Patents Issued in October 2, 2008
  • Publication number: 20080240392
    Abstract: A method and system are provided in which teleconference calls are scheduled in advance and, at an appropriate predetermined time, calls are automatically made to the designated participants of the conference calls thereby avoiding the need for the participants to call into a teleconference center. In a preferred embodiment, when teconferences are scheduled, the telecon participants are designated and their phone numbers are input or otherwise determined, for example, through access to a centralized database. A calendar is monitored and at a predetermined time relative to the scheduled start of the telecon, a server system application initiates the calling of the participants for connection to the telecon. The system may be configured to require participants to enter a password before the connection is completed. The status of the called participants is determined and displayed on individual display devices of the other participants in the telecon.
    Type: Application
    Filed: June 9, 2008
    Publication date: October 2, 2008
    Inventors: Viktors Berstis, Randolph Michael Forlenza
  • Publication number: 20080240393
    Abstract: A discussion unit (6) for use in a conference system (8) is disclosed, which is adapted to be connected to at least one second discussion unit (6) of the conference system (8). The discussion unit (6) is switchable between at least two operating modes. The discussion unit (6) further comprises at least one exchangeable control (420) out of a set of controls comprising at least one control for each of the operating modes, wherein the at least one exchangeable control (420) is adapted to indicate to a user the operating mode currently used and to allow for the user to control the discussion unit (6).
    Type: Application
    Filed: September 9, 2005
    Publication date: October 2, 2008
    Inventors: Ruud De Wit, Marc Van Loon
  • Publication number: 20080240394
    Abstract: An apparatus includes a base unit and cordless handsets configured to establish a call with a communication apparatus, and a storage unit configured to store information corresponding to the communication apparatus indicating whether a multi-party call among the communication apparatus and at least two of the base unit and the cordless handsets is permitted. Also, a processing unit is configured to determine whether to enable a multi-party call among one communication apparatus, and at least two of the base unit and the cordless handsets based on the information. A method for use with the apparatus can include, in response to receiving a call from one communication apparatus, determining whether to enable a multi-party call to be established among the one communication apparatus and at least two of the base unit and the cordless handsets based on the information.
    Type: Application
    Filed: March 21, 2008
    Publication date: October 2, 2008
    Applicant: BROTHER KOGYO KABUSHIKI KAISHA
    Inventors: Hideaki Takahashi, Suzuyo Murai
  • Publication number: 20080240395
    Abstract: A speech recognition process and system are used for interactive telecommunication. A caller is prompted for input. Each of the phrases represents a destination for routing the call. The response utterance is matched by the system to one of the phrases and the call is routed to the corresponding destination. If the call thereafter has been redirected to a destination representing another of the phrases, speech recognition training data are generated for mapping the utterance to the redirected destination.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: Verizon Data Services, Inc.
    Inventor: Parind Poi
  • Publication number: 20080240396
    Abstract: A method of semi-supervised synonym inference for a call handling application, such as automated directory assistance or call routing, is described. In one embodiment the method comprises examining a database of caller interaction results from a directory assistance system that includes an automated directory assistance engine, detecting a specified characteristic in the caller interaction results, and using the detected characteristic to automatically train a destination map, where the destination map is for use by the automated directory assistance engine in automatically mapping human speech to a destination. The detecting of the specified characteristic in the caller interaction results may include a statistical analysis of the caller interaction results for each of one or more speech recognition strings.
    Type: Application
    Filed: May 4, 2007
    Publication date: October 2, 2008
    Applicant: Nuance Communications, Inc.
    Inventors: Avraham Faizakov, S. Douglas Peters, Peter R. Stubley
  • Publication number: 20080240397
    Abstract: A method, apparatus and system of white page and yellow page directories in a geo-spatial environment are disclosed. In one embodiment, a method includes geo-coding an address data associated with a listing of a directory on a map and publishing an inventory of a user associated with the listing to market to other users and residents a threshold distance away from the address data associated with the listing. The method may include generating a set of coupons of a business associated with the listing as the inventory, and providing the set of coupons to the other users and residents the threshold distance away from the address data associated with the listing. The method may also include adjusting the threshold distance away based on a request of the user associated with the listing.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventor: Raj Vasant Abhyanker
  • Publication number: 20080240398
    Abstract: A method is provided for operating a directory assistance system. The method includes the steps of storing a plurality of directory listings, including listings relating to identification of Voice over IP devices. A directory request is received for one of the directory listings and a call completion record is generated for providing information responsive to the directory request. The call completion record includes information relating to at least one of the Voice over IP devices, in a case where the requested information relates to a Voice over IP device. The call completion record includes information relating to a mobile phone device in a case where the requested information relates to a mobile phone device. The call completion record includes information relating to a landline device in a case where the requested information relates to a landline device.
    Type: Application
    Filed: March 17, 2008
    Publication date: October 2, 2008
    Inventors: Christine Baumeister, Natalia Kulik
  • Publication number: 20080240399
    Abstract: Included are embodiments for channel mapping. At least one embodiment of a system includes an initiating component configured to initiate a communication with a communications device, the communications device being coupled to a first extension. Some embodiments include a receiving component configured to receive recording data from a plurality of extensions at a plurality of recording resources, the plurality of extensions including the first extension and at least one other extension. Similarly, some embodiments include a first determining component configured to determine a channel that received the initiated communication.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: WITNESS SYSTEMS, INC.
    Inventors: Marc Calahan, Jamie Richard Williams, Kenneth Richard Brodhagen, Damian Smith, Robert John Barnes
  • Publication number: 20080240400
    Abstract: A method and apparatus for processing telephone calls in a packet-based telephony service is disclosed. A store of telephone party identifiers is maintained for multi-service users having access to the packet-based telephony service and an alternate telephony service. Incoming signaling information for telephone calls in the packet-based telephony service is monitored and outgoing signaling information may be altered with reference to the store. An alteration may involve replacing telephony party identification data associated with one telephony service for telephony party identification data associated with another telephony service. The invention allows a multi-service user to be consistently identified by other telephony users by a single telephony party identifier instead of one telephony party identifier for each service they subscribe to.
    Type: Application
    Filed: March 3, 2008
    Publication date: October 2, 2008
    Applicant: Data Connection Limited
    Inventors: Chris Mairs, Paul Brittain, Martin Taylor
  • Publication number: 20080240401
    Abstract: A communications center supports sales and/or customer support services corresponding to a plurality of business affiliations. Operator terminals within the communications center are configurable. A management module manages the allocation of the operator terminals between the plurality of different business affiliations being supported by the communications center. The management module loads a set of configuration information into an operator terminal to match a determined business affiliation with a customer's communications device capabilities. At different times, e.g. corresponding to an initial communications session and a follow-on communications session, the same customer may be connected to different physical operator terminals and be communicating with different actual operators; however, from the perspective of the customer, the customer is made to think that the communication is with the same operator terminal and same operator.
    Type: Application
    Filed: March 28, 2007
    Publication date: October 2, 2008
    Applicant: Federal Network Systems LLC
    Inventors: John-Francis Mergen, Daniel Martin Wood
  • Publication number: 20080240402
    Abstract: In a CTI system, when a wireless terminal is called in response to a transmission request from a personal computer, a key telephone main unit adds to a call signal identification information indicating that a call is based on the transmission request from the personal computer. When the call is received, the wireless terminal judges whether or not the identification information is added to the call signal (step S42). When it is judged that the identification information is added, the wireless terminal automatically answers the call (step S43). Otherwise, the wireless terminal does not automatically answer. Thus, in case of transmission from a CTI application, operability and convenience are improved.
    Type: Application
    Filed: March 27, 2008
    Publication date: October 2, 2008
    Applicant: NEC INFRONTIA CORPORATION
    Inventor: Nobuo NISHIDE
  • Publication number: 20080240403
    Abstract: A system and method for routing and interacting with a dual mode network telephony environment are disclosed. In one embodiment, the system includes an external analog telephony line, a DSL modem, an analog telephony bridge controller, one or more additional analog telephony lines, and a communication center computer. The system routes analog and Voice-over-Internet Protocol calls between the analog telephony lines and the communication center computer. Furthermore, the communication center computer performs operations on calls inbound to the environment and calls outbound from the environment.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventors: William J Tiso, Joe R. Gruber
  • Publication number: 20080240404
    Abstract: A method and system for aggregating data associated with an interaction between a customer and a customer service representative is provided. The method is implemented by a readable medium having a plurality of code segments. The method includes the step of receiving customer service representative call activity data, the customer service representative call activity data including one or more of the following data types: customer service representative on-call activity data, customer service representative after-call activity data, customer service representative screen analytics, customer service representative desktop recording data. The method also includes the step of receiving customer call activity data. The method also includes the step of receiving an interaction between a customer and a customer service representative and generating associated voice data from the interaction.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Kelly Conway, David Gustafson, Douglas Brown, Roger Warford, Christopher Danson
  • Publication number: 20080240405
    Abstract: A method and system for aggregating data associated with a plurality of interactions between at least one customer and at least one agent for generating business process analytics is provided. The method is implemented by a computer readable medium having a plurality of code segments. The method includes the step of organizing a plurality of agents based on a predetermined criteria. The method also includes the step of selecting a range of the organized plurality of agents and identifying a plurality of interactions associated with the organized plurality of agents within the selected range. The method also includes the step of receiving voice data associated with each of the identified interactions. The method also includes the step of receiving agent call activity data associated with each of the identified interactions, the agent call activity data comprising at least one of agent on-call activity data, agent after-call activity data, and agent screen analytics and desktop recording.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Kelly Conway, David Gustafson, Douglas Brown, Christopher Danson
  • Publication number: 20080240406
    Abstract: The automatic selection of interfaces can result in the optimization of interaction between entities. Such selection of interfaces can be applied specifically in the context of interactive voice response systems, and can allow the interface presented to a caller to be optimized based on factors including the caller's usage of the system.
    Type: Application
    Filed: March 26, 2008
    Publication date: October 2, 2008
    Applicant: Convergys CMG Utah, Inc.
    Inventors: Vasudeva Rao Akula, Sunil Issar
  • Publication number: 20080240407
    Abstract: A method, computer program product, and an apparatus for transferring a telephone call and associated data from an IVR system to a live agent or other system are provided. An exemplary embodiment may include a voice portal of the IVR system requesting an access number for a live agent and sending data associated with the telephone call to a CTI system. The CTI system may request and receive a routing label from a router and then send the data associated with the telephone call and the request for an access number to a call center using the routing label provided by the router. The CTI system may receive the access number from the call center and send the access number back through the IVR system to an exchange carrier for transferring the caller to the call center.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicants: Verizon Data Services, Inc., Verizon Data Services India Private Limited
    Inventors: Chandrashekar Srinivasa-Murthy, Achuta Rebala, Vijayanand Arumugam, Santosh Bijur
  • Publication number: 20080240408
    Abstract: According to one embodiment, a telephone exchange apparatus includes a plurality of processors whose connect communication lines differing in communication protocol from one another, a memory which stores a plurality of items of protocol unique information to process communication signals corresponding to the plurality of processors, a communication controller which is connected to the plurality of processors via control buses with smaller transmission capacities than those of the plurality of communication lines and reads the corresponding-protocol unique information from the memory based on notified protocol identification information and makes the corresponding processor execute signal processing by the protocol unique information, and a call controller which notifies protocol identification information corresponding to a communication line to be added to the communication controller, when a setting request for a call is issued.
    Type: Application
    Filed: March 18, 2008
    Publication date: October 2, 2008
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventor: Hideaki Nakai
  • Publication number: 20080240409
    Abstract: A crossbar cable to connect a crossbar switch with a plurality of outputs comprises a switch connector, a plurality of cables, a plurality of device connectors, and an encasing wrap. The switch connector comprises a plurality of sockets. Each cable has wires connected at a first end to a subset of the sockets in the switch connector. Each device connector is connected to a second end of the wires of one of the plurality of cables. Each of the device connectors is communicatively coupled over the wires to the subset of sockets at the first end of its respective one of the plurality of cables. An encasing wrap bundles the plurality of cables at least at the first ends of the plurality of cables.
    Type: Application
    Filed: March 28, 2007
    Publication date: October 2, 2008
    Applicant: ADC DSL SYSTEMS, INC.
    Inventors: Deborah H. Heller, Jeffrey R. McClellan, Derek Braid, Dale Krisher, James Xavier Torok, Thomas Bloom
  • Publication number: 20080240410
    Abstract: Systems and methods for orthogonal frequency division multiplexing are provided. In one embodiment, a multi-carrier modem comprises: a receiver configured to receive a waveform comprising a plurality of spectrally overlapping carrier signals from at least two of a plurality of remote units, wherein the plurality of spectrally overlapping carrier signals are modulated using an inverse Fourier transform algorithm; a transmitter; a processor coupled to the transmitter, wherein the processor outputs data for transmission to the transmitter, wherein the processor applies an inverse Fourier transform algorithm to the data provided to the transmitter; and a controller programmed to analyze a training signal received from a first remote unit and adjust receiver equalizer parameters based on the training signal.
    Type: Application
    Filed: October 29, 2007
    Publication date: October 2, 2008
    Applicant: ADC TELECOMMUNICATIONS, INC.
    Inventors: Mark J. Dapper, Michael J. Geile, Terrance J. Hill, Harold A. Roberts, Brian D. Anderson, Jeffrey Brede, Mark S. Wadman, Robert J. Kirscht, James J. Herrmann, Michael J. Fort, Steven P. Buska, Jeff Solum, Debra Lea Enfield, Darrell Berg, Thomas Smigelski, Thomas C. Tucker, Joe Hall, John M. Logajan, Somvay Boualouang, Heng Lou, Mark D. Elpers, Matt Downs, Tammy Ferris, Adam Opoczynski, David S. Russell, Calvin G. Nelson, Niranjan R. Samant, Joseph F. Chiappetta, Scott Sarnikowski
  • Publication number: 20080240411
    Abstract: A device may receive a telephone call, automatically create a ring tone in response to receiving the telephone call, and cause the ring tone to be audibly provided to a user.
    Type: Application
    Filed: March 27, 2007
    Publication date: October 2, 2008
    Applicant: Verizon Data Services Inc.
    Inventor: Sudeep DASGUPTA
  • Publication number: 20080240412
    Abstract: In one embodiment, the present invention includes an apparatus having an automatic gain control (AGC) stage to receive an input signal from a communication channel physical medium, a first local gain stage coupled to an output of the AGC stage, an equalizer coupled to an output of the first local gain stage, an echo canceler to receive local data to be transmitted along the communication channel physical medium, and a second local gain stage coupled to an output of the echo canceler. Other embodiments are described and claimed.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Amir Mezer, Adee Ran, Ehud Shoor, Harry Birenboim, Yaniv Hadar, Assaf Benhamou
  • Publication number: 20080240413
    Abstract: Cross-correlation based echo canceller controllers are described herein. By way of example, a system for controlling an echo canceller having one or more adaptive filters can include one or more adaptive filter controllers each corresponding to one of the one or more adaptive filters and each configured to halt adaptation of its corresponding adaptive filter according to the cross-correlation of its corresponding corrupted signal and its corresponding error signal of its corresponding adaptive filter.
    Type: Application
    Filed: April 2, 2007
    Publication date: October 2, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Asif Iqbal Mohammad, Jack W. Stokes, Steven L. Grant
  • Publication number: 20080240414
    Abstract: Hybrid echo canceller controllers are described herein. By way of example, a system for controlling an echo canceller can include a signal indicator and an echo canceller controller. The signal indicator can be configured to indicate periods of near-end signal and to indicate periods of echo only with echo-path change in the corrupted signal based at least in part on cross-correlation between two signals associated with the echo canceller. The echo canceller controller can be configured to control the echo canceller according to indications from the signal indicator.
    Type: Application
    Filed: April 2, 2007
    Publication date: October 2, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Asif Iqbal Mohammad, Jack W. Stokes
  • Publication number: 20080240415
    Abstract: Hybrid echo canceller controllers are described herein. By way of example, a system for controlling an echo canceller can include a cross-correlator, a discriminator and an echo canceller controller. The cross-correlator can be configured to produce a cross-correlation based output that facilitates controlling the echo canceller by cross-correlating two signals associated with the echo canceller. The discriminator can be configured to produce a discriminator output that discriminates between near-end signal and echo in a corrupted signal. The echo canceller controller can be configured to control the echo canceller according to the cross-correlation based output and the discriminator output.
    Type: Application
    Filed: April 2, 2007
    Publication date: October 2, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Asif Iqbal Mohammad, Jack W. Stokes
  • Publication number: 20080240416
    Abstract: A user interface, telephony device, and method for managing user control settings associated with a telephony device is described. The user interface displays a label array on a display device of the telephony device. The label array includes at least one row of labels, each representing a discrete function or feature associated with the telephony device. A button array is provided in the vicinity of the display device. The button array includes a corresponding row or rows of buttons, each button representing a discrete function or feature for the telephony device and corresponding to a label within the label array. One or more buttons in the button array are selectively illuminated to indicate a status of one or more functions or features associated with one or more labels in the label array.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Sandra R. Abramson, James Farber
  • Publication number: 20080240417
    Abstract: Exemplary embodiments include methods and systems for detecting an incoming telephone signal, processing the incoming telephone signal, transmitting the processed signal to a remote receiver and alerting a remote user of the incoming signal.
    Type: Application
    Filed: March 27, 2007
    Publication date: October 2, 2008
    Applicant: Verizon Virginia Inc.
    Inventor: Mark J. Maloney
  • Publication number: 20080240418
    Abstract: Disclosed is a hands-free holder for hands-free use of a device that is designed to be held up to a user's ear. The holder is connectable to the device and includes a sleeve that includes a transparent elastically stretchable material that defines an opening for receiving a portion of the device. The holder further includes a curved member that includes a first end and second end rotatably coupled to a first side of the sleeve and to an opposite side of the sleeve, respectively. The curved member defines an opening for receiving the top of a user's ear and is configured to rest on and behind the user's ear when the top of the user's ear is received in the opening such that the device connected to the holder is supported by the user's ear, thereby allowing hands-free use of the device.
    Type: Application
    Filed: April 13, 2007
    Publication date: October 2, 2008
    Inventor: Alan Amron
  • Publication number: 20080240419
    Abstract: An apparatus, system, and method are disclosed for testing data compression and data encryption circuitry. A pattern configuration module generates initial pattern parameters. Holding registers store the initial pattern parameters. A pattern generation module generates patterns for compression/encryption logic. A detection module detects a failure of the compression/encryption logic. The failure of the compression/encryption logic may be a cyclic redundancy check failure of a decompression module and/or a message authentication code failure of a decryption module.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Melanie Jean Sandberg, Scott Jeffrey Schaffer
  • Publication number: 20080240420
    Abstract: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.
    Type: Application
    Filed: February 23, 2007
    Publication date: October 2, 2008
    Inventor: William V. Oxford
  • Publication number: 20080240421
    Abstract: The speed at which encrypt and decrypt operations may be performed in a general purpose processor is increased by providing a separate encrypt data path and decrypt data path. With separate data paths, each of the data paths may be individually optimized in order to reduce delays in a critical path. In addition, delays may be hidden in a non-critical last round.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Vinodh Gopal, Erdinc Ozturk, Gilbert Wolrich, Wajdi K. Feghali, Kirk S. Yap
  • Publication number: 20080240422
    Abstract: The speed at which an AES decrypt operation may be performed in a general purpose processor is increased by providing a separate decrypt data path. The critical path delay of the aes decrypt path is reduced by combining multiply and inverse operations in the Inverse SubBytes transformation. A further decrease in critical path delay in the aes decrypt data path is provided by merging appropriate constants of the inverse mix-column transform into a map function.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Erdinc Ozturk, Vinodh Gopal, Gilbert Wolrich, Wajdi K. Feghali, Kirk S. Yap
  • Publication number: 20080240423
    Abstract: Methods and apparatus to speed up Galois Counter Mode (GCM) computations are described. In one embodiment, a carry-less multiplication instruction may be used to perform operations corresponding to verification of an encrypted message in accordance with GCM. Other embodiments are also described.
    Type: Application
    Filed: June 30, 2007
    Publication date: October 2, 2008
    Inventors: Shay Gueron, Michael E. Kounavis
  • Publication number: 20080240424
    Abstract: Cryptographic systems and methods that support multiple modes of operation, such as CBC, CTR and/or CCM modes. In one aspect, a method for encrypting data includes reading a plaintext data block from a memory, storing the plaintext data block in an input buffer, encrypting the plaintext data block in the input buffer using a first mode to generate a first ciphertext, storing the first ciphertext in an output buffer, encrypting the plaintext data block in the input buffer using a second mode to generate a second ciphertext. For example, in a CCM mode of operation wherein the first mode is a CTR (counter) mode and the second mode is a CBC (cipher block chaining) mode, the block of plaintext that is initially read from memory and stored in the data input register is applied to both the CTR and CBC modes, thereby reducing a number memory read operations as in conventional CCM modes.
    Type: Application
    Filed: January 10, 2008
    Publication date: October 2, 2008
    Inventor: Tae Gon Park
  • Publication number: 20080240425
    Abstract: Medical or other data is de-identified by obfuscation. Located instances are replaced. By replacing with values in a same format and level of generality, multiple possible identifications—the replacement values and the instances not located—are provided in the data, obfuscating the original identification. By replacing as a function of a probability, the resulting data set has different instances distributed in a way making identification of the actual or original instances not located by searching more difficult.
    Type: Application
    Filed: March 14, 2008
    Publication date: October 2, 2008
    Applicant: Siemens Medical Solutions USA, Inc.
    Inventors: Romer E. Rosales, Radu Stefan Niculescu, William A. Landi, Sriram Krishnan, R. Bharat Rao, Phan Hong Giang
  • Publication number: 20080240426
    Abstract: A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers.
    Type: Application
    Filed: March 28, 2007
    Publication date: October 2, 2008
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal, Makaram Raghunandan, Martin G. Dixon, Srinivas Chennupaty, Michael E. Kounavis
  • Publication number: 20080240427
    Abstract: The present invention relates to arrangements and methods for generating keys for cryptographic processing of communication between a first communication unit (200) and a second communication unit (300). The first communication unit (200) and second communication unit (300) are adapted to obtain knowledge about a secret function, wherein the first communication unit comprises: means for selecting a value z (210), means for calculating the secret function as a function of the selected value z (220) means for processing data with the calculated secret function (230), and means for transmitting the processed data in association with the selected z to the second communication unit (240), wherein the secret function is selected from a set of functions that are almost k-wise independent.
    Type: Application
    Filed: December 1, 2005
    Publication date: October 2, 2008
    Inventor: Mats Naslund
  • Publication number: 20080240428
    Abstract: Systems and methods for easily and at high speed re-encrypting data recorded on a magnetic recording medium when the data is encrypted using an encryption key and the encryption key is changed. A track where effective user data is not recorded is set as a first reserved track, then data is read out from the first updating source track and decrypted using a first encryption key KEY 1, which is reencrypted using a second encryption key KEY 2 and recorded in the first reserved track, next, the first updating source track is set as a second reserved track, and a second updating source track is set, and the encryption key is updated by repeating these steps until all tracks to be subjected to the key updating processing have been subjected to the key updating processing.
    Type: Application
    Filed: March 31, 2007
    Publication date: October 2, 2008
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: Jeffrey R. Hobbet, Takashi Sugawara, Hiroaki Yasuda
  • Publication number: 20080240429
    Abstract: The storage apparatus of the present invention that controls the input and output of data to and from a computer includes a logical volume for storing data from the computer, a common resource for storing data pre-stored in the logical volume as update data in order to store subsequent data from the computer in the logical volume, an encryption/decryption unit for encrypting or decrypting data stored in the logical volume or update data stored in the common resource, and a key change unit for changing a key for encrypting or decrypting data stored in the logical volume, and changing a key for encrypting or decrypting update data stored in the common resource based on information of the key used for data stored in the logical volume.
    Type: Application
    Filed: January 18, 2008
    Publication date: October 2, 2008
    Applicant: HITACHI, LTD.
    Inventors: Daisuke Kito, Kenji Fujii, Manabu Kitamura
  • Publication number: 20080240430
    Abstract: A machine readable code comprises at least a portion of a graphical indicium, the graphical indicium comprising a random arrangement of spots. At least some of the spots comprising the graphical indicium may have a dimension of less than one micrometre. The spots comprising the graphical indicium may vary in size and/or shape. The portion of the graphical indicium comprising the code may be delimited by a boundary, the boundary may be a temporary boundary which may be generated by a reading machine relative to a fixed trigger point only when the code is being read. Alternatively, the portion of the graphical indicium comprising the code may be delimited by a graphically represented boundary.
    Type: Application
    Filed: February 1, 2008
    Publication date: October 2, 2008
    Inventors: Stephen Paul Pinchen, Jens Jacob Juul Rasmussen, Drago Boras
  • Publication number: 20080240431
    Abstract: A method for generating a plurality of control words, each control word controlling access to an object. The method includes providing a control word packet (CWP), generating a first control word (CW) from the CWP, providing a second CW generation input and producing a second CW based, at least in part, on both of the following the first CW and the second CW generation input. Control word generating apparatus for generating a plurality of control words is also disclosed.
    Type: Application
    Filed: June 2, 2008
    Publication date: October 2, 2008
    Inventors: Akiva Patinkin, Stephanie Wald, Avraham Poupko
  • Publication number: 20080240432
    Abstract: A method for implementing a security protocol, involving receiving a packet from a network connection, obtaining an identifier for one of a plurality of security association database (SADB) partitions associated with the packet, wherein each of the plurality of SADB partitions is associated with one of a plurality of packet destinations, applying a security association from the one of the plurality of SADB partitions to the packet, and sending the packet to the one of the plurality of packet destinations associated with the SADB partition, wherein the packet is processed at the one of the plurality of packet destinations.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: Sun Microsystems, Inc.
    Inventors: Kais Belgaied, Darrin P. Johnson
  • Publication number: 20080240433
    Abstract: A secure authentication channel (SAC) between two nodes in a communication network is created by the nodes themselves using mutual authentication. The network has two nodes, a coordinating entity, two PKI-based SACs, and one non-PKI SAC which is created by the two nodes and is for use by the nodes. The coordinating entity generates a master key which is transmitted to two nodes via a PKI-based SAC established between the coordinating entity and each of the two nodes. One node uses the master key to generate a first random number and the second node uses the key to generate a second random number. The second node also has an encrypted third random number. The network also has a third SAC, which is not solely based on PKI, between the first node and the second node and is created when the two nodes have authenticated each other. The mutual authentication process occurs without the intervention of the coordinating entity.
    Type: Application
    Filed: October 5, 2007
    Publication date: October 2, 2008
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Paul Fahn, Sanjeev Verma
  • Publication number: 20080240434
    Abstract: A storage virtualization apparatus comprises a judgment portion. The judgment portion judges whether encryption functions are present in an external storage subsystem having an external logical volume identified based on a write request received from a higher-level device. When the result of the judgment is negative, the storage virtualization apparatus uses its own encryption functions to encrypt the data of the write request before transmission to the external storage subsystem, but when the result of the judgment is positive, the storage virtualization apparatus transmits the data of the write request as-is to the external storage subsystem, without using its own encryption functions to perform encryption.
    Type: Application
    Filed: January 3, 2008
    Publication date: October 2, 2008
    Inventor: Manabu KITAMURA
  • Publication number: 20080240435
    Abstract: Disclosed are a method and a system for secure watermark embedding in a server-client configuration (60,70). The method comprises encrypting (210) the data signal (x) and generating (240) a decryption key wherein a watermark (Wi) is included. The client decrypts (420) the encrypted data signal in order to obtain a watermarked data signal (xw). In accordance with the invention, the encryption mechanism and decryption key are made dependent on a perceptual mask (m1,m2) so as eventually make the embedded watermark more robust.
    Type: Application
    Filed: November 6, 2006
    Publication date: October 2, 2008
    Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen
  • Publication number: 20080240436
    Abstract: An improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
    Type: Application
    Filed: June 12, 2008
    Publication date: October 2, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexandre Polozoff, Kulvir Singh Bhogal
  • Publication number: 20080240437
    Abstract: An alternative design is given for an optimized quantum cryptographic entangling probe for attacking the BB84 protocol of quantum key distribution. The initial state of the probe has a simpler analytical dependence on the set error rate to be induced by the probe than in the earlier design. The new device yields maximum information to the probe for a full range of induced error rates. As in the earlier design, the probe contains a single CNOT gate which produces the optimum entanglement between the BB84 signal states and the correlated probe states.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventor: Howard E. Brandt
  • Publication number: 20080240438
    Abstract: System and method for forwarding a ciphering key to a decipher application comprising capturing a first message carrying the ciphering key from a first network interface, identifying a network node associated with the first network interface, identifying a monitor responsible for processing messages captured from interfaces coupled to the network node, and forwarding the ciphering key to the monitor. In an alternative embodiment, the method may further comprise capturing second messages carrying encrypted messages from a second network interface, and deciphering the second messages using the ciphering key. The method may also comprise identifying user equipment associated with the first messages, and selecting a deciphering application running on the monitor using a user equipment identity.
    Type: Application
    Filed: March 5, 2008
    Publication date: October 2, 2008
    Applicant: TEKTRONIX, INC.
    Inventors: FANGMING HUANG, BAOYUAN WANG
  • Publication number: 20080240439
    Abstract: Security context transfer and ROHC context transfer to enable secure and efficient mobile device handoff is facilitated by the introduction of new information elements to the UL Allocation message or separate downlink (DL) physical channel, the use of reverse tunneling during hand off (HO) to provide the User Equipment (UE) with new security parameters, the generation of multiple key sets and automated or context based triggering of the Security Mode Command.
    Type: Application
    Filed: March 14, 2008
    Publication date: October 2, 2008
    Applicant: INTERDIGITAL TECHNOLOGY CORPORATION
    Inventors: Rajat P. Mukherjee, Mohammed Sammour, Peter S. Wang, Shankar Somasundaram, Jin Wang, James M. Miller
  • Publication number: 20080240440
    Abstract: Device authentication is based on the ability of a human to synchronize the movements of his or her fingers. A pairing procedure for two wireless devices may thus involve a synchronization test that is based on the relative timing of actuations of input devices on each of the wireless devices. In some aspects a synchronization test involves determining whether actuations of user input devices on two different wireless devices occurred within a defined time interval. In some aspects a synchronization test involves comparing time intervals defined by multiple actuations of user input devices on two wireless devices.
    Type: Application
    Filed: August 24, 2007
    Publication date: October 2, 2008
    Inventors: Gregory Gordon Rose, Lu Xiao, David Jonathan JULIAN
  • Publication number: 20080240441
    Abstract: Proposed are a storage controller equipped with an encryption function, a data encryption method, and a storage system enabling a user to apply one's desired encryption policy to data received from a computer or the like. This storage controller includes a storage apparatus for storing data from a computer, and a controller for controlling the input and output of data stored in the storage apparatus. The controller has a configuration information management unit for managing configuration information of attributes concerning an encryption function as information for encrypting data, and an encryption execution unit for performing encryption of data from the computer and data stored in the storage apparatus based on the configuration information of attributes concerning the encryption function.
    Type: Application
    Filed: January 4, 2008
    Publication date: October 2, 2008
    Inventor: Norihiko Kawakami