Patents Issued in December 15, 2015
  • Patent number: 9213835
    Abstract: In one embodiment of the present invention, a secure cryptographic circuit arrangement is provided. The secure cryptographic circuit includes a cryptographic processing block, a spreading sequence generator, and a delay control circuit. The cryptographic processing block has a plurality of signal paths. One or more of the plurality of signal paths includes respective adjustable delay circuits. The spreading sequence generator is configured to output a sequence of pseudo-random numbers. The delay control circuit has an input coupled to an output of the spreading sequence number generator and one or more outputs coupled to respective delay adjustment inputs of the adjustable delay circuits. The delay control circuit is configured to adjust the adjustable delay circuits based on the pseudo-random numbers.
    Type: Grant
    Filed: April 7, 2010
    Date of Patent: December 15, 2015
    Assignee: XILINX, INC.
    Inventors: Austin H. Lesea, Stephen M. Trimberger
  • Patent number: 9213836
    Abstract: In the prior art of computer security by default programs are allowed to do whatever they like to other programs or to their data files or to critical files of the operating system, which is as absurd as letting a guest in a hotel bother other guests as he pleases, steal their property or copy it or destroy it, or have free access to the hotel's management resources. The present concept is based on automatic segregation between programs. This is preferably done by creating automatically an unlimited number of Virtual Environments (VEs) with virtual sharing of resources, so that the programs in each VE think that they are alone on the computer, and (unless explicitly allowed by the user) any changes that they think they made in virtually shared resources are in reality only made in their own VE, while the user preferably has an integrated view of the computer.
    Type: Grant
    Filed: October 20, 2004
    Date of Patent: December 15, 2015
    Assignee: BARHON MAYER, BATYA
    Inventors: Yaron Mayer, Zak Dechovich
  • Patent number: 9213837
    Abstract: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: December 15, 2015
    Assignee: Raytheon Cyber Products, LLC
    Inventors: Matthew Richard, Jesse J. Lee, Monty D. McDougal, Randy S. Jennings, William E. Sterns
  • Patent number: 9213838
    Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.
    Type: Grant
    Filed: August 24, 2012
    Date of Patent: December 15, 2015
    Assignee: MCAFEE IRELAND HOLDINGS LIMITED
    Inventor: Lixin Lu
  • Patent number: 9213839
    Abstract: An embodiment of the present application provides technologies for detecting malicious content embedded in a content downloaded from an external source. The downloaded content converted into an opcode sequence by a web browser in a computing device. The opcode sequence is compared with a pre-stored opcode signature. The opcode signature comprises multiple sentences, and each sentence has multiple clauses. Each clause may include a matching opcode, a condition, an instruction, and an identifier. When a matching opcode in a clause matches with an opcode of the opcode sequence, and the condition as specified in the clause is determined to be true, the instruction in the clause is taken and next sentence identified by the identifier is taken to match the opcode sequence. Eventually, the last taken clause in the opcode signature may instruct whether opcode sequence contains malicious code.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: December 15, 2015
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge, Xiaobin Qian, Jian Fu
  • Patent number: 9213840
    Abstract: Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: December 15, 2015
    Assignee: Lynx Software Technologies, Inc.
    Inventors: Edward T. Mooring, Craig Howard, Phillip Yankovsky
  • Patent number: 9213841
    Abstract: A method, apparatus, and manufacture for debugging and crash logging is provided. A log file is received, where the log file includes encrypted log messages that indicate execution trace of obfuscated code while leaving code locations of corresponding code in the obfuscated code unknown. The encrypted log messages include execution way-point indices. Next, at least a portion of the log file is then decrypted. A debug log viewer is then employed to view the decrypted log file. The debug log viewer includes an execution way-point manifest that correlates each of the execution way-point indices to a corresponding code location.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: December 15, 2015
    Assignee: GOOGLE INC.
    Inventors: Edward Charles Hiar, Rahul Ricardo Frias, Duncan MacLean
  • Patent number: 9213842
    Abstract: An apparatus and related method to track data block operations in a cloud system are provided. Attributes associated with the data block operation may be attached to each individual data block targeted by the data block operation.
    Type: Grant
    Filed: August 17, 2011
    Date of Patent: December 15, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Chun Hui Suen, Peter Jagadpramana, Kok Leong Ryan Ko, Bu Sung Lee
  • Patent number: 9213843
    Abstract: A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: December 15, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Prasad G. Naldurg, Sriram K. Rajamani, Stefan Schwoon, John Lambert
  • Patent number: 9213844
    Abstract: Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications, however, may be controlled by a supervisor that analysis an output and enforces limitations on content and/or volume based on a level of purchased access.
    Type: Grant
    Filed: August 25, 2011
    Date of Patent: December 15, 2015
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9213845
    Abstract: Described herein are systems and methods for controlling access by a user to content across a plurality of media devices. Access content limits may be set and enforced across the plurality of media devices. A user exceeding the limits may be disallowed from access to the content. The content access limits for a user may be specified by one or more of time, cost, content category, and so forth.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: December 15, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Quais Taraki, Parag Kumar Garg
  • Patent number: 9213846
    Abstract: A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be encoded within specific sectors of the flash storage device. One bits of the identifier may be encoded as unusable ones of the specific sectors and zero bits of the identifier may be encoded as usable one of the specific sectors. Alternatively, the zero bits of the identifier may be encoded as the unusable ones of the specific sectors and the one bits of the identifier may be encoded as the usable ones of the specific sectors. The software application may be permitted to execute on a processing device connected to the flash storage device only when the identifier is encoded within the flash storage device.
    Type: Grant
    Filed: May 5, 2013
    Date of Patent: December 15, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Boris Asipov
  • Patent number: 9213847
    Abstract: A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text portion, the method including detecting letter-based locations of occurrences of pre-determined single-letter and/or multi-letter pattern(s) within the length-significant portion, the detecting being carried out such that at least some occurrences are detected in a word-boundary independent manner that does not depend on locations of word-word boundaries, for a pattern occurrence letter-position signal which describes letter positions of the occurrences of the patterns within the text portion, computing frequency-dependent absolute or relative magnitudes of signal strength for a plurality of frequencies, the computed magnitudes representing letter-based frequencies of the pattern occurrences within the natural language text portion, and storing the computed signal strength magnitudes at the plurality of frequencies, the generated fingerprint comprising
    Type: Grant
    Filed: September 7, 2011
    Date of Patent: December 15, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Eyal Farkash, Naomi Magen, Erez Waisbard, Eliphaz Hibshoosh
  • Patent number: 9213848
    Abstract: A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.
    Type: Grant
    Filed: January 5, 2015
    Date of Patent: December 15, 2015
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Ho-chi Chen, Deepak Raghunath Attarde, Hetalkumar N. Joshi
  • Patent number: 9213849
    Abstract: Embodiments of the present invention provide a method, system and computer program product for hierarchical access control administration preview of access control rights for hierarchically organized content. In an embodiment of the invention, a method for rendering a hierarchical access control administration preview of access control rights for hierarchically organized content can be provided. The method can include rendering a view of hierarchically organized content in connection with corresponding access rights and proposing explicitly assigned access rights for selected content in the hierarchically organized content. The method also can include re-rendering the view to reflect both the proposed explicitly assigned access rights for the selected content and also implicitly resulting assigned access rights for the children of the selected content.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: December 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Trevett B. Chusing, John W. Stephenson, Lei Zhang
  • Patent number: 9213850
    Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: December 15, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
  • Patent number: 9213851
    Abstract: In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A one-way hash function is performed on the password based on the number of accesses of the count to generate a password hash based on the count. The password hash is stored as the stored password hash.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: December 15, 2015
    Assignee: VMware, Inc.
    Inventor: Uday Kurkure
  • Patent number: 9213852
    Abstract: In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A plurality of password hashes is generated by utilizing one-way hash functions based on the number of accesses of the count and the password to generate the plurality of password hashes based on the count. The plurality of password hashes is stored in a password hash file.
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: December 15, 2015
    Assignee: VMware, Inc.
    Inventor: Uday Kurkure
  • Patent number: 9213853
    Abstract: User profiles stored on a server control access to private data. Access control to the user profiles themselves is provided without a password. In more detail, the user profile is functionally handicapped by at least a portion of digital data (or a cryptographic key) associated with the user profile being removed and discarded after being sent to an enabling device. A human gesture from the user first provides a key to reconstitute the key or restore the missing data portion in the enabling device which is then transmitted to the server to reconstitute the key or restore the missing data portion in order to reconstitute the user profile for access.
    Type: Grant
    Filed: March 9, 2013
    Date of Patent: December 15, 2015
    Inventor: Nicolas Leoutsarakos
  • Patent number: 9213854
    Abstract: There are provided a head-mounted display (HMD) apparatus and a method for accessing encrypted information by the apparatus, in which the head-mounted display apparatus with enhanced security according to an embodiment of the present invention includes a biometric information input unit that receives biometric information of a user; a communication module that transmits or receives information to or from a server; a memory that stores encrypted information; a processor that transmits the biometric information received through the biometric information input unit to a user authentication server through the communication module, receives access privilege information from the user authentication server, and decrypts the encrypted information stored in the memory based on the received access privilege information; and a display unit that displays the decrypted information through the processor.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: December 15, 2015
    Inventor: Tae Eon Koo
  • Patent number: 9213855
    Abstract: A trusted user circle server for encryption key distribution and authentication support, as well as a client-side application which resides on user's devices are disclosed. In particular, the trusted user circle server manages a repository for static public keys (SPUK) which are used for authentication and secure distribution of a dynamic private context key (DPCK) used for the end-to-many encryption. Accordingly, posting users encrypt posted document using the DPCK and viewing users retrieve the DPCK to decrypt the posted document. These keys are associated to the trusted user circle and are generated dynamically for a given circle policy context (CPC). The CPC is an identifier that represents a group of members of a trusted user circle. It changes whenever any member of the trusted user circle leave it, when a new trusted user circle is created or when the DPCK expires after a pre-determined period of time.
    Type: Grant
    Filed: June 2, 2014
    Date of Patent: December 15, 2015
    Assignee: Narus, Inc.
    Inventors: Ignacio Bermudez Corrales, Antonio Nucci
  • Patent number: 9213856
    Abstract: A service request from a user is received to execute an operation on an instance of a business object. Thereafter, an access control check is performed to confirm whether the user is allowed to execute the requested operation on a type of business object corresponding to the business object specified and based on an access group associated with the user. Subsequently, the user is either provided with access to the instance of the business object to execute the operation if the access control check confirms that the user is allowed to execute the operation on the instance of the business object, or prevented from accessing the instance of the business object to execute the operation on the instance of the business object. Related apparatus, systems, techniques and articles are also described. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: December 15, 2015
    Assignee: SAP SE
    Inventors: Tim Kornmann, Marcel Hermanns, Cristina Buchholz, Michael Hartel, Daniel Zoch
  • Patent number: 9213857
    Abstract: The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 15, 2015
    Assignee: Security First Corp.
    Inventors: Mark S. O'Hare, Rick L. Orsini
  • Patent number: 9213858
    Abstract: Virtual file management is disclosed. Managed content from multiple separate storage domains is organized into a virtual file system that maintains with respect to each of at least a subset of said separate storage domains information of storage domain specific file system primitives to perform primitive operations with respect to content stored in that storage domain. Policies are determined that apply to the managed content. Each policy indicates primitive operations permitted to be performed with respect to the managed content. Information comprising the virtual file system and the policies is provided to a client application on a mobile device. The client application is configured to provide access to the managed content in the virtual file system in a manner at least in part indicated in the policies, including by allowing the permitted primitive operations to be performed using said storage domain specific file system primitives.
    Type: Grant
    Filed: September 4, 2014
    Date of Patent: December 15, 2015
    Assignee: MOBILE IRON, INC.
    Inventors: Rahul Sharma, Sanjeev Krishnan, Venkata Sastry Akella, John Drewry
  • Patent number: 9213859
    Abstract: Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of the remote web-based application are received at a first web browser that is used by the user, wherein at least a portion of the user inputs comprise user-inputted data intended to be stored at the web-based application. The user inputs are transmitted to a management component that is configured to interact with a second web browser that communicates with the web-based application. The management component obfuscates at least a portion of the user-inputted data and forwards the obfuscated and un-obfuscated portions of the user inputs to the second web browser, which correspondingly transmits the obfuscated and un-obfuscated portions of the user inputs to the remote web-based application.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: December 15, 2015
    Assignee: VMware, Inc.
    Inventors: Steven Henry Strassmann, Zachary James Shepherd
  • Patent number: 9213860
    Abstract: A database for online personal information management comprising: a first account; a first database user id; a second database user id, the second database user id being associated with the first account; a set of data nodes, the nodes being interlinked to form a graph; a data object having an associated node, the associated node being one node in the set of data nodes; an associated account; an object owner; at least one share right object associated with a node, the share right object having a parameter indicating whether the share right object is active when the owner is alive or when the object owner is deceased.
    Type: Grant
    Filed: September 6, 2011
    Date of Patent: December 15, 2015
    Inventors: James Kenneth Everett, Alexander J Turipe, Jody F. Fameree
  • Patent number: 9213861
    Abstract: The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: December 15, 2015
    Inventors: Gerald R. Black, Alyssa S. Black
  • Patent number: 9213862
    Abstract: Systems, methods and articles of manufacture for delivering website content to an internet user which is personalized to the user based on a persona associated with the user. A persona database system accesses personal and financial data for the user from any suitable source, such as from a tax return of the user or personal finance management application or even a questionnaire. The persona database system matches the user's data to a persona for the user from a predetermined, discrete set of personas, wherein each persona identifies a generalized profile of personal and financial characteristics of the user. Then, when a user access a website hosted by a website server, the website server accesses the persona for the user from the persona database system and the website server personalizes the website content delivered to the user based on the persona for the user.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: December 15, 2015
    Assignee: INTUIT INC.
    Inventors: Carolyn Spencer, Avanish Pathak, Vijoy Caro, Aliza D. Carpio, Alan Tifford, Ashley K. McMahon, Lisa B. Greene-Lewis
  • Patent number: 9213863
    Abstract: Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus may include one or more privacy indicators to indicate one or more privacy conditions of the apparatus in association with provision of computer vision on the apparatus. The apparatus may further include a privacy engine coupled with the one or more privacy indicators, and configured to pre-process images from an image source of the apparatus associated with the provision of computer vision to the apparatus, to increase privacy for a user of the apparatus, and to control the one or more privacy indicators. In embodiments, the apparatus may include means for blanking out one or more pixels with depth values identified as greater than a threshold. Other embodiments may be described and claimed.
    Type: Grant
    Filed: October 20, 2014
    Date of Patent: December 15, 2015
    Assignee: Intel Corporation
    Inventors: David Bar-On, Geoffrey Strongin
  • Patent number: 9213864
    Abstract: A data processing apparatus includes an auxiliary storage device having target verification data stored therein, a program memory having a validity verification program stored therein, a first RAM (Random Access Memory), a second RAM, and an execution unit configured to execute a validity verification process in accordance with the validity verification program stored in the program memory. The execution unit is configured to copy the target verification data from the auxiliary storage device into the first RAM, execute the validity verification process on the copied target verification data in the first RAM, and use the second RAM as a work area in a case of executing the validity verification process.
    Type: Grant
    Filed: October 3, 2012
    Date of Patent: December 15, 2015
    Assignee: RICOH COMPANY, LTD.
    Inventor: Kei Kato
  • Patent number: 9213865
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: October 3, 2014
    Date of Patent: December 15, 2015
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Patent number: 9213866
    Abstract: A circuit for preventing unauthorized access in an integrated circuit includes a plurality of circuit block and a plurality of protection circuits. Each protection circuit is coupled to an input of a corresponding circuit block of the plurality of circuit blocks. Each protection circuit determines whether an access request to the corresponding circuit block is authorized. The protection circuits could be implemented to monitor system-on-chip interconnections of master and slave circuits, for example. A method of preventing unauthorized access in an integrated circuit could be implemented using the circuit.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: December 15, 2015
    Assignee: XILINX, INC.
    Inventors: Sagheer Ahmad, Ygal Arbel
  • Patent number: 9213867
    Abstract: A cloud computing service to securely process queries on a database. A security device and method of operation are also disclosed. The security device may be provisioned with a private key of a subscriber to the cloud service and may have processing hardware that uses that key, sequestering the key and encryption processing in hardware that others, including operating personnel of the cloud service, cannot readily access. Processing within the security device may decrypt queries received from the subscriber and may encrypt responses for communication over a public network. The device may perform functions on clear text, thereby limiting the amount of clear text data processed on the cloud platform, while limiting bandwidth consumed in communicating with the subscriber. Such processing may include formatting data, including arguments in a query, in a security protocol used by the cloud platform.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: December 15, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ravishankar Ramamurthy, Kenneth H. Eguro, Ramarathnam Venkatesan
  • Patent number: 9213868
    Abstract: An electronic device comprises a housing defining an inserting slit configured to receive a memory card, a printed circuit board configured to be installed within the housing, a card reader installed in the housing and electrically coupled to the printed circuit board, and an elastic cover coupled to the housing and configured to cover the inserting slit. The card reader is configured to be substantially adjacent to the inserting slit. The elastic cover defines a slot for guiding the memory card to a receiving portion of the card reader. The elastic cover is configured to deform and expose the memory card upon depression, so that the memory card is ejected out of the housing via the slot.
    Type: Grant
    Filed: June 20, 2014
    Date of Patent: December 15, 2015
    Assignee: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventor: Da-Yi Peng
  • Patent number: 9213869
    Abstract: A magnetic stripe reading device including a magnetic head assembly including a mounting element defining a circumferential anti-tampering enclosure and at least one information reading sensor having output contacts, a protective layer including at least one protective grid and at least one anti-tampering contact array including at least two electrical contacts, at least one resiliently deformable conductive element arranged to selectably provide a galvanic interconnection between the electrical contacts, a closure element fixed to the assembly in a secure orientation to displace the deformable conductive element into galvanic interconnection contact with the electrical contacts, whereby tampering with the closure element causes the deformable conductive element to break the galvanic interconnection contact and a flat cable coupled to the output contacts, to the protective layer and to the electrical contacts and carrying electrical signals useful for providing a tampering alarm indication when the electrical
    Type: Grant
    Filed: October 4, 2013
    Date of Patent: December 15, 2015
    Assignee: VERIFONE, INC.
    Inventors: Igal Yosef Yanko, John Henry Barrowman, Scott William McKibben
  • Patent number: 9213870
    Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a reader challenge from a verification authority; determining a reader response based at least on the reader challenge and the reader key; sending a first message including at least the reader response but not the reader key to the verification authority; receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to the verification authority; and receiving an electronically-signed reply from the verification authority. The reader validates the verification authority reply by checking the signature. The verification authority may notify a designated party if a response is incorrect.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: December 15, 2015
    Assignee: Impinj, Inc.
    Inventors: Christopher J. Diorio, Scott A. Cooper
  • Patent number: 9213871
    Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a reader challenge from a verification authority; determining a reader response based at least on the reader challenge and the reader key; sending a first message including at least the reader response but not the reader key to the verification authority; receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to the verification authority; and receiving an electronically-signed reply from the verification authority. The reader validates the verification authority reply by checking the signature. The verification authority may notify a designated party if a response is incorrect.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: December 15, 2015
    Assignee: Impinj, Inc.
    Inventors: Christopher J. Diorio, Scott A. Cooper
  • Patent number: 9213872
    Abstract: In one or more embodiments described herein, there is provided an apparatus that is configured to determine respective signal strengths of radio frequency identification signalling received from multiple sources by a directional antenna. The apparatus is also configured to discriminate the radio frequency identification signalling from a particular source based on the particular signal strength of the radio frequency identification signalling received from that source.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: December 15, 2015
    Assignee: Nokia Technologies Oy
    Inventors: Timo Petteri Karttaavi, Ilkka Hermanni Hakala
  • Patent number: 9213873
    Abstract: Determining movement of a Radio Frequency Identification (RFID) tag first establishes a phase difference/frequency model comprising a set of phase-wrapped local rates-of-change and an intercept point. RFID tag readings are then made to measure phase differences between the interrogation signal and the tag response at different frequencies. A correlation is determined between the measured phase differences versus frequency and the phase-wrapped local phase rates-of-change of the phase difference/frequency model. If the correlation is better than or equal to a predetermined limit, the tag is stationary, or if the correlation is worse than the predetermined limit, the tag is moving.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: December 15, 2015
    Assignee: Symbol Technologies, LLC
    Inventor: Timothy B. Austin
  • Patent number: 9213874
    Abstract: In combination, an RFID antenna array, an RFID tag reader, and a power supply, the foregoing components being adapted to be worn or otherwise borne by a person and be operatively connected so that the power supply powers the reader and the reader energizes the antenna array and receives RFID tag signals through the antenna array while the person passes through an area as the person's hands and arms are unencumbered by said components.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: December 15, 2015
    Assignees: DJB GROUP LLC, WISTRON NEWEB CORPORATION
    Inventor: Walter D. Burnside
  • Patent number: 9213875
    Abstract: This invention overcomes the disadvantages of the prior art by providing a system and method for reading symbology, and more typically linear barcodes (“symbols”) that employs trained attributes that remain invariant between scans of different barcodes during runtime to tune various aspects of the procedure for locating and decoding such barcodes. The procedure relies upon a training step in which one or more exemplary barcodes are decoded and the invariant attributes for such barcodes, including, but not limited to, size, shape, relative angle in the image field of view and resolution are stored. The runtime decoding procedure then employs these attributes to constrain the search for subsequent, scanned barcodes and then decode it according to a plurality of tuned steps.
    Type: Grant
    Filed: July 18, 2006
    Date of Patent: December 15, 2015
    Assignee: COGNEX CORPORATION
    Inventors: Sateesha Nadabar, Ivan Bachelder
  • Patent number: 9213876
    Abstract: In a barcode reader, a sensor controller sets time of one frame of a line image sensor based on output time necessary for data output of one frame from the line image sensor and lighting time of an LED. A light source controller performs first lighting control to turn on the LED only for the lighting time after termination of the data output within the time of one frame, and second lighting control to turn on the LED only for the lighting time so as to include the entire period of the data output within the time of one frame.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: December 15, 2015
    Assignee: Optoelectronics CO., Ltd.
    Inventors: Masaki Kurokawa, Depei Ji, Zhihui Duan
  • Patent number: 9213877
    Abstract: A barcode reader for providing decoded data to a remote computing system includes a communication interface, non-volatile memory comprising first executable code, volatile memory, and a processor. The processor executes the first executable code to utilize the communication interface to obtain second executable code from a remote configuration server. The processor also loads the second executable code directly to the volatile memory and executes the second executable code to commence operation of the barcode reader.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: December 15, 2015
    Assignee: The Code Corporation
    Inventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
  • Patent number: 9213878
    Abstract: A barcode reader for decoding and manipulating data from a barcode and providing the decoded and manipulated data to a remote computing system includes barcode reading hardware, including an image sensor which captures an image of a barcode within a field of view. The barcode reader also includes a processor executing executable code which generates decoded data representative of data encoded in the barcode, formats the decoded data, and sends the formatted decoded data to the remote computing system only when the processor executes formatting and routing instructions which the barcode reader obtains from a remote configuration server upon power up of the barcode reader.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: December 15, 2015
    Assignee: The Code Corporation
    Inventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
  • Patent number: 9213879
    Abstract: A barcode reader for decoding data from a barcode includes barcode reading hardware, including an image sensor which captures an image of a barcode within a field of view. The barcode reader also includes a processor. The processor executes embedded firmware to operate the barcode reading hardware. The processor also generates decoded data representative of data encoded in the barcode by executing supplemental operating instructions which the barcode reader obtains from a remote configuration server upon power up of the barcode reader. The supplemental operating instructions are distinct from the embedded firmware and include instructions which, when executed by the processor, enable the barcode reader to output the decoded data from the barcode within the field of view.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: December 15, 2015
    Assignee: The Code Corporation
    Inventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
  • Patent number: 9213880
    Abstract: A method includes the following: (1) projecting a light pattern towards a target object; (2) detecting light returned from the target object through an imaging lens arrangement with an imaging sensor to capture at least a first slit-frame-image and a second slit-frame-image; (3) determining an optimized position of the imaging lens arrangement; (4) detecting light returned from the target object with the imaging sensor to capture an image of a barcode when the imaging lens arrangement is maintained at the optimized position; and (5) processing the image of the barcode to decode the barcode. In the method, determining the optimized position includes processing at least the first slit-frame-image and the second slit-frame-image.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: December 15, 2015
    Assignee: Symbol Technologies, LLC
    Inventors: William C Sackett, Christopher W Brock, David P Goren
  • Patent number: 9213881
    Abstract: A barcode reader may include one or more advancements in the manner in which its software and/or firmware are updated and/or installed. The barcode reader may have an image sensor that captures an image of a barcode, a communication interface, volatile memory, non-volatile memory, and a processor. The barcode reader may receive executable code, selected from multiple versions, from a configuration server remote from the barcode reader. The executable code may be loaded directly into the volatile memory, without first being loaded into the non-volatile memory. The executable code may be loaded at a location in the volatile memory that begins at a start address stored in the non-volatile memory or in a header of the executable code. The barcode reader may execute the executable code to commence operation of the barcode reader directly after the executable code has been loaded into the volatile memory.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: December 15, 2015
    Assignee: The Code Corporation
    Inventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
  • Patent number: 9213882
    Abstract: A method of extracting data from an identifiable monochromatic pattern. The method comprises separating a polychromatic optical signal, received from an object having identifiable monochromatic pattern, into a plurality of wavelength components, separately capturing each of the wavelength components, reconstructing a plurality of images each from a different wavelength component, detecting the identifiable monochromatic pattern in one or more of the images, and extracting data associated with or encoded by the detected identifiable monochromatic pattern. The images have different depths of field.
    Type: Grant
    Filed: January 20, 2014
    Date of Patent: December 15, 2015
    Assignee: Ramot at Tel-Aviv University Ltd.
    Inventors: Benjamin Milgrom, Emanuel Marom, Naim Konforti, Michael Golub
  • Patent number: 9213883
    Abstract: An apparatus and method for processing a depth image. A depth image may be generated with reduced noise and motion blur, using depth images generated during different integration times that are generated based on the noise and motion blur of the depth image.
    Type: Grant
    Filed: January 9, 2013
    Date of Patent: December 15, 2015
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Sunkwon Kim, Ouk Choi, Seungkyu Lee
  • Patent number: 9213884
    Abstract: An image processing apparatus includes an attention area detection unit, a luminance parallax conversion unit, and a parallax estimation unit. The attention area detection unit is configured to detect an attention area including a desired subject from a standard image. The luminance parallax conversion unit is configured to perform a luminance parallax conversion with respect to the attention area on the basis of a luminance parallax conversion characteristic estimated by using a past frame. The parallax estimation unit is configured to perform parallax estimation on the basis of the standard image and a reference image, a viewpoint position of which is different from that of the standard image, and perform, in the attention area, the parallax estimation by using a luminance parallax conversion result obtained by the luminance parallax conversion unit.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: December 15, 2015
    Assignee: Sony Corporation
    Inventor: Takeshi Uemori