstract: A method and apparatus to initializing a network device is described. In one embodiment, the present invention includes the step of: retrieving an initial communications address from a local memory of the network device; transmitting a secure identifier to the initial communications address verifying the authenticity of the secure identifier; retrieving a configuration record from a configuration record repository, the retrieved configuration record being associated with the network device that corresponds to the secure identifier; receiving the configuration record at the network device; and installing the configuration record at the network device.Type: GrantFiled: August 7, 2002Date of Patent: April 29, 2008Assignee: Intelliden, Inc.Inventors: Glen D. Tindal, Jeffery A. Schenk
-
Patent number: 7366894Abstract: A request is received for secure network traffic from a device having a private network address at a source node. The private network address of a requested destination device is obtained at a destination node from a route server based on signaling information associated with the request. The public network address of the destination node associated with the private network address is obtained. In response to the request, a virtual circuit is created between the source node and the destination node based on the public network address of the destination node. Network traffic is encrypted for transport at least from the source node to the destination node through the virtual circuit. Creating the virtual circuit dynamically in response to the request functions like a fully meshed network but requires less provisioning and maintenance. The process is readily scalable, as with a hub and spoke network but with less delay.Type: GrantFiled: November 27, 2002Date of Patent: April 29, 2008Assignee: Cisco Technology, Inc.Inventors: Ramesh Kalimuthu, Yogesh Kalley, Michael L. Sullenberger, Jan Vilhuber
-
Patent number: 7366895Abstract: A method for permitting encrypted communications between two stations which are operable with encryption algorithms that accept encryption keys having work factors with different values, by: in a first determining step, determining the lower one of the different values; providing an initial encryption key having a first work factor value; comparing the first work factor value with the lower one of the work factors determined in the determining step; when, in the comparing step, the first work factor value is greater than the lower one of the work factor values determined in the determining step, performing the following steps: performing a first hash function on the initial encryption key to produce a first output, and deriving from the first output a first intermediate key having a work factor value not greater than the lower one of the different work factor values determined in the determining step; performing the first hash function on the first intermediate key to produce a second output, and deriving froType: GrantFiled: January 21, 2004Date of Patent: April 29, 2008Assignee: QUALCOMM IncorporatedInventor: Gregory G. Rose
-
Patent number: 7366896Abstract: Systems, methods and data structures are described for attaching a digital signature to a web page and authenticating the digital signature before allowing the web page to invoke a software control on a computer that has downloaded the web page. Unauthorized users cannot gain access to a control on a computer through a web page that is downloaded to the computer, if the source of the web page or application cannot be authenticated or is not a trusted source.Type: GrantFiled: August 29, 2000Date of Patent: April 29, 2008Assignee: Microsoft CorporationInventors: Rico Mariani, David M. Broman, Sanjeev K. Rajan, Kristi L. Cooper
-
Patent number: 7366897Abstract: A method and apparatus for communication via a computer network (102) including registering a plurality of users (206, 222, 224) with a trusted body (110, 210). The trusted body (110, 210) verifies the identity of each user (206, 222, 224) and generates a random identifier (216) for each user (206, 222, 224). A plurality of users (206, 222, 224) can enter into a dialogue with the other users by means of messages sent over the computer network (102) via the trusted body (110, 210). A user (206, 222, 224) remains anonymous through use of its random identifier (216) until such time as the user (206, 222, 224) reveals its true identity. Due to the registration of the users (206, 222, 224) with the trusted body (110, 210) a means of non-repudiation of the dialogue by the users (206, 222, 224) is provided.Type: GrantFiled: February 28, 2002Date of Patent: April 29, 2008Assignee: International Business Machines CorporationInventor: Gary Paul Noble
-
Patent number: 7366898Abstract: A method and apparatus are provided for passing configuration information over a network. In one embodiment, the configuration information is passed between a DHCP server and a DHCP client and includes parameters not formally defined within DHCP. The parameters are therefore encoded into a vendor-specific portion of a DHCP message using at least one triplet comprising a code field, a length field, and a value field. The value field comprises a set of one or more name-value pairs. The code field includes an indication of encryption of the value field. In another embodiment, a fixed-function appliance device is attached to a network, and is booted using boot code and a configuration stored locally to the device. The device then downloads a network configuration, which is compared to the locally stored configuration. If the network configuration is different from the locally stored configuration, the network configuration is stored locally to the device.Type: GrantFiled: October 6, 2003Date of Patent: April 29, 2008Assignee: Sun Microsystems, Inc.Inventors: Steven Evans, James E. King, Martin Mayhead, Karen Roles
-
Patent number: 7366899Abstract: An architecture of multilayered DRM protection structure for multimedia service and the method of forming the same are provided. The architecture comprises a multilayered DRM encryption structure and a DRM decryption structure. The inputted multimedia service is decomposed and encrypted into an encrypted multimedia service stream through a multimedia service decomposer and a multimedia DRM organizer. The encrypted stream is decrypted by a DRM composer from top layer to bottom layer. A full or partial multimedia service is then presented. For a multimedia service application, this enhances the DRM protection by increasing the complexity of multimedia encryption for a multimedia service application. It also provides the variety for the multimedia service application via different compositions of multimedia objects. The DRM protection structure is embedded into each layer of multimedia services and objects and can be set up different levels of DRM protection.Type: GrantFiled: May 4, 2004Date of Patent: April 29, 2008Assignee: Industrial Technology Research InstituteInventors: Cheng-Peng Kuan, Yu-Jen Lin, Wen-Hao Chung, Yun-Ei Wu
-
Patent number: 7366900Abstract: A method, system and computer program product are disclosed for enhancing the security of a message sent through a network server from a client computer to a destination server running any computer platform. Credentials for authorizing a principal are obtained by the client computer from a validation center. The principal-authentication information is transmitted to the network server. The network server may use the principal-authenticating information to obtain permission data from the validation center for use in accessing the destination server. Also described is a method of providing a remote interactive login connection using the same method.Type: GrantFiled: January 12, 2001Date of Patent: April 29, 2008Assignee: Verizon Laboratories, Inc.Inventor: W. David Shambroom
-
Patent number: 7366901Abstract: A device, method, system and computer readable medium allows for using a short-range address, such as a Bluetoothâ„¢ address, to identify a cellular device and authenticate cellular messages to the cellular device. In an embodiment of the present invention, a first short-range radio address for a cellular device is stored in a processing device, such as a server coupled to a cellular network. An authentication message is obtained by the processing device. A second short-range radio address is stored in the cellular device. A first message digest is calculated responsive to the authentication message and first short-range radio address. A cellular message, including the authentication message and the first message digest, is transmitted to the cellular device. The cellular device receives the cellular message and calculates a second message digest responsive to the authentication message and the second short-range radio address stored in the cellular device.Type: GrantFiled: August 1, 2003Date of Patent: April 29, 2008Assignee: IXI Mobile (R&D), Ltd.Inventors: Ziv Hapamas, Amit Shachak
-
Patent number: 7366902Abstract: A method and system authenticates a storage device or storage router for use with driver software. The driver software may be permitted to be used with particular storage devices including storage routers and may be prohibited from being used with other storage devices or routers. In some cases, this may allow a vendor to restrict the use of its driver software, or at least certain functionality, to use with the vendor's storage devices or storage routers. A proof of purchase request is sent by a client device to a server over an IP network to authenticate the storage device or router (e.g., a server). The request may include a random number and one or more identifiers. The identifiers may include a server identifier, a software driver identifier and/or a client device identifier. The driver software may permit storage related communications with the server when a hash received from the server matches a hash internally generated by the software driver.Type: GrantFiled: April 17, 2007Date of Patent: April 29, 2008Assignee: Cisco Technology, Inc.Inventor: Mark A. Bakke
-
Patent number: 7366903Abstract: A card activated cash dispensing automated banking machine (12, 200, 302) is provided. The machine may be operative to install a terminal master key (TK) therein in response to at least one input from a single operator. The machine may include an EPP (204) that is operative to remotely receive an encrypted terminal master key from a host system (210, 304). The machine may authenticate and decrypt the terminal master key prior to accepting the terminal master key. The machine may further output through a display device (30) of the machine a one-way hash of at least one public key associated with the host system. The machine may continue with the installation of the terminal master key in response to an operator confirming that the one-way hash of the public key corresponds to a value independently known by the operator to correspond to the host system.Type: GrantFiled: December 26, 2006Date of Patent: April 29, 2008Assignee: Diebold, IncorporatedInventors: Timothy Zajkowski, Anne Doland, Mark D. Smith
-
Patent number: 7366904Abstract: The present invention provides a method for modifying validity of a certificate in a public key infrastructure (PKI)-based authentication system, which is capable of performing online suspension, recovery and revocation of a certificate between a user system and a certificate authority by executing user authentication with guaranteed reliability using user biometric information. Accordingly, there is no need for the user to personally visit a registration authority or certificate authority to modify the certificate validity. The user can easily modify the certificate validity using his/her user system connected online to the certificate authority.Type: GrantFiled: February 26, 2002Date of Patent: April 29, 2008Assignee: Electronics and Telecomunications Research InstituteInventors: Jong-Hyuk Roh, Taesung Kim, Hee Sun Kim, Dae Seon Choi, Young Seob Cho, Sang Rae Cho, Seung Hun Jin
-
Patent number: 7366905Abstract: A method and system to allow user generation of a private-public key pair and an associated user generated certificate to establish the identity of a user based upon signing the user generated certificate with a private key of a private-public key pair associated with a certificate issued by a Certification Authority (CA). The user generated certificate thereby allows the user that generated the certificate to establish a secure session with a third party without multiple use of the certificate issued by the CA, typically for use on another network infrastructure. The method and system are particularly useful for establishing a secure session, such as a Secure Socket Layer session using a personal computer, where the CA certificate is associated with a wireless identity module of a wireless device.Type: GrantFiled: February 28, 2002Date of Patent: April 29, 2008Assignee: Nokia CorporationInventor: Lauri Paatero
-
Patent number: 7366906Abstract: A digital certificate management apparatus updates a proof key used for proving validity of a digital certificate used for authentication for establishing communication between a client and a server. The apparatus acquires a new proof key for updating, acquires a new digital certificate used for the authentication for which validity can be proved with the use of said new proof key, transmits the new proof key to the client and transmits a new server certificate which is a new digital certificate for the server to the server. The apparatus transmits the new server certificate to the server after receiving, from the client, information indicating that the client has received the new proof key.Type: GrantFiled: March 19, 2004Date of Patent: April 29, 2008Assignee: Ricoh Company, Ltd.Inventor: Tomoaki Enokida
-
Patent number: 7366907Abstract: An information processing device and method as well as a program storage medium, in which to determine whether or not contents can be recorded on a recording medium, the presence or absence of digital watermark information distributed associated with the contents is detected, and if the digital watermark information is present, the survival rate of the digital watermark information is detected, and it is determined whether or not the contents can be recorded on the recording medium on the basis of the presence or absence of the digital watermark information and the survival rate of the digital watermark information. In this way, it is possible to prevent effectively an infringement of the copyright on the contents that have been distributed via a network to a great number of terminal units.Type: GrantFiled: October 27, 2000Date of Patent: April 29, 2008Assignee: Sony CorporationInventor: Tadashi Ezaki
-
Patent number: 7366908Abstract: A digital watermark detection method exploits autocorrelation properties of the watermarked signal that enable synchronization of the digital watermark despite temporal or geometric distortion of the host signal. Other watermark methods employ keys, including a key dependent on the content in which the watermark is embedded and another key that is not dependent on the content.Type: GrantFiled: April 30, 2001Date of Patent: April 29, 2008Assignee: Digimarc CorporationInventor: Ahmed Tewfik
-
Patent number: 7366909Abstract: A dynamic wavelet feature-based watermark for use with digital video. Scene change detection separates digital data into one or more scenes, wherein each of the scenes is comprised of one or more frames. A temporal wavelet transformation decomposes the frames of each scene into dynamic frames and static frames. The static frames of each scene are subjected to a spatial wavelet transformation, so that the watermark can be cast into middle frequency sub-bands resulting therefrom. Polyphase-based feature selection or local block-based feature selection is used to select one or more features. The watermark is cast into the selected features by means of either (1) a comparison of energy in polyphase transform components of the selected feature, or (2) a change in value of blocked wavelet coefficients of the selected feature.Type: GrantFiled: April 21, 2003Date of Patent: April 29, 2008Assignee: The Boeing CompanyInventors: Wengsheng Zhou, Phoom Sagetong
-
Patent number: 7366910Abstract: A computer-based method for scanning data using string filtering includes compressing a data string using a hashing algorithm to obtain a data-string signature, and then determining that the data-string signature matches a known data-string signatures stored in a lookup table if the signature is determined to have a match in the lookup table.Type: GrantFiled: July 15, 2002Date of Patent: April 29, 2008Assignee: The Boeing CompanyInventor: Brian D. Hanner
-
Patent number: 7366911Abstract: Methods and apparatus are disclosed for generation of secure and efficient digital signatures in an information processing system. The system includes one or more user devices, a signing aid or other intermediary device, and a verifier. A given user device has associated therewith key pairs (s, p) and (s?, p?) corresponding to respective first and second digital signature protocols. As part of a setup process, an agreement relating to the public keys p and p? is signed by both the user device and the intermediary device, and the resulting twice-signed agreement is stored by both the user device and the intermediary device. A first digital signature s1 is then generated on a message m or a hash h(m) thereof in the user device using the secret key s? and is sent to the verifier. The verifier in turn sends s1 to the intermediary, and the intermediary checks that s1 is a valid digital signature for the user device.Type: GrantFiled: December 11, 2001Date of Patent: April 29, 2008Assignee: Lucent Technologies Inc.Inventors: Juan A. Garay, Bjorn Markus Jakobsson
-
Patent number: 7366912Abstract: A method and computer product are disclosed that permit the creation of secure invitations containing no sensitive information. The invitations contain encrypted tokens that are received by authorized invitees, thereby providing secure access to a communications session that may involve the exchange of sensitive information. Invitations contain only pointers to information about invitees and the communications session, so that all sensitive information may be retained in a master database on the host server rather than being communicated to the invitee in the invitation. Secure communication sessions may thus be conducted by sending invitations with encrypted tokens to eligible participants without the risk of the information in the tokens being decrypted and used by unauthorized parties to gain access to the secure session, because the tokens contain no information about the invitee or the session.Type: GrantFiled: February 27, 2004Date of Patent: April 29, 2008Assignee: Net Endeavor, Inc.Inventor: Rod D. Sturgis
-
Patent number: 7366913Abstract: A wireless electronic authentication device with an authenticating smart chip, a local radio communication circuit, an input circuit that receives user input, and a power supply, all housed in a portable housing. Preferably, the authentication device is a mobile telephone with an authenticating smart chip. The user enters a knowledge token, such as a password stated by voice or a personal identification number input at the keyboard, to indicate that he is both in possession of the authorization device and knows the critical information. The knowledge token may be entered in advance and merely confirmed by the user pressing a key on the keypad when a confirmation is requested. A method is provided for making use of the authentication device to perform authorizations. A similar method is disclosed for use in existing systems and then achieving a gradual transition from existing systems to the new authentication device.Type: GrantFiled: September 4, 2002Date of Patent: April 29, 2008Inventor: Jeffrey T. Haley
-
Patent number: 7366914Abstract: In one embodiment, the present invention may perform a transformation based on existing program operations or operators which may provide encrypting compiler-generated code for compilation with original source code, securing distributable content in hostile environments. As an example, use of compiler analysis and heuristics for pairing variables and identifying encryption/decryption points may protect distributable software, such as the compiled code from automated attacks. In one embodiment, pre-compiler software may dynamically obtain one or more program operators from the source code for applying data transformation based on custom ciphers to encrypt/decrypt data in between references to data variables in a particular portion of the source code, providing encrypting compiler-generated code for mixing with the source code prior to compilation into tamper-resistant object code.Type: GrantFiled: August 29, 2003Date of Patent: April 29, 2008Assignee: Intel CorporationInventor: Gary L. Graunke
-
Patent number: 7366915Abstract: A digital license corresponds to encrypted digital content and includes a content key for decrypting same. The content key is encrypted and is decryptable by a decryption key available only to the first persona, the license thereby being tied to the first persona. The license is a first license and further includes referral information specifying a first location at which a second persona may obtain a second license for the content tied thereto. The second persona requests to render the content by way of the first license and the request is denied because the first license is not tied to the second persona. The referral information is obtained from the first license and employed to initiate contact with the specified first location and obtain the second license tied to the second persona.Type: GrantFiled: April 30, 2002Date of Patent: April 29, 2008Assignee: Microsoft CorporationInventors: Attila Narin, Peter David Waxman, Christopher Robert Richard Madonna, Marco A. DeMello, Chandramouli Venkatesh
-
Patent number: 7366916Abstract: A method and keyboard for protecting data generated by the keyboard by reading data from a keypad of the keyboard, encrypting the read data, and transmitting the encrypted data from the keyboard to a computer. A method for protecting by the computer data generated by a keyboard where the keyboard is connected to the computer by receiving encrypted data from the keyboard by the computer, and decrypting the encrypted data. A method for protecting by a server the data generated by a keyboard where the keyboard is connected to the server via a network and a computer by receiving encrypted data from the keyboard by the server, and decrypting the encrypted data.Type: GrantFiled: September 20, 2003Date of Patent: April 29, 2008Assignee: Avaya Technology Corp.Inventors: Christopher Reon Gentle, Julian James Orbach
-
Patent number: 7366917Abstract: A method for accessing discrete data includes transmitting a write command to a memory, determining whether each data following a header of the file needs to be encrypted according to a data format of a file that is to be written into the memory, transmitting the file header and each data following the file header to a logic unit, turning on the logic unit for encrypting the data determined to be encrypted and writing the encrypted data into the memory, turning off the logic unit for writing the data determined not to be encrypted into the memory directly, and sending a first response signal from the memory when the writing of the file is finished.Type: GrantFiled: September 17, 2004Date of Patent: April 29, 2008Assignee: Faraday Technology Corp.Inventor: Yung-Cheng Shih
-
Patent number: 7366918Abstract: The systems and methods provide for configuring and managing resources on a multi-purpose IC card. In one aspect, a user interface (UI) for an application is presented on a display device. A user is enabled via at least one graphical dialog screen of the UI to configure a communicatively coupled IC card. Management of one or more resources on the IC card is facilitated via at least one graphical dialog screen of the UI.Type: GrantFiled: May 14, 2004Date of Patent: April 29, 2008Assignee: Microsoft CorporationInventors: Doug Barlow, Blair Dillaway, Barbara Fox, Terry Lipscomb, Terrence Spies
-
Patent number: 7366919Abstract: Computer implemented methods, apparati, and computer-readable media for detecting suspected spam in e-mail (24) originating from a sending computer (21). A method embodiment comprises the steps of determining (11) the actual IP address (23) of the sending computer (21); converting (12) the actual IP address (23) into geo-location data; and, using the geo-location data, ascertaining (13) whether the e-mail (24) contains suspected spam.Type: GrantFiled: April 25, 2003Date of Patent: April 29, 2008Assignee: Symantec CorporationInventors: William E Sobel, Bruce McCorkendale
-
Patent number: 7366920Abstract: A memory module includes a memory hub that monitors utilization of the memory module and directs devices of the memory module to a reduced power state when the module is not being used at a desired level. System utilization of the memory module is monitored by tracking system usage, manifested by read and write commands issued to the memory module, or by measuring temperature changes indicating a level of device activity beyond normal refresh activity. Alternatively, measured activity levels can be transmitted over a system bus to a centralized power management controller which, responsive to the activity level packets transmitted by remote memory modules, direct devices of those remote memory modules to a reduced power state. The centralized power management controller could be disposed on a master memory module or in a memory or system controller.Type: GrantFiled: June 20, 2003Date of Patent: April 29, 2008Assignee: Micron Technology, Inc.Inventors: Joseph M. Jeddeloh, Terry Lee
-
Patent number: 7366921Abstract: Input/output (I/O) devices may be controlled to reduce power consumption of a computer system. A power consumption metric for the I/O devices connected to the computer system is determined. At least one of the I/O devices is selected based on the determined power consumption metric, and power consumption for the selected I/O device is reduced.Type: GrantFiled: April 23, 2004Date of Patent: April 29, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventor: Parthasarathy Ranganathan
-
Patent number: 7366922Abstract: When an alternating-current power is supplied to an ATX power supply, sub power is supplied to a PC board from the ATX power supply. When the sub power is supplied to the PC board, a PWOK signal is output to the ATX power supply by processing performed by a CPU according to BIOS, and main power is supplied to the PC board from the ATX power supply. Accordingly, the supply of the main power to the PC board and the starting processing of a gaming processing program are performed automatically, without any need for the conventional manual operation of a power supply switch, so that no effort is required for the starting of a slot machine.Type: GrantFiled: December 6, 2004Date of Patent: April 29, 2008Assignee: Aruze Corp.Inventors: Kengo Takeda, Hideaki Kishi
-
Patent number: 7366923Abstract: A portable information handling system (IHS) is provided. The portable IHS includes a processor and a memory device coupled to the processor. The memory device is for storing instructions processable by the processor for determining whether a lid of the portable IHS is closed. Also, the instructions are processable by the processor for, in response to determining that the lid of the portable IHS is closed, determining whether the portable IHS is operating within a substantially sealed case. Moreover, the instructions are processable by the processor for, in response to determining that the portable IHS is operating within a substantially sealed case, reducing the portable IHS power consumption.Type: GrantFiled: April 8, 2005Date of Patent: April 29, 2008Assignee: Dell Products L.P.Inventors: Craig Chaiken, Adolfo S. Montero
-
Patent number: 7366924Abstract: A power adapter comprises a power supply to output power for powering a powered device when the powered device is coupled to the power adapter. The power adapter further comprises a disable throttle indicator that, when the powered device is coupled to the power adapter, indicates to the powered device that the powered device need not reduce an amount of power used by the powered device in order to keep the power adapter within regulation.Type: GrantFiled: April 25, 2005Date of Patent: April 29, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Paul M. Hupman, Michael D. Batchelor
-
Patent number: 7366925Abstract: An apparatus, carrying case and computer system are disclosed herein. In the apparatus, a housing to which an electrical device may be electrically coupled is provided. A secondary battery may be electrically coupled to the housing and adapted to power the electrical device or to charge the device's internal battery.Type: GrantFiled: June 9, 2005Date of Patent: April 29, 2008Assignee: Microsoft CorporationInventors: Leroy B. Keely, Seiya Ohta, Michael George Lenahan
-
Patent number: 7366926Abstract: Integrated circuit chips with on-chip supply regulators with programmability and initialization. In one embodiment, an integrated circuit, includes: an initialization circuit to assert an initialization signal during powering up of the integrated circuit; a control circuit coupled to the initialization circuit; and a power supply regulator coupled to the control circuit, the power supply regulator to provide a first voltage to the control circuit when the initialization signal is asserted, the power supply regulator to provide a second voltage to the control circuit according to a control signal from the control circuit when the initialization signal is not asserted. In one embodiment, the integrated circuit includes a digital television demodulator.Type: GrantFiled: June 13, 2006Date of Patent: April 29, 2008Assignee: Montage Technology Group LimitedInventors: Xiaomin Si, Howard Yang, Stephen Tai
-
Patent number: 7366927Abstract: The present invention provides a device for handling requests for changing system mode. The device includes a signal hold/clear unit and a gate control unit. The signal hold/clear unit has the first input receiving a request signal, the second input receiving a control signal, and an output holding the request signal. Wherein, the signal hold/clear unit clears the request signal being held while the control signal is active. The gate control unit has the first input connected to the first input of the signal hold/clear unit, the second input connected to the output of the signal hold/clear unit, the third input connected to the second input of the signal hold/clear unit, and an output. Wherein, the gate control unit passes the request signal while the control signal is active, otherwise blocks the request signal.Type: GrantFiled: June 11, 2003Date of Patent: April 29, 2008Assignee: VIA Technologies, Inc.Inventors: Chen-Ping Yang, Sheng-Chang Peng, Juei-Sheng Sheu
-
Patent number: 7366928Abstract: A voltage regulator module (VRM) and a voltage regulating system for a CPU. The VRM supplies a supply core voltage corresponding to a VID signal output from the CPU. A core voltage generator generates the core voltage and a voltage regulation control unit controls the core voltage based on a spec signal which decides a percent voltage regulation of the core voltage, the core voltage having the percent voltage regulation corresponding to the spec signal, which is output by the CPU. The VRM and the voltage regulating system according to the present invention supply a stable core voltage that the CPU requires, regardless of a class of the CPU, by receiving information on the voltage the CPU requires from the CPU.Type: GrantFiled: June 14, 2004Date of Patent: April 29, 2008Assignee: Samsung Electronics Co., Ltd.Inventor: Seong-geun Park
-
Patent number: 7366929Abstract: Methods and apparatus for selecting one of a plurality of N-bit digital values stored in a table, via a parallel interface having a bus width less than N is provided. The plurality of N-bit digital values stored in the table may be loaded via a serial interface.Type: GrantFiled: July 25, 2005Date of Patent: April 29, 2008Assignee: NVIDIA CorporationInventor: Ludger Mimberg
-
Patent number: 7366930Abstract: According to some embodiments, an Ethernet link speed is determined based on a power-related configuration, and an Ethernet link is negotiated at the link speed. Embodiments may also include determination of whether a power-conserving protocol is enabled, and/or may be implemented by an Ethernet controller.Type: GrantFiled: December 17, 2002Date of Patent: April 29, 2008Assignee: Intel CorporationInventors: Michael Gutman, Avi Costo, Yaniv Hadar
-
Patent number: 7366931Abstract: Embodiments described herein provide a power saving state for a memory system. For example, a memory system may derive clocking information from a training pattern sent over a memory channel. A memory may comprise a link to receive training frames, and circuitry to derive a clock from the training frames, and place the memory module in a low power state between training frames. Embodiments as described herein may utilize periodic training frames to implement a power saving state on the channel or the memory system, either in whole or in part.Type: GrantFiled: December 30, 2004Date of Patent: April 29, 2008Assignee: Intel CorporationInventor: Pete D. Vogt
-
Patent number: 7366932Abstract: A coprocessor executing one among a set of candidate kernel loops within an application operates at the minimal clock frequency satisfying schedule constraints imposed by the compiler and data bandwidth constraints. The optimal clock frequency is statically determined by the compiler and enforced at runtime by software-controlled clock circuitry. Power dissipation savings and optimal resource usage are therefore achieved by the adaptation at runtime of the coprocessor clock rate for each of the various kernel loop implementations.Type: GrantFiled: October 30, 2002Date of Patent: April 29, 2008Assignee: STMicroelectronics, Inc.Inventors: Davide Rizzo, Osvaldo Colavin
-
Patent number: 7366933Abstract: A computer program product residing on a computer-readable medium includes computer-readable instructions for causing a computer to obtain power event data associated with at least one uninterruptible power supply, the power event data including indicia of power events and occurrence times of the corresponding power events, aggregate the power event data in accordance with the occurrence times of the power events, and graphically display the aggregated power event data on a display such that indications of power events that occur close in time are graphically displayed in association with each other.Type: GrantFiled: July 9, 2004Date of Patent: April 29, 2008Assignee: American Power Conversion CorporationInventors: David M. Aharonian, Matthew D. Sojka, Edward M. Ives
-
Patent number: 7366934Abstract: A method for remote control of devices. A remote control device receives a graphical user interface from a controlled device. The graphical user interface is periodically updated with controlled device data. The controlled device data is interrupted by command data from the remote control device. The controlled device responds to the command data and updates the graphical user interface.Type: GrantFiled: September 8, 2004Date of Patent: April 29, 2008Assignee: Stryker CorporationInventors: Anand Narayan, Salmaan Hameed, Kiran A. Javadekar
-
Patent number: 7366935Abstract: In a networked system in which high speed busses interconnect sources and destinations of data, systems for and methods of data alignment, data re-timing, and circular buffer underflow/overflow detection, are described.Type: GrantFiled: April 1, 2003Date of Patent: April 29, 2008Assignee: Extreme Networks, Inc.Inventors: Erik R. Swenson, Sid Khattar
-
Patent number: 7366936Abstract: Modulated clocks S-clk from a spread spectrum clock generator are supplied as operating clocks to an SDRAM when no control signals (ras#, cas#, cs# and we#) are output and no data is written to the SDRAM, that is before time t1, between time t3 and t4, and period after time t9. Reference clocks clk (fixed frequency clock) are supplied to the SDRAM as the operating clock when control signals are output and data is written to the SDRAM, that is during period between time t1 and t3 and between time t4 to t9. This makes it possible to reduce electromagnetic interference generated by clock signals supplied to the SDRAM while also enabling accurate control of the SDRAM.Type: GrantFiled: September 2, 2004Date of Patent: April 29, 2008Assignee: Brother Kogyo Kabushiki KaishaInventor: Hajime Usami