Patents Issued in December 15, 2015
-
Patent number: 9213835Abstract: In one embodiment of the present invention, a secure cryptographic circuit arrangement is provided. The secure cryptographic circuit includes a cryptographic processing block, a spreading sequence generator, and a delay control circuit. The cryptographic processing block has a plurality of signal paths. One or more of the plurality of signal paths includes respective adjustable delay circuits. The spreading sequence generator is configured to output a sequence of pseudo-random numbers. The delay control circuit has an input coupled to an output of the spreading sequence number generator and one or more outputs coupled to respective delay adjustment inputs of the adjustable delay circuits. The delay control circuit is configured to adjust the adjustable delay circuits based on the pseudo-random numbers.Type: GrantFiled: April 7, 2010Date of Patent: December 15, 2015Assignee: XILINX, INC.Inventors: Austin H. Lesea, Stephen M. Trimberger
-
Patent number: 9213836Abstract: In the prior art of computer security by default programs are allowed to do whatever they like to other programs or to their data files or to critical files of the operating system, which is as absurd as letting a guest in a hotel bother other guests as he pleases, steal their property or copy it or destroy it, or have free access to the hotel's management resources. The present concept is based on automatic segregation between programs. This is preferably done by creating automatically an unlimited number of Virtual Environments (VEs) with virtual sharing of resources, so that the programs in each VE think that they are alone on the computer, and (unless explicitly allowed by the user) any changes that they think they made in virtually shared resources are in reality only made in their own VE, while the user preferably has an integrated view of the computer.Type: GrantFiled: October 20, 2004Date of Patent: December 15, 2015Assignee: BARHON MAYER, BATYAInventors: Yaron Mayer, Zak Dechovich
-
Patent number: 9213837Abstract: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.Type: GrantFiled: December 6, 2011Date of Patent: December 15, 2015Assignee: Raytheon Cyber Products, LLCInventors: Matthew Richard, Jesse J. Lee, Monty D. McDougal, Randy S. Jennings, William E. Sterns
-
Patent number: 9213838Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.Type: GrantFiled: August 24, 2012Date of Patent: December 15, 2015Assignee: MCAFEE IRELAND HOLDINGS LIMITEDInventor: Lixin Lu
-
Patent number: 9213839Abstract: An embodiment of the present application provides technologies for detecting malicious content embedded in a content downloaded from an external source. The downloaded content converted into an opcode sequence by a web browser in a computing device. The opcode sequence is compared with a pre-stored opcode signature. The opcode signature comprises multiple sentences, and each sentence has multiple clauses. Each clause may include a matching opcode, a condition, an instruction, and an identifier. When a matching opcode in a clause matches with an opcode of the opcode sequence, and the condition as specified in the clause is determined to be true, the instruction in the clause is taken and next sentence identified by the identifier is taken to match the opcode sequence. Eventually, the last taken clause in the opcode signature may instruct whether opcode sequence contains malicious code.Type: GrantFiled: March 13, 2014Date of Patent: December 15, 2015Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge, Xiaobin Qian, Jian Fu
-
Patent number: 9213840Abstract: Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations.Type: GrantFiled: May 15, 2015Date of Patent: December 15, 2015Assignee: Lynx Software Technologies, Inc.Inventors: Edward T. Mooring, Craig Howard, Phillip Yankovsky
-
Patent number: 9213841Abstract: A method, apparatus, and manufacture for debugging and crash logging is provided. A log file is received, where the log file includes encrypted log messages that indicate execution trace of obfuscated code while leaving code locations of corresponding code in the obfuscated code unknown. The encrypted log messages include execution way-point indices. Next, at least a portion of the log file is then decrypted. A debug log viewer is then employed to view the decrypted log file. The debug log viewer includes an execution way-point manifest that correlates each of the execution way-point indices to a corresponding code location.Type: GrantFiled: July 24, 2012Date of Patent: December 15, 2015Assignee: GOOGLE INC.Inventors: Edward Charles Hiar, Rahul Ricardo Frias, Duncan MacLean
-
Patent number: 9213842Abstract: An apparatus and related method to track data block operations in a cloud system are provided. Attributes associated with the data block operation may be attached to each individual data block targeted by the data block operation.Type: GrantFiled: August 17, 2011Date of Patent: December 15, 2015Assignee: Hewlett Packard Enterprise Development LPInventors: Chun Hui Suen, Peter Jagadpramana, Kok Leong Ryan Ko, Bu Sung Lee
-
Patent number: 9213843Abstract: A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report.Type: GrantFiled: April 15, 2014Date of Patent: December 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Prasad G. Naldurg, Sriram K. Rajamani, Stefan Schwoon, John Lambert
-
Patent number: 9213844Abstract: Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications, however, may be controlled by a supervisor that analysis an output and enforces limitations on content and/or volume based on a level of purchased access.Type: GrantFiled: August 25, 2011Date of Patent: December 15, 2015Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Ezekiel Kruglick
-
Patent number: 9213845Abstract: Described herein are systems and methods for controlling access by a user to content across a plurality of media devices. Access content limits may be set and enforced across the plurality of media devices. A user exceeding the limits may be disallowed from access to the content. The content access limits for a user may be specified by one or more of time, cost, content category, and so forth.Type: GrantFiled: March 8, 2013Date of Patent: December 15, 2015Assignee: Amazon Technologies, Inc.Inventors: Quais Taraki, Parag Kumar Garg
-
Patent number: 9213846Abstract: A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be encoded within specific sectors of the flash storage device. One bits of the identifier may be encoded as unusable ones of the specific sectors and zero bits of the identifier may be encoded as usable one of the specific sectors. Alternatively, the zero bits of the identifier may be encoded as the unusable ones of the specific sectors and the one bits of the identifier may be encoded as the usable ones of the specific sectors. The software application may be permitted to execute on a processing device connected to the flash storage device only when the identifier is encoded within the flash storage device.Type: GrantFiled: May 5, 2013Date of Patent: December 15, 2015Assignee: Microsoft Technology Licensing, LLCInventor: Boris Asipov
-
Patent number: 9213847Abstract: A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text portion, the method including detecting letter-based locations of occurrences of pre-determined single-letter and/or multi-letter pattern(s) within the length-significant portion, the detecting being carried out such that at least some occurrences are detected in a word-boundary independent manner that does not depend on locations of word-word boundaries, for a pattern occurrence letter-position signal which describes letter positions of the occurrences of the patterns within the text portion, computing frequency-dependent absolute or relative magnitudes of signal strength for a plurality of frequencies, the computed magnitudes representing letter-based frequencies of the pattern occurrences within the natural language text portion, and storing the computed signal strength magnitudes at the plurality of frequencies, the generated fingerprint comprisingType: GrantFiled: September 7, 2011Date of Patent: December 15, 2015Assignee: CISCO TECHNOLOGY, INC.Inventors: Eyal Farkash, Naomi Magen, Erez Waisbard, Eliphaz Hibshoosh
-
Patent number: 9213848Abstract: A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.Type: GrantFiled: January 5, 2015Date of Patent: December 15, 2015Assignee: Commvault Systems, Inc.Inventors: Manoj Kumar Vijayan, Ho-chi Chen, Deepak Raghunath Attarde, Hetalkumar N. Joshi
-
Patent number: 9213849Abstract: Embodiments of the present invention provide a method, system and computer program product for hierarchical access control administration preview of access control rights for hierarchically organized content. In an embodiment of the invention, a method for rendering a hierarchical access control administration preview of access control rights for hierarchically organized content can be provided. The method can include rendering a view of hierarchically organized content in connection with corresponding access rights and proposing explicitly assigned access rights for selected content in the hierarchically organized content. The method also can include re-rendering the view to reflect both the proposed explicitly assigned access rights for the selected content and also implicitly resulting assigned access rights for the children of the selected content.Type: GrantFiled: August 28, 2008Date of Patent: December 15, 2015Assignee: International Business Machines CorporationInventors: Trevett B. Chusing, John W. Stephenson, Lei Zhang
-
Patent number: 9213850Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: GrantFiled: October 3, 2013Date of Patent: December 15, 2015Assignee: Citrix Systems, Inc.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Patent number: 9213851Abstract: In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A one-way hash function is performed on the password based on the number of accesses of the count to generate a password hash based on the count. The password hash is stored as the stored password hash.Type: GrantFiled: December 12, 2012Date of Patent: December 15, 2015Assignee: VMware, Inc.Inventor: Uday Kurkure
-
Patent number: 9213852Abstract: In a method for limiting access to a digital item, a count for the digital item is stored, wherein the count is a number of accesses permitted for the digital item. A password for accessing the digital item is received. A plurality of password hashes is generated by utilizing one-way hash functions based on the number of accesses of the count and the password to generate the plurality of password hashes based on the count. The plurality of password hashes is stored in a password hash file.Type: GrantFiled: March 7, 2013Date of Patent: December 15, 2015Assignee: VMware, Inc.Inventor: Uday Kurkure
-
Patent number: 9213853Abstract: User profiles stored on a server control access to private data. Access control to the user profiles themselves is provided without a password. In more detail, the user profile is functionally handicapped by at least a portion of digital data (or a cryptographic key) associated with the user profile being removed and discarded after being sent to an enabling device. A human gesture from the user first provides a key to reconstitute the key or restore the missing data portion in the enabling device which is then transmitted to the server to reconstitute the key or restore the missing data portion in order to reconstitute the user profile for access.Type: GrantFiled: March 9, 2013Date of Patent: December 15, 2015Inventor: Nicolas Leoutsarakos
-
Patent number: 9213854Abstract: There are provided a head-mounted display (HMD) apparatus and a method for accessing encrypted information by the apparatus, in which the head-mounted display apparatus with enhanced security according to an embodiment of the present invention includes a biometric information input unit that receives biometric information of a user; a communication module that transmits or receives information to or from a server; a memory that stores encrypted information; a processor that transmits the biometric information received through the biometric information input unit to a user authentication server through the communication module, receives access privilege information from the user authentication server, and decrypts the encrypted information stored in the memory based on the received access privilege information; and a display unit that displays the decrypted information through the processor.Type: GrantFiled: April 15, 2014Date of Patent: December 15, 2015Inventor: Tae Eon Koo
-
Patent number: 9213855Abstract: A trusted user circle server for encryption key distribution and authentication support, as well as a client-side application which resides on user's devices are disclosed. In particular, the trusted user circle server manages a repository for static public keys (SPUK) which are used for authentication and secure distribution of a dynamic private context key (DPCK) used for the end-to-many encryption. Accordingly, posting users encrypt posted document using the DPCK and viewing users retrieve the DPCK to decrypt the posted document. These keys are associated to the trusted user circle and are generated dynamically for a given circle policy context (CPC). The CPC is an identifier that represents a group of members of a trusted user circle. It changes whenever any member of the trusted user circle leave it, when a new trusted user circle is created or when the DPCK expires after a pre-determined period of time.Type: GrantFiled: June 2, 2014Date of Patent: December 15, 2015Assignee: Narus, Inc.Inventors: Ignacio Bermudez Corrales, Antonio Nucci
-
Patent number: 9213856Abstract: A service request from a user is received to execute an operation on an instance of a business object. Thereafter, an access control check is performed to confirm whether the user is allowed to execute the requested operation on a type of business object corresponding to the business object specified and based on an access group associated with the user. Subsequently, the user is either provided with access to the instance of the business object to execute the operation if the access control check confirms that the user is allowed to execute the operation on the instance of the business object, or prevented from accessing the instance of the business object to execute the operation on the instance of the business object. Related apparatus, systems, techniques and articles are also described. Related apparatus, systems, techniques and articles are also described.Type: GrantFiled: December 18, 2012Date of Patent: December 15, 2015Assignee: SAP SEInventors: Tim Kornmann, Marcel Hermanns, Cristina Buchholz, Michael Hartel, Daniel Zoch
-
Patent number: 9213857Abstract: The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.Type: GrantFiled: April 19, 2013Date of Patent: December 15, 2015Assignee: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini
-
Patent number: 9213858Abstract: Virtual file management is disclosed. Managed content from multiple separate storage domains is organized into a virtual file system that maintains with respect to each of at least a subset of said separate storage domains information of storage domain specific file system primitives to perform primitive operations with respect to content stored in that storage domain. Policies are determined that apply to the managed content. Each policy indicates primitive operations permitted to be performed with respect to the managed content. Information comprising the virtual file system and the policies is provided to a client application on a mobile device. The client application is configured to provide access to the managed content in the virtual file system in a manner at least in part indicated in the policies, including by allowing the permitted primitive operations to be performed using said storage domain specific file system primitives.Type: GrantFiled: September 4, 2014Date of Patent: December 15, 2015Assignee: MOBILE IRON, INC.Inventors: Rahul Sharma, Sanjeev Krishnan, Venkata Sastry Akella, John Drewry
-
Patent number: 9213859Abstract: Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of the remote web-based application are received at a first web browser that is used by the user, wherein at least a portion of the user inputs comprise user-inputted data intended to be stored at the web-based application. The user inputs are transmitted to a management component that is configured to interact with a second web browser that communicates with the web-based application. The management component obfuscates at least a portion of the user-inputted data and forwards the obfuscated and un-obfuscated portions of the user inputs to the second web browser, which correspondingly transmits the obfuscated and un-obfuscated portions of the user inputs to the remote web-based application.Type: GrantFiled: November 20, 2014Date of Patent: December 15, 2015Assignee: VMware, Inc.Inventors: Steven Henry Strassmann, Zachary James Shepherd
-
Patent number: 9213860Abstract: A database for online personal information management comprising: a first account; a first database user id; a second database user id, the second database user id being associated with the first account; a set of data nodes, the nodes being interlinked to form a graph; a data object having an associated node, the associated node being one node in the set of data nodes; an associated account; an object owner; at least one share right object associated with a node, the share right object having a parameter indicating whether the share right object is active when the owner is alive or when the object owner is deceased.Type: GrantFiled: September 6, 2011Date of Patent: December 15, 2015Inventors: James Kenneth Everett, Alexander J Turipe, Jody F. Fameree
-
Patent number: 9213861Abstract: The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users.Type: GrantFiled: May 30, 2013Date of Patent: December 15, 2015Inventors: Gerald R. Black, Alyssa S. Black
-
Patent number: 9213862Abstract: Systems, methods and articles of manufacture for delivering website content to an internet user which is personalized to the user based on a persona associated with the user. A persona database system accesses personal and financial data for the user from any suitable source, such as from a tax return of the user or personal finance management application or even a questionnaire. The persona database system matches the user's data to a persona for the user from a predetermined, discrete set of personas, wherein each persona identifies a generalized profile of personal and financial characteristics of the user. Then, when a user access a website hosted by a website server, the website server accesses the persona for the user from the persona database system and the website server personalizes the website content delivered to the user based on the persona for the user.Type: GrantFiled: March 5, 2014Date of Patent: December 15, 2015Assignee: INTUIT INC.Inventors: Carolyn Spencer, Avanish Pathak, Vijoy Caro, Aliza D. Carpio, Alan Tifford, Ashley K. McMahon, Lisa B. Greene-Lewis
-
Patent number: 9213863Abstract: Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus may include one or more privacy indicators to indicate one or more privacy conditions of the apparatus in association with provision of computer vision on the apparatus. The apparatus may further include a privacy engine coupled with the one or more privacy indicators, and configured to pre-process images from an image source of the apparatus associated with the provision of computer vision to the apparatus, to increase privacy for a user of the apparatus, and to control the one or more privacy indicators. In embodiments, the apparatus may include means for blanking out one or more pixels with depth values identified as greater than a threshold. Other embodiments may be described and claimed.Type: GrantFiled: October 20, 2014Date of Patent: December 15, 2015Assignee: Intel CorporationInventors: David Bar-On, Geoffrey Strongin
-
Patent number: 9213864Abstract: A data processing apparatus includes an auxiliary storage device having target verification data stored therein, a program memory having a validity verification program stored therein, a first RAM (Random Access Memory), a second RAM, and an execution unit configured to execute a validity verification process in accordance with the validity verification program stored in the program memory. The execution unit is configured to copy the target verification data from the auxiliary storage device into the first RAM, execute the validity verification process on the copied target verification data in the first RAM, and use the second RAM as a work area in a case of executing the validity verification process.Type: GrantFiled: October 3, 2012Date of Patent: December 15, 2015Assignee: RICOH COMPANY, LTD.Inventor: Kei Kato
-
Patent number: 9213865Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.Type: GrantFiled: October 3, 2014Date of Patent: December 15, 2015Assignee: Intel CorporationInventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
-
Patent number: 9213866Abstract: A circuit for preventing unauthorized access in an integrated circuit includes a plurality of circuit block and a plurality of protection circuits. Each protection circuit is coupled to an input of a corresponding circuit block of the plurality of circuit blocks. Each protection circuit determines whether an access request to the corresponding circuit block is authorized. The protection circuits could be implemented to monitor system-on-chip interconnections of master and slave circuits, for example. A method of preventing unauthorized access in an integrated circuit could be implemented using the circuit.Type: GrantFiled: April 1, 2014Date of Patent: December 15, 2015Assignee: XILINX, INC.Inventors: Sagheer Ahmad, Ygal Arbel
-
Patent number: 9213867Abstract: A cloud computing service to securely process queries on a database. A security device and method of operation are also disclosed. The security device may be provisioned with a private key of a subscriber to the cloud service and may have processing hardware that uses that key, sequestering the key and encryption processing in hardware that others, including operating personnel of the cloud service, cannot readily access. Processing within the security device may decrypt queries received from the subscriber and may encrypt responses for communication over a public network. The device may perform functions on clear text, thereby limiting the amount of clear text data processed on the cloud platform, while limiting bandwidth consumed in communicating with the subscriber. Such processing may include formatting data, including arguments in a query, in a security protocol used by the cloud platform.Type: GrantFiled: December 7, 2012Date of Patent: December 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ravishankar Ramamurthy, Kenneth H. Eguro, Ramarathnam Venkatesan
-
Patent number: 9213868Abstract: An electronic device comprises a housing defining an inserting slit configured to receive a memory card, a printed circuit board configured to be installed within the housing, a card reader installed in the housing and electrically coupled to the printed circuit board, and an elastic cover coupled to the housing and configured to cover the inserting slit. The card reader is configured to be substantially adjacent to the inserting slit. The elastic cover defines a slot for guiding the memory card to a receiving portion of the card reader. The elastic cover is configured to deform and expose the memory card upon depression, so that the memory card is ejected out of the housing via the slot.Type: GrantFiled: June 20, 2014Date of Patent: December 15, 2015Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Da-Yi Peng
-
Patent number: 9213869Abstract: A magnetic stripe reading device including a magnetic head assembly including a mounting element defining a circumferential anti-tampering enclosure and at least one information reading sensor having output contacts, a protective layer including at least one protective grid and at least one anti-tampering contact array including at least two electrical contacts, at least one resiliently deformable conductive element arranged to selectably provide a galvanic interconnection between the electrical contacts, a closure element fixed to the assembly in a secure orientation to displace the deformable conductive element into galvanic interconnection contact with the electrical contacts, whereby tampering with the closure element causes the deformable conductive element to break the galvanic interconnection contact and a flat cable coupled to the output contacts, to the protective layer and to the electrical contacts and carrying electrical signals useful for providing a tampering alarm indication when the electricalType: GrantFiled: October 4, 2013Date of Patent: December 15, 2015Assignee: VERIFONE, INC.Inventors: Igal Yosef Yanko, John Henry Barrowman, Scott William McKibben
-
Patent number: 9213870Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a reader challenge from a verification authority; determining a reader response based at least on the reader challenge and the reader key; sending a first message including at least the reader response but not the reader key to the verification authority; receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to the verification authority; and receiving an electronically-signed reply from the verification authority. The reader validates the verification authority reply by checking the signature. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: July 25, 2014Date of Patent: December 15, 2015Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper
-
Patent number: 9213871Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a reader challenge from a verification authority; determining a reader response based at least on the reader challenge and the reader key; sending a first message including at least the reader response but not the reader key to the verification authority; receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to the verification authority; and receiving an electronically-signed reply from the verification authority. The reader validates the verification authority reply by checking the signature. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: July 25, 2014Date of Patent: December 15, 2015Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper
-
Patent number: 9213872Abstract: In one or more embodiments described herein, there is provided an apparatus that is configured to determine respective signal strengths of radio frequency identification signalling received from multiple sources by a directional antenna. The apparatus is also configured to discriminate the radio frequency identification signalling from a particular source based on the particular signal strength of the radio frequency identification signalling received from that source.Type: GrantFiled: February 18, 2010Date of Patent: December 15, 2015Assignee: Nokia Technologies OyInventors: Timo Petteri Karttaavi, Ilkka Hermanni Hakala
-
Patent number: 9213873Abstract: Determining movement of a Radio Frequency Identification (RFID) tag first establishes a phase difference/frequency model comprising a set of phase-wrapped local rates-of-change and an intercept point. RFID tag readings are then made to measure phase differences between the interrogation signal and the tag response at different frequencies. A correlation is determined between the measured phase differences versus frequency and the phase-wrapped local phase rates-of-change of the phase difference/frequency model. If the correlation is better than or equal to a predetermined limit, the tag is stationary, or if the correlation is worse than the predetermined limit, the tag is moving.Type: GrantFiled: March 22, 2013Date of Patent: December 15, 2015Assignee: Symbol Technologies, LLCInventor: Timothy B. Austin
-
Patent number: 9213874Abstract: In combination, an RFID antenna array, an RFID tag reader, and a power supply, the foregoing components being adapted to be worn or otherwise borne by a person and be operatively connected so that the power supply powers the reader and the reader energizes the antenna array and receives RFID tag signals through the antenna array while the person passes through an area as the person's hands and arms are unencumbered by said components.Type: GrantFiled: July 6, 2012Date of Patent: December 15, 2015Assignees: DJB GROUP LLC, WISTRON NEWEB CORPORATIONInventor: Walter D. Burnside
-
Patent number: 9213875Abstract: This invention overcomes the disadvantages of the prior art by providing a system and method for reading symbology, and more typically linear barcodes (“symbols”) that employs trained attributes that remain invariant between scans of different barcodes during runtime to tune various aspects of the procedure for locating and decoding such barcodes. The procedure relies upon a training step in which one or more exemplary barcodes are decoded and the invariant attributes for such barcodes, including, but not limited to, size, shape, relative angle in the image field of view and resolution are stored. The runtime decoding procedure then employs these attributes to constrain the search for subsequent, scanned barcodes and then decode it according to a plurality of tuned steps.Type: GrantFiled: July 18, 2006Date of Patent: December 15, 2015Assignee: COGNEX CORPORATIONInventors: Sateesha Nadabar, Ivan Bachelder
-
Patent number: 9213876Abstract: In a barcode reader, a sensor controller sets time of one frame of a line image sensor based on output time necessary for data output of one frame from the line image sensor and lighting time of an LED. A light source controller performs first lighting control to turn on the LED only for the lighting time after termination of the data output within the time of one frame, and second lighting control to turn on the LED only for the lighting time so as to include the entire period of the data output within the time of one frame.Type: GrantFiled: October 9, 2014Date of Patent: December 15, 2015Assignee: Optoelectronics CO., Ltd.Inventors: Masaki Kurokawa, Depei Ji, Zhihui Duan
-
Patent number: 9213877Abstract: A barcode reader for providing decoded data to a remote computing system includes a communication interface, non-volatile memory comprising first executable code, volatile memory, and a processor. The processor executes the first executable code to utilize the communication interface to obtain second executable code from a remote configuration server. The processor also loads the second executable code directly to the volatile memory and executes the second executable code to commence operation of the barcode reader.Type: GrantFiled: June 27, 2014Date of Patent: December 15, 2015Assignee: The Code CorporationInventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
-
Patent number: 9213878Abstract: A barcode reader for decoding and manipulating data from a barcode and providing the decoded and manipulated data to a remote computing system includes barcode reading hardware, including an image sensor which captures an image of a barcode within a field of view. The barcode reader also includes a processor executing executable code which generates decoded data representative of data encoded in the barcode, formats the decoded data, and sends the formatted decoded data to the remote computing system only when the processor executes formatting and routing instructions which the barcode reader obtains from a remote configuration server upon power up of the barcode reader.Type: GrantFiled: June 27, 2014Date of Patent: December 15, 2015Assignee: The Code CorporationInventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
-
Patent number: 9213879Abstract: A barcode reader for decoding data from a barcode includes barcode reading hardware, including an image sensor which captures an image of a barcode within a field of view. The barcode reader also includes a processor. The processor executes embedded firmware to operate the barcode reading hardware. The processor also generates decoded data representative of data encoded in the barcode by executing supplemental operating instructions which the barcode reader obtains from a remote configuration server upon power up of the barcode reader. The supplemental operating instructions are distinct from the embedded firmware and include instructions which, when executed by the processor, enable the barcode reader to output the decoded data from the barcode within the field of view.Type: GrantFiled: June 27, 2014Date of Patent: December 15, 2015Assignee: The Code CorporationInventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
-
Patent number: 9213880Abstract: A method includes the following: (1) projecting a light pattern towards a target object; (2) detecting light returned from the target object through an imaging lens arrangement with an imaging sensor to capture at least a first slit-frame-image and a second slit-frame-image; (3) determining an optimized position of the imaging lens arrangement; (4) detecting light returned from the target object with the imaging sensor to capture an image of a barcode when the imaging lens arrangement is maintained at the optimized position; and (5) processing the image of the barcode to decode the barcode. In the method, determining the optimized position includes processing at least the first slit-frame-image and the second slit-frame-image.Type: GrantFiled: November 26, 2013Date of Patent: December 15, 2015Assignee: Symbol Technologies, LLCInventors: William C Sackett, Christopher W Brock, David P Goren
-
Patent number: 9213881Abstract: A barcode reader may include one or more advancements in the manner in which its software and/or firmware are updated and/or installed. The barcode reader may have an image sensor that captures an image of a barcode, a communication interface, volatile memory, non-volatile memory, and a processor. The barcode reader may receive executable code, selected from multiple versions, from a configuration server remote from the barcode reader. The executable code may be loaded directly into the volatile memory, without first being loaded into the non-volatile memory. The executable code may be loaded at a location in the volatile memory that begins at a start address stored in the non-volatile memory or in a header of the executable code. The barcode reader may execute the executable code to commence operation of the barcode reader directly after the executable code has been loaded into the volatile memory.Type: GrantFiled: June 13, 2014Date of Patent: December 15, 2015Assignee: The Code CorporationInventors: Mark Ashby, George Powell, Ryan Hoobler, Ming Lei, Steve Pierce
-
Patent number: 9213882Abstract: A method of extracting data from an identifiable monochromatic pattern. The method comprises separating a polychromatic optical signal, received from an object having identifiable monochromatic pattern, into a plurality of wavelength components, separately capturing each of the wavelength components, reconstructing a plurality of images each from a different wavelength component, detecting the identifiable monochromatic pattern in one or more of the images, and extracting data associated with or encoded by the detected identifiable monochromatic pattern. The images have different depths of field.Type: GrantFiled: January 20, 2014Date of Patent: December 15, 2015Assignee: Ramot at Tel-Aviv University Ltd.Inventors: Benjamin Milgrom, Emanuel Marom, Naim Konforti, Michael Golub
-
Patent number: 9213883Abstract: An apparatus and method for processing a depth image. A depth image may be generated with reduced noise and motion blur, using depth images generated during different integration times that are generated based on the noise and motion blur of the depth image.Type: GrantFiled: January 9, 2013Date of Patent: December 15, 2015Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sunkwon Kim, Ouk Choi, Seungkyu Lee
-
Patent number: 9213884Abstract: An image processing apparatus includes an attention area detection unit, a luminance parallax conversion unit, and a parallax estimation unit. The attention area detection unit is configured to detect an attention area including a desired subject from a standard image. The luminance parallax conversion unit is configured to perform a luminance parallax conversion with respect to the attention area on the basis of a luminance parallax conversion characteristic estimated by using a past frame. The parallax estimation unit is configured to perform parallax estimation on the basis of the standard image and a reference image, a viewpoint position of which is different from that of the standard image, and perform, in the attention area, the parallax estimation by using a luminance parallax conversion result obtained by the luminance parallax conversion unit.Type: GrantFiled: March 21, 2014Date of Patent: December 15, 2015Assignee: Sony CorporationInventor: Takeshi Uemori