53rd week of 2009 patent applcation highlights part 38 |
Patent application number | Title | Published |
20090323877 | Data receiving apparatus and data receiving method - In a data receiving apparatus, a measuring section measures a first pulse width of a first pulse, a second pulse width of a second pulse and a third pulse width of a third pulse, during each of which a first signal level of a reception signal is continuous. The first pulse, the second pulse, and the third pulse are sequentially and continuously received by putting a portion of a second signal level different from the first signal level between the first and second pulse and the second and third pulse. A first comparing section performs a first determination based on a measured value of the first pulse width and a measured value of the second pulse width, and the first determination is that the first pulse indicates a start of the reception signal and the second pulse indicates a synchronization signal. A second comparing section performs a second determination based on the measured value of the first pulse width and the measured value of the second pulse width, and the second determination is that the second pulse and the third pulse indicate the synchronization signal. A control section determines the second pulse as a head of the synchronization signal, based on the first determination of the first comparing section and the second determination of the second comparing section. | 2009-12-31 |
20090323878 | Communication appartus - A communication apparatus which includes a clock generation circuit outputting a plurality of clocks, each of said plurality of clocks having a different phase from each other; a synchronization detection block receiving a sync word and a payload having a predetermined length after receiving said payload, sampling said sync word by using each of said plurality of clocks and to output a first signal indicating a clock or clocks capable of sampling said sync word successfully, said synchronization detection block being capable of sampling said payload by using a clock or clocks inputted thereinto; a clock phase selection block coupled to said synchronization detection block to-receive said first signal to select one of said plurality of clocks in accordance with said first signal and to output a second signal indicating a selected clock; and a clock gate unit coupled between said clock generation circuit and said synchronization detection block and coupled to said clock phase selection block to receive each of said plurality of clocks and said second signal to output said selected one of said plurality of clocks to said synchronization detection block and not to output a rest of said plurality of said clocks based on said second signal during a period corresponding to said predetermined length of said payload. | 2009-12-31 |
20090323879 | DATA ALIGNMENT AND DE-SKEW SYSTEM AND METHOD FOR DOUBLE DATA RATE INPUT DATA STREAM - Methods and apparatus are provided for a system for aligning data. The apparatus comprises a demultiplexing component adapted to bifurcate a double data rate (DDR) data stream into a first single data rate (SDR) data stream and a second SDR data stream, a bit detection component coupled to the demultiplexing component and adapted to compare bit values between the first and second SDR data streams and generate a first signal in response to detection of a predetermined arrangement of bits, a delay component adapted to receive the DDR data stream and perform a delay operation on the DDR data stream to create a delayed data stream, and a data alignment component coupled to the demultiplexing component, the delay component, and to the bit detection component, the data alignment component being adapted to place the delayed data stream in alignment in response to the first signal. | 2009-12-31 |
20090323880 | SYNCHRONIZATION OF REAL TIME DATA WITHIN DETERMINISTIC CLOCK EDGE - Techniques are disclosed for reducing clock slip in a system where real time data is transmitted over a wireless network. A wireless frame synchronization signal can be received from a remote device. The synchronization signal can be used to reset the clock that drives the wireless transmission of data, the clock that drives the analog to digital converter and/or a clock that drives a digital to analog converter. | 2009-12-31 |
20090323881 | Reactor geometry and dry confinement for a nuclear reactor enabling the racquetball effect of neutron conservation dry confinement to be supported by the four-factor and six-factor formula - A nuclear-powered plant of a portable type with a confinement section where the reaction takes place in a core having a reactive thorium/uranium-233 composition, and where an external neutron source is used as a modulated neutron multiplier for the reactor core output. The core is housed in a containment structure that radiates thermal energy captured in a multiple-paths heat exchanger. The exchanger heat energy output is put to use in a conventional gas-to-water heat exchanger to produce commercial quality steam. | 2009-12-31 |
20090323882 | Method for providing a dry environment for underwater repair of the reactor bottom head using a segmented caisson - Welding repairs are performed in an underwater environment adjacent the bottom head of the nuclear reactor vessel. To provide a dry welding environment, segments of a lower caisson are passed through the core plate holes and assembled along the interior surface of the bottom head. The assembled segments are held down by brackets and sealed to one another and to the bottom head by a water curable polymer. An upper caisson is passed through the core plate hole to sealingly engage the lower caisson. The caissons are pumped dry and welding equipment is passed through the caissons to effect weld repairs about the stub tube or along the bottom head cladding. | 2009-12-31 |
20090323883 | Method For Carrying Out Reactor Internal - A method for carrying out a reactor internal, comprising steps of:
| 2009-12-31 |
20090323884 | CONTAINMENT VESSEL AND NUCLEAR POWER PLANT THEREWITH - A containment vessel for containing a reactor pressure vessel and steam generators has a main containment vessel, a diaphragm, a pressure suppression chamber, LOCA vent pipes. The reactor pressure vessel contains a reactor core of a pressurized water reactor. The diaphragm partitions the main containment vessel into an upper vessel and a lower vessel. The pressure suppression chamber has a suppression pool to store water and gas phase of the pressure suppression chamber communicates with the upper vessel. The LOCA vent pipes connect the pressure suppression chamber to the lower vessel. All of the equipments and piping that constitute the reactor pressure boundary, including the reactor pressure vessel, the steam generators, a cold leg pipe and a hot leg pipe, are contained in the lower vessel. | 2009-12-31 |
20090323885 | Devices, Systems, and Methods Comprising Graphite Having an Enhanced Neutron Diffusion Coefficient for Enhancing Power Reactor Performance - The present invention relates to the field of energy generation. More particularly, the present invention relates to devices, systems, and methods for use in generating energy with graphite-moderated nuclear reactors. Embodiments of the invention include devices, systems, and methods for use in generating power that use graphite having a neutron diffusion coefficient higher than that of Acheson graphite. Specifically included embodiments comprise providing artificial graphite manufactured under high pressure during the graphitization process to cause a larger neutron diffusion coefficient than graphite not produced under pressure (Acheson graphite). Suitable graphite according to the invention includes graphite prepared under high pressure during the graphitization phase of the manufacturing process, which produces graphite with an increased diffusion coefficient by reducing the microcrystal diffraction scattering and increasing the non-diffractive (inelastic) scattering of the graphite. | 2009-12-31 |
20090323886 | Methods and apparatuses for removal and transport of thermal energy - Methods and apparatuses are provided for the removal and transportation of thermal energy from a heat source to a distant complex for use in thermochemical cycles or other processes. In one embodiment, an apparatus includes a hybrid heat pipes/thermosyphon intermediate heat exchanger (HPTIHX) system that is divided into three distinct sections, namely: an evaporation chamber, a condensation chamber, and a working fluid transport section of liquid and vapor counter-current flows. | 2009-12-31 |
20090323887 | NUCLEAR CORE COMPONENT HOLD-DOWN ASSEMBLY - A plate mounted fuel assembly hold-down system that provides a defined channel for both the insertion and removal of reactor head mounted, fixed in-core detector instrumentation, provides a guided path for the fixed in-core detector during insertion, and shields the instrument shroud against coolant cross flow. The hold-down assembly includes a base plate that seats on the adapter plate of the fuel assembly and has openings that align with the control rod guide thimbles. A hollow sleeve extends through and below a central opening in the base plate to mate with the fuel assembly instrument thimble. The sleeve extends above the base plate and through and above an upper core plate of the reactor. A hold-down bar is slidably mounted on the sleeve and is restrained below the top of the sleeve. A spring is positioned around the sleeve and is captured between the hold-down bar and the base plate. | 2009-12-31 |
20090323888 | STEP COUNT MEASURING SYSTEM - A step count measuring system includes a pedometer and a step count managing apparatus which are able to communicate, with each other. In the pedometer, a step count value sequentially detected for each unit of time is stored, and a time counted in the pedometer is stored as first time data by being brought into associated with each of the step count values. When a battery is replaced in the pedometer, a reset is executed to start initialization processing, and the time stored as first time data is stored as second time data which can be discriminated from the first time data. A recording time of each of the step count values being associated with the first time data before the initialization processing is set on the basis of the time counted by the step count managing apparatus, and a recording time of each of the step count values being associated with the second time data after the initialization processing is set on the basis of the second time data. | 2009-12-31 |
20090323889 | XRD-BASED FALSE ALARM RESOLUTION IN MEGAVOLTAGE COMPUTED TOMOGRAPHY SYSTEMS - System and method for XRD-based false alarm resolution in computed tomography (“CT”) threat detection systems. Following a scan of an object with a megavoltage CT-based threat detection system, a suspicious area in the object is identified. The three dimensional position of the suspicious area is used to determine a ray path for the XRD-based threat detection system that provides minimal X-ray attenuation. The object is then positioned for XRD scanning of the suspicious area along this determined ray path. The XRD-based threat detection system is configured to detect high density metals (“HDMs) as well as shielded Special Nuclear Materials (“SNMs”) based on cubic or non-cubic diffraction profiles. | 2009-12-31 |
20090323890 | X-RAY TOMOGRAPHY APPARATUS - Fins are arranged on the rotating side of an X-ray computed tomography apparatus. The fins are rotated to generate airflow as the rotating side is rotated. This airflow serves to discharge wear debris to the outside of the X-ray CT apparatus, thereby preventing the wear debris from scattering toward an X-ray tube and support bearing. In consequence, in the X-ray CT apparatus provided with a slip ring, the wear debris produced in a contact space between the slip ring and a brush can be prevented from being scattered in the apparatus. | 2009-12-31 |
20090323891 | Method And Apparatus For Simplified Patient Positioning In Dental Tomographic X-Ray Imaging - An apparatus and a method is proposed which allow for a simplified patient positioning based on the selection of a region of interest for the tomographic image of the dentition of a patient. The region of interest is selected on a previously acquired panoramic image of the dentition of the patient. | 2009-12-31 |
20090323892 | Breast Tomosynthesis System With Shifting Face Shield - Breast imaging using any one of a mammography system, a tomosynthesis system, or a fused system that selectively takes either or both of mammography images and tomosynthesis images, further uses a patient shield that moves closer to and further away from the patient's chest and head, between (1) an access position that facilitates the technologist's access to adjust the patient's breast while the breast is being compressed and (b) a protective position in which the shield helps protect the patient from collision with moving components and from x-ray exposure of tissue other than the tissue that is to be imaged. | 2009-12-31 |
20090323893 | MAMMOGRAPHY SYSTEM AND OPERATING METHOD - A mammography system has an x-ray source, a detector and a compression plate arranged in the beam path between the source and the detector. The x-ray source, the detector and the compression plate are mounted on a vertical column such that they respectively pivot around separate pivot axes. The three pivot axes are spaced apart from one another and oriented substantially parallel to one another and substantially perpendicular to a surface normal of the detector. The x-ray source and the compression plate are held on the vertical column such that they can be displaced in a plane oriented approximately vertical to their pivot axes. The mammography system is operable to obtain two sets of tomosynthesis data respectively with different tube-to-detector distances. | 2009-12-31 |
20090323894 | DEVICE AND METHOD FOR REAL-TIME MARK OF SUBSTANCE IDENTIFICATION SYSTEM - Disclosed are a method and a device for real-time mark for a high-energy X-ray dual-energy imaging container inspection system in the radiation imaging field. The method comprises the steps of emitting a first main beam of rays and a first auxiliary beam of rays having a first energy, and a second main beam of rays and a second auxiliary beam of rays having a second energy; causing the first and second main beams of rays transmitting through the article to be inspected; causing the first and second auxiliary beams of rays transmitting through at least one real-time mark material block; collecting values of the first and second main beams of rays that have transmitted through the article to be inspected as dual-energy data; collecting values of the first and second auxiliary beams of rays that have transmitted through the real-time mark material block as adjustment parameters; adjusting the set of classification parameters based on the adjustment parameters; and identifying the substance according to the dual-energy data based on adjusted classification parameters. The method according to the invention simplifies the mark procedure for a substance identification subsystem in a high-energy dual-energy system while improves the stability of the material differentiation result of the system. | 2009-12-31 |
20090323895 | Method and Apparatus for Treating Workpieces - An electron beam is used to generate x-ray radiation in a workpiece, which radiation emerges on the workpiece back at sufficiently thin points of the workpiece and is detected by means of an x-ray radiation detector. Based on the x-ray radiation intensity and the momentary beaming-in position of the electron beam, the surface structure on both sides as well as the local material thickness can be determined. Based on such values, workpieces and/or workpiece treating systems can be adjusted, and vertical material removal in a material-removing workpiece treating system can be controlled. | 2009-12-31 |
20090323896 | Energy subtraction processing apparatus, method, and radiation image diagnosis system - In energy subtraction processing, grid information representing grid use conditions at the time of imaging operations for a plurality of radiation images of an object is acquired. Weight factors are adjusted in accordance with the grid information, which has been acquired. A weighted addition or subtraction process is performed on corresponding pixels in the plurality of the radiation images of the object by use of the weight factors, which have thus been adjusted. A constituent image representing a predetermined constituent in the object is thus formed. | 2009-12-31 |
20090323897 | RADIATION IMAGING APPARATUS, ITS CONTROL METHOD, AND RADIATION IMAGING SYSTEM - A radiation imaging apparatus having high frame rate and picture quality by offset correction has: a sensor array having matrix-shaped pixels each including a converting element and a TFT; a driver for supplying signals to control terminals of the TFTs row by row; a reader for holding a signal into a first or second sampling/holding (S/H) circuit and outputting an image signal; and a controller for controlling the driver and reader. Until the image signal is output after the irradiation of pulsating radiation, the TFT of a pixel is driven so as to output a first signal, the TFT of the pixel to which the first signal has been output is driven so as to output a second electric signal, and the reader outputs the image signal of the signal showing a difference between the first and second signals held in the first and second S/H circuits. | 2009-12-31 |
20090323898 | THERMIONIC EMITTER DESIGNED TO CONTROL ELECTRON BEAM CURRENT PROFILE IN TWO DIMENSIONS - An electron emitter assembly for use in an x-ray emitting device or other electron emitter-containing device is disclosed. In one embodiment, an x-ray tube is disclosed, including a vacuum enclosure that houses both an anode having a target surface, and a cathode positioned with respect to the anode. The cathode includes an electron emitter assembly for emitting a beam of electrons during tube operation. The electron emitter assembly comprises a refractory metal foil with a plurality of shaped rung structures for emitting an electron beam that maximizes flux while simultaneously focusing the electron beam in two dimensions. Focusing occurs primarily through an electrical field shaped by the electron emitter assembly and through balancing current density, electrical resistance, and heat loss through thermal conduction to control the regions that emit electrons. Furthermore, the refractory metal foil can be configured with a modified work function for preferential electron emission. | 2009-12-31 |
20090323899 | GRID FOR SELECTIVE ABSORPTION OF ELECTROMAGNETIC RADIATION AND METHOD FOR ITS MANUFACTURE | 2009-12-31 |
20090323900 | RADIATION PHOTOGRAPHING APPARATUS - A radiation photographing apparatus includes: a housing in which an opening portion for allowing ventilation of the inside of the housing with ambient air is formed at a side surface of the housing; a covering member provided at the side surface of the housing, that is made of an elastic material which absorbs impact acting from the outside of the housing, and covers the opening portion; and an opening and closing mechanism that opens and closes the covering member with respect to the opening portion is provided so deterioration of constituent components caused by external impact and heat is suppressed with a small number of components. | 2009-12-31 |
20090323901 | TEST SYSTEMS AND METHODS FOR EXTENDED OFF-HOOK CONDITIONS ON A SUBSCRIBER LINE - Test systems and methods are disclosed for determining the cause of an extended off-hook condition on a subscriber line. A test system as described herein measures a first resistance of the subscriber line based on a first current, and also measures a second resistance of the subscriber line based on a second current. The test system then determines the difference between the first and second resistance measurements. If the difference between the first and second resistance measurements is greater than a threshold value, such as 20 Ohms or more, then the test system determines that the extended off-hook condition is the result of an off-hook telephone on the subscriber line. If the difference is less than the threshold value, then the test system determines that the extended off-hook condition is the result of a short circuit on the subscriber line. | 2009-12-31 |
20090323902 | SYSTEMS AND METHODS FOR CHARACTERIZING LOOPS BASED ON SINGLE-ENDED LINE TESTING (SELT) - Systems and methods for characterizing loops based on single-ended line test (SELT) are described. One embodiment includes a method for determining whether a straight-loop departure condition exists on a loop under test. In accordance with such embodiments, the method comprises receiving an un-calibrated echo signal for the loop under test using frequency domain reflectometry single-ended line testing (FDR-SELT), a region associated with the loop under test, a platform type, and a length of the loop under test. Based on the region, platform type, and loop length, the method further comprises determining whether the loop is not a straight loop, wherein determining whether the loop is not a straight loop comprises determining whether at least one differentiating feature is present in the un-calibrated echo signal. Another embodiment includes a method for determining a loop gauge for a loop under test. The method comprises receiving an un-calibrated echo signal for the loop under test using frequency domain reflectometry single-ended line testing (FDR-SELT), a region associated with the loop under test, a platform type, and a length of the loop under test. Based on the region, platform type, and loop length, the method further comprises analyzing characteristics relating to local maxima and local minima of the un-calibrated echo signal to determine the loop gauge. | 2009-12-31 |
20090323903 | METHOD AND APPARATUS FOR ANALYZING AND MITIGATING NOISE IN A DIGITAL SUBSCRIBER LINE - Data indicative of a level of stability of a DSL link is received. Based on the received data, it is determined whether the data indicates a level of stability of the DSL link that is above or below a minimum threshold. If the level of stability of the DSL link is below the minimum threshold, die noise associated with the DSL link before the time of failure is compared with the noise associated with the DSL link after the time of failure. If the difference between the noise before and after the time of failure exceeds a threshold, then the difference in noise is characterized as a stationary noise associated with the DSL link. However, if the difference between the noise before and after the time of failure is below the threshold, a determination is made whether the failure is associated with a loss of power to the DSL link or a severe impulse noise event—the difference in noise is characterized accordingly. Finally, the characterization of the noise associated with the DSL link is preserved for subsequent possible reconfiguration of the DSL link to improve link stability. | 2009-12-31 |
20090323904 | METHOD AND APPARATUS FOR COMMUNICATION BETWEEN A SECURITY SYSTEM AND A MONITORING CENTER - A method for providing communications between a system control panel at a premises and a central monitoring center comprises transmitting an event code from the control panel to the monitoring center utilizing a first communications format and a network protocol, and causing the control panel to enter a call-back mode. The control panel is enabled to receive in-bound calls utilizing a second communications format. A two-way voice session is established utilizing the second communications format between the monitoring center and the control panel. The two-way voice session is initiated by the monitoring center. | 2009-12-31 |
20090323905 | SYSTEM AND METHOD FOR DIFFERENTIATING BETWEEN INCOMING AND OUTGOING MESSAGES AND IDENTIFYING CORRESPONDENTS IN A TTY COMMUNICATION - A method and system are provided that examine incoming and outgoing TTY transmissions to determine an identifier for distinguishing between correspondents in a TTY call. The system may utilize contact information associated with an incoming or outgoing call to provide visual distinctions, and/or flow control, to the text from each party as it is displayed on a TTY device. | 2009-12-31 |
20090323906 | SECURE VOICE TRANSACTION METHOD AND SYSTEM - A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user. | 2009-12-31 |
20090323907 | System and Method for Implementing Do-Not-Disturb During Playback of Media Content - A system and method for implementing do-not-disturb during media content. Do-not-disturb is implemented during playback of the media content in response to a selection of media content. An incoming communication is received. The incoming communications is sent directly to voice mail during the playback. | 2009-12-31 |
20090323908 | SYSTEM AND METHOD FOR RECORDING AN AUDIO TO-DO LIST AND ADDING TO-DO LIST ITEMS TO A CALENDAR APPLICATION - An embodiment of a method for recording a to-do list includes receiving an incoming call by a first communication device from a caller using a second communication device. In at least one embodiment, the first communication device is located at a customer premise location. The method further includes prompting the caller to record an audio to-do list, recording an audio to-do list from the caller, and converting the audio to-do list into a text to-do list. The method further includes converting the text to-do list into at least one to-do list item, and sending the at least one to-do list item to a computing device to be utilized by an application. In at least one embodiment, the method further includes adding the at least one to-do list item to a software calendar application associated with the computing device. | 2009-12-31 |
20090323909 | Technique for communicating concierge-type information to users of an information assistance service - Telephone users desiring concierge-type services may connect via standard telephone procedures to a directory assistance provider, such as an operator or voice server. For example, the users may communicate to the provider a concierge-type service request for making a restaurant reservation. The provider may process the request in real time through an on-line reservation system (ORS) or off-line. In processing the request off-line, a pool of fulfillment agents may engage in such action as necessary to fulfill the request. Information concerning fulfillment of the request, e.g., a reservation confirmation, may be provided to a user offline, even sometimes in the case of real time request processing. Such information may be recorded in the form of a voice mail, transmitted through a virtual network to a voice mail system, which may be maintained by the telephone carrier to which the user subscribes. The user in a conventional manner is prompted by the voice mail system to access the voice mail to learn the recorded information. | 2009-12-31 |
20090323910 | AUTOMATED RESPONSE SYSTEM TUNING - A system and method for creating, storing, and retrieving data associated with initiated communications to a vendor are disclosed. An exemplary system includes a response server in communication with a database that provides a platform for storage and retrieval of records created by the response server. The response server is configured to provide a series of menus including a group of selections during the initiated communications to the vendor and receive inputs in response to the menus. The response server is further configured to create a record for each initiated communication as the initiated communication is occurring, and to create a report including at least a portion of the data from each record. The portions of data taken from each record each describe a characteristic of at least one of the inputs for the initiated communication associated with each respective record. | 2009-12-31 |
20090323911 | Method And System For Telephone Message Management - A system for managing telephone messages played by a telephone includes an integrated telephone answering device configured to playback a plurality of outgoing messages. The system further includes a first memory section to store a default outgoing message and a second memory section to store one or more custom outgoing messages. The system further includes a handset operable to send outgoing messages for storage in the base unit and to send information related to outgoing messages for storage in a database of the base unit, the information including an outgoing message identifier associated with each outgoing message and a list of calling numbers associated with each outgoing message identifier. The system further includes a processor operable to receive an indication of a playback outgoing message request, to determine a calling party number associated with the outgoing message identifier, to retrieve an outgoing message identifier associated with the calling party number, and to send a signal to the integrated telephone answering device to playback an outgoing message associated with the outgoing message identifier. | 2009-12-31 |
20090323912 | SYSTEM AND METHOD FOR PROVIDING INFORMATION TO A USER OF A TELEPHONE ABOUT ANOTHER PARTY ON A TELEPHONE CALL - A system and method for displaying information to a user of a telephone during a telephone call may include requesting information from a plurality of applications in response to receiving data indicative of a telecommunications device during a telephone call. The information may include information associated with a second user of the telecommunications device. The information received from the applications may be displayed for the first user to view during the telephone call. | 2009-12-31 |
20090323913 | HOME APPLIANCE AND HOME APPLIANCE SYSTEM - A home appliance and a home appliance system are provided which control a sound output from an output device upon receipt of an external command signal of ON or OFF. Further, the home appliance and home appliance system control a sequence of output of an acoustic signal output from a conversion device. Accordingly, it may be possible to notify a user of the outputting of the acoustic signal by controlling the sequence of output of the acoustic signal, thereby increasing user convenience. | 2009-12-31 |
20090323914 | HOME APPLIANCE AND HOME APPLIANCE SYSTEM - A home appliance and a home appliance system are disclosed. Product information and status information of the home appliance are converted into at least one transmission acoustic signal, and a sound corresponding to the at least one transmission acoustic signal is output to the outside. The product information and status information are formed as a digital signal and stored in a storage device. The digital signal is encoded through a conversion device, and converted into at least one transmission acoustic signal. The at least one transmission acoustic signal is formed as an analog signal. Meanwhile, the at least one transmission acoustic signal can be dividedly formed. | 2009-12-31 |
20090323915 | COMMUNICATION EQUIPMENT - In communication equipment capable of permitting a user to simply grasp how long period of time has passed from the time at which the user made a communication with a contact address registered to an address book when the user transmits an outgoing call to and receives an incoming mail from or transmits a mail to and receives a mail from the contact address, the communication equipment has a storage unit for storing an outgoing/incoming call history or a mail transmission/reception history to a predetermined communication opponent, and a notification unit, which calculates, when an outgoing call is transmitted and an incoming call is received or a mail is transmitted and a mail is received and a history of the communication opponent is stored by the storage unit, the periods of time passed from the times at which a previous outgoing call was transmitted and a previous incoming call was received or a previous mail was transmitted and a previous mail was received based on the stored history of the outgoing and incoming calls or the stored history of the transmitted mail and the received mail and notify the passed periods of time. | 2009-12-31 |
20090323916 | NOTIFICATION TO ABSENT TELECONFERENCE INVITEES - A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and attendance of the teleconference meeting, determining from the indication whether to issue a notification to an absent invitee of the teleconference meeting, and selectively issuing the notification to the absent invitee. | 2009-12-31 |
20090323917 | METHOD FOR RETRIEVING INFORMATION FROM A TELEPHONE TERMINAL VIA A COMMUNICATION SERVER, AND ASSOCIATED COMMUNICATION SERVER - The invention pertains to a method for retrieving at least one piece of information regarding a telephone communication between at least two telephone terminals ( | 2009-12-31 |
20090323918 | SYSTEM AND METHOD FOR PROVIDING CUSTOM ALERTS - A system and method for providing custom alerts including a processor configured to retrieve a custom alert from a custom alert provider, a receiver configured to receive, from a user, a request to initiate communication with a communications agent, and a transmitter configured to transmit one or more signals over a network to communicate with the communications agent, wherein transmitting the one or more signals includes transmitting the custom alert for output at the communication agent. | 2009-12-31 |
20090323919 | SYSTEM AND METHOD FOR PROVIDING ADVANCED CALL FORWARDING FUNCTIONALITY - A system and method for providing call forwarding. Telephone information of one or more telephones assigned to a user may be stored, where the telephone information may include location coordinates (e.g., GPS coordinates). Telephone information, including location coordinates, of one or more telephones assigned to an organization of which the user is associated may be stored. The organization may be an employer of the user, for example. If call forwarding is enabled by the user, then a call to a wireless device of the user may cause a determination as to whether the wireless device is within a predetermined range of a telephone assigned to either the user or organization may be made. A distinctive ring may be generated to notify the user that a call forwarding call is being received. | 2009-12-31 |
20090323920 | SYSTEM AND METHODS TO ROUTE CALLS OVER A VOICE AND DATA NETWORK - Systems and methods to route a call over a voice and data network (VDN) are provided. A particular method includes receiving a call from a calling device at a telecommunications gateway (TCG). Authentication data is received via the call. A determination is made whether a user account associated with the authentication data is authorized to route calls via the TCG to a VDN. When the user account is authorized to route calls via the TCG to the VDN, call data received at the TCG via the call is converted into a format compatible with the VDN. The converted call data is sent via the VDN to a destination device. | 2009-12-31 |
20090323921 | PROBABILITY MULTIPLIER PROCESS FOR CALL CENTER ROUTING - Systems and processes are disclosed for routing callers to agents in a contact center based on similar probabilities for an outcome variable. An exemplary probability multiplier process includes determining agent performance of a set of agents for an outcome variable (e.g., sales) and determining caller propensity of a set of callers for the outcome variable (e.g., the propensity or statistical chance of purchasing). Callers and agents are matched based on corresponding agent performance and propensity for the outcome variable of the caller, e.g., matching callers and agents having similar relative performance for the outcome variable, such as matching the highest ranked caller to the highest ranked agent, the worst ranked caller to the worst ranked agent, and so on. The performance and propensity of the callers and agents may be converted to percentile rankings, and callers and agents can be matched based on a closest match of percentile rankings. | 2009-12-31 |
20090323922 | METHOD FOR PROVIDING CALL SERVICES BY CALL CENTER, CALL SERVICE SYSTEM AND SERVER THEREOF - A method for providing call services by a call center, a call service system, and a server thereof are provided. The method includes: receiving user calls from users; determining a corresponding service sequence of each of the users in a call service queue according to a time sequence of the users calls from the users; collecting information of the users when the users are waiting for call services in the call service queue; and providing, according to the corresponding service sequence of the user in the call service queue, the call service to the user if it is the user's turn to accept the call service. Thus, the waiting time of the users is shortened, and the satisfaction degree is enhanced. | 2009-12-31 |
20090323923 | CONTROLLER USING DUAL-TONE MULTI-FREQUENCY (DTMF) TONES - A method and device for converting signals from a Human-Interface Device or similar input device to a stream of digital signals that are useable as inputs to an RS-232 or dual-tone multi-frequency (DTMF) circuit is provided. More specifically, the input from the input device may be received at a universal Serial Bus (USB) host and converted to an RS-232 or DTMF signal for ultimate use in controlling a remote device such as a camera in a video security system. | 2009-12-31 |
20090323924 | ACOUSTIC ECHO SUPPRESSION - Sound signals captured by a microphone are adjusted to provide improved sound quality. More particularly, an Acoustic Echo Reduction system which performs a first stage of echo reduction (e.g., acoustic echo cancellation) on a received signal is configured to perform a second stage of echo reduction (e.g., acoustic echo suppression) by segmenting the received signal into a plurality of frequency bins respectively comprised within a number of frames (e.g., 0.3 s to 0.5 s sound signal segments) for a given block. Data comprised within respective frequency bins is modeled according to a probability density function (e.g., Gaussian distribution). The probability of whether respective frequency bins comprise predominantly near-end signal or predominantly residual echo is calculated. The output of the acoustic echo suppression is computed as a product of the content of a frequency bin in a frame and the probability the frequency bin in a frame comprises predominantly near-end signal, thereby making near-end signals more prominent than residual echoes. | 2009-12-31 |
20090323925 | System and Method for Telephone Based Noise Cancellation - A system and method for enhancing communications through a phone. A voice communication is received from a user of the phone. A secondary signal is received from an environment in proximity to the phone. The secondary signal is processed to determine an inverse signal in response to receiving the secondary signal. The inverse signal is combined with the voice communication and the secondary signal to destructively interfere with the secondary signal for allowing a receiving party to more effectively communicate with the user. | 2009-12-31 |
20090323926 | METHODS AND SYSTEMS FOR VOICE COMMUNICATION - An intermediary communication system, the intermediary communication including: (a) a first network interface, configured for transmitting over a first network connection to a first remote end unit a first sound sequence; and for receiving from the first remote end unit a returning sound sequence that is responsive to the first sound sequence; (b) a processor, configured to determine an echo reduction parameter in response to a relationship between a first sound sequence parameter and a returning sound sequence parameter; and (c) a second network interface, for transmitting to a second remote end unit, over a second network connection, a processed sound sequence that was generated in response to the echo reduction parameter from a preprocessed sound sequence which was generated by the first remote end unit. | 2009-12-31 |
20090323927 | Mechanism for chained output feedback encryption - In one embodiment, a mechanism for chained output feedback encryption is disclosed. In one embodiment, a method includes generating a keystream at a block cipher encryption module with inputs of a key and the result of an exclusive-or (XOR) operation on two or more previous keystream outputs, and producing ciphertext by combining the generated keystream with plaintext. | 2009-12-31 |
20090323928 | ITEM TRACING WITH SUPPLY CHAIN SECRECY USING RFID TAGS AND AN IDENTITY-BASED ENCRYPTION SCHEME - A method for tracing an item may include encrypting item information using an identity-based encryption scheme with a batch number for an item as an encryption key and communicating the encrypted item information for storage on a radio frequency identification (RFID) tag for attachment to the item. | 2009-12-31 |
20090323929 | Computer-Readable Recording Medium Recording Program and Apparatus For Encryption/Decryption, Apparatus For Multiplication in Extension Field - There is provided a computer-readable recording medium recording a program for encryption/decryption, an apparatus for encryption/decryption, an apparatus for multiplication in an extension field, that enable to perform high speed multiplication processing, while allowing the selection of arbitrary key lengths. In multiplying two elements A={a | 2009-12-31 |
20090323930 | HIGH-EFFICIENT ENCRYPTION AND DECRYPTION PROCESSING METHOD FOR IMPLEMENTING SMS4 ALGORITHM - An encrypting/decrypting processing method for implementing SMS4 algorithm in high efficiency is provided. After preparing constant array, input external data into register section, firstly make primary data conversion and then make secondary data conversion, finally repeat data conversion course until complete all specified data conversion courses and obtain processing result of circulating data encryption/decryption. And it solves the technical problems of data conversion in the background technique that number of circulating times is large and encrypting efficiency is low, simplifying the chip design, largely optimizing integrity of chip signal and being able to improve interference immunity of system and reduce system cost. | 2009-12-31 |
20090323931 | Data Processing Hash Algorithm and Policy Management - Methods and associated systems for processing data are disclosed. A hashing function sequentially processes a hash key to generate a hash value. A policy management system processes packets according to defined policies. | 2009-12-31 |
20090323932 | Method and apparatus for encrypting data to facilitate resource savings and detection of tampering - One embodiment of the present invention provides a system that facilitates encrypting data. During operation, the system receives unencrypted data to be encrypted. Next, the system preprocesses the unencrypted data to create preprocessed unencrypted data, wherein preprocessing the unencrypted data involves generating a salt (wherein the salt facilitates in determining if the subsequently encrypted data has been altered) and concatenating the salt and the unencrypted data to create the preprocessed unencrypted data. Next, the system encrypts the preprocessed unencrypted data to create the encrypted data. Because the salt has already been applied to the plaintext data, it does not need to be reapplied during the encryption phase as is typically done in encryption. Finally, the system stores a copy of the salt with the encrypted data. | 2009-12-31 |
20090323933 | Exponentiation method using multibase number representation - A method of scalar multiplication for use in elliptic curve-based cryptosystems (ECC) is provided. Scalars are represented using a generic multibase form combined with the non-adjacency property, which greatly reduces the nonzero density in the representation. The method allows for flexibly selecting an unrestricted number of bases and their weight in the representation according to the particular characteristics of a setting, in such a way that computing costs are minimized. A simple, memory-friendly conversion process from binary to multibase representation and an inexpensive methodology to protect the multibase scalar multiplication against simple-side channel attacks are also provided. | 2009-12-31 |
20090323934 | Method for calculating compressed RSA moduli - A method for generating a compressed RSA modulus, allowing up to two thirds of the bits of a modulus N to be fixed. N has a predetermined portion N | 2009-12-31 |
20090323935 | PSEUDO PUBLIC KEY ENCRYPTION - According to the present invention, a secret key cryptosystem and tamper-proof hardware are used to realize a pseudo-public key cryptosystem at a low cost. A trap-door one-way function is substantially realized with the use of tamper-proof hardware. Each user performs communication using equipment provided with hardware having the same capabilities described below. Such hardware retains association between an ID and a key. In response to a request from a user, the hardware issues and stores an ID, and it can perform decryption and generation of a MAC (message authentication code) with a key associated with the ID. A user publishes his ID. When performing encryption, a message sender encrypts a message using the published ID. A third person can perform decryption with the ID only by analyzing the mechanism in the hardware. However, the hardware has a capability of destroying itself when such an act is attempted. | 2009-12-31 |
20090323936 | SYSTEM, METHOD, AND SERVICE FOR PERFORMING UNIFIED BROADCAST ENCRYPTION AND TRAITOR TRACING FOR DIGITAL CONTENT - A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKB | 2009-12-31 |
20090323937 | MULTI-LEVEL DATA ENCRYPTION AND DECRYPTION SYSTEM AND METHOD THEREOF - A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks corresponding to a plurality of user levels. The method also includes generating an encryption key for each level according to a level generation key and a time key of the level and encrypting the sub-data block of each level by using the encryption key of the level, wherein the level generation key and the time key of a lower level are generated based on the same of an upper level, the time key is generated according to a time generation key and a time seed, and the time seed is periodically updated according to different encryption periods. Thereby, the number of keys to be managed by a user is reduced while the read rights of different users are managed with forward and backward data security. | 2009-12-31 |
20090323938 | Mechanism for transport-safe codings for cryptographic use - In one embodiment, a mechanism for transport-safe codings for cryptographic use is disclosed. In one embodiment, a method for transport-safe coding for cryptographic use includes converting an input data stream into index values associated with “n” printable characters, wherein “n” is a radix associated with a base-“n” coding scheme and a prime power less than 94, performing a cryptographic operation on the index values to encrypt the index values, and translating the encrypted values directly into an output data stream of printable characters associated with the encrypted values in a base-“n” coding scheme. | 2009-12-31 |
20090323939 | DATA TRANSMISSION METHOD AND TERMINAL - Embodiments of the present invention provide a data transmission method, a Coaxial-Cable Network Unit (CNU) and a Coaxial-cable Line Terminal (CLT). The method is applied to a point-to-multipoint Coaxial-cable Network, wherein the point-to-multipoint Coaxial-cable Network includes a Coaxial-cable Line Terminal, CLT, and a plurality of Coaxial-Cable Network Units, CNUs; the CLT shares transmission medium with the CNUs. The method includes: obtaining, by the CLT, an uplink receiving scrambling code, and decrypting, by the CLT, with the obtained uplink receiving scrambling code, data sent from a CNU after being encrypted with an uplink transmission scrambling code; and obtaining, by the CNU, a downlink receiving scrambling code, and decrypting, by the CNU, data received by the CNU with the obtained downlink receiving scrambling code; wherein the uplink receiving scrambling code is different from the downlink receiving scrambling code. In embodiments of the present invention, the CNU includes a scrambling code obtaining unit, a decryption execution unit and a data interaction unit. The CLT includes a scrambling code processing unit, a decryption execution unit and a data interaction unit. With the embodiments of the present invention, the security of the uplink data transmission in an Ethernet Passive Coaxial Network (EPCN) system is guaranteed, and the QoS of services is greatly enhanced. | 2009-12-31 |
20090323940 | METHOD AND SYSTEM FOR MAKING INFORMATION IN A DATA SET OF A COPY-ON-WRITE FILE SYSTEM INACCESSIBLE - Information in a data set of a copy-on-write file system may be made inaccessible. A first key for encrypting a data set of a copy-on-write file system is generated and wrapped with a second key. An encrypted data set is created with the first key. The wrapped first key is stored with the encrypted data set. A command to delete the encrypted data set is received and the second key is altered or changed to make information in the encrypted data set of the copy-on-write file system inaccessible. | 2009-12-31 |
20090323941 | SOFTWARE COPY PROTECTION VIA PROTECTED EXECUTION OF APPLICATIONS - Methods and apparatus to provide a tamper-resistant environment for software are described. In some embodiments, procedures for verifying whether a software container is utilizing protected memory and is associated with a specific platform are described. Other embodiments are also described. | 2009-12-31 |
20090323942 | METHOD FOR PAGE- AND BLOCK BASED SCRAMBLING IN NON-VOLATILE MEMORY - A method and system for programming and reading data with reduced read errors in a memory device. In one approach, date to be written to the memory device is scrambled using a first pseudo random number which is generated based on a page of the memory device to which the data is to be written, to provide first scrambled data, which is scrambled using a second pseudo random number which is generated based on a block of the memory device to which the data is to be written. This avoids bit line-to-bit line and block-to-block redundancies which can result in read errors. The data may also be scrambled using a third pseudo random number that depends on a section within a page. Scrambling may also be based on one or more previous pages which were written. | 2009-12-31 |
20090323943 | DATA TRANSMISSION SYSTEM - A cipher key is generated by first information shared in secrete between a data transmitting unit | 2009-12-31 |
20090323944 | METHOD OF PUBLIC KEY GENERATION - A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated. | 2009-12-31 |
20090323945 | IMAGE DISPLAY DEVICE - An authentication/decryption unit authenticates and decrypts video signals received from a video signal output device. An open-condition detector detects the open condition of a cabinet. A memory stores therein one of a first flag indicating that an authentication operation of the authentication/decryption unit is enabled and a second flag indicating that an authentication operation of the authentication/decryption unit is disabled. A micro-controller controls whether the authentication operation of the authentication/decryption unit will be enabled or disabled according to the flag in the memory. When the open-condition detector detects that the cabinet is opened, the micro-controller writes the second flag into the memory. | 2009-12-31 |
20090323946 | ENCRYPTION AND UTILIZATION OF HARD DRIVE CONTENT - Examples of a system, method, and apparatus for encrypting and recording content are presented. When content is recorded to storage media, the content is encrypted with a content instance key. This content instance key is encrypted with the public key of a first set-top box and a duplicate of the content instance key is encrypted with the public key of other than said first set-top box. A private key corresponding with the public key of the first set-top box may be used to decrypt the content instance key, or a private key corresponding to the public key of other than the first set-top box may be used to decrypt the duplicate of the content instance key so that the encrypted content from the removable storage media may be made available in the clear. | 2009-12-31 |
20090323947 | METHOD OF CONFIRMING DRIVE UNIQUE KEY AND OPTICAL DISC RECORDING/REPRODUCING APPARATUS - In an apparatus which encrypts and records, or decrypts and reproduces content necessitated copyright protection using a plurality of encryption keys, the encryption key unique to a drive apparatus is stored into a memory in the apparatus at the time of manufacturing the apparatus. | 2009-12-31 |
20090323948 | Stream Generation Method, Broadcast Receiving Apparatus, and Display Method - Provided is a system far receiving a initialization packet containing an initial vector for initializing stream encryption algorithm and an identifier of a key for decrypting an encrypted stream, initializing a decryption modules and decrypting the encrypted stream, wherein the system stores an identifier of a key which is needed to decrypt a next program in a initialization packet of a current program and informs a user of whether a desired key has been acquired or not at timing close to start time of the next program. | 2009-12-31 |
20090323949 | METHOD OF TRANSMITTING AN ADDITIONAL PIECE OF DATA TO A RECEPTION TERMINAL - The invention relates to a method of transmitting at least one additional piece of data D in a list of access control words CWi to a scrambled content transmitted by a content server of an operator to a user equipment ( | 2009-12-31 |
20090323950 | Image encryption/decryption apparatus, method and program - An image encryption apparatus encrypts a digital image by specifying a partial region from the digital image, converting the selected partial region into a processing image based on an encryption key, and specifying a position of the partial region by regularly converting a pixel value of the processing image. | 2009-12-31 |
20090323951 | PROCESS, CIRCUITS, DEVICES, AND SYSTEMS FOR ENCRYPTION AND DECRYPTION AND OTHER PURPOSES, AND PROCESS MAKING - A wireless communications device ( | 2009-12-31 |
20090323952 | TIME OF DAY ENCRYPTION USING TDMA TIMING - Embodiments of the invention provide for encryption and decryption of data in a TDMA network using TDMA time values. In some embodiments, TDMA time values can be transmitted to terminals from a network controller using a burst time plan. These TDMA time values along with other data and/or counters can be combined to create a one-time key, which can be used to both encrypt data and/or decrypt data. Embodiments of the invention can decrease communication overhead by using the TDMA time value for TDMA purposes as well as for encryption purposes. | 2009-12-31 |
20090323953 | SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION - A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset originated location information to third parties. The system includes a location platform to determine location information of a remote user, and an encryption service configured to secure the location information of the remote user and send the secure location information to a content provider. | 2009-12-31 |
20090323954 | INTERNET PROTOCOL TELEPHONY SECURITY ARCHITECTURE - A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers. The secure devices, such as the CTA, can communicate with other secure devices by establishing signaling and bearer channels that are encrypted with session specific symmetric keys derived from a symmetric key distributed by a signaling controller. | 2009-12-31 |
20090323955 | DATA TRANSMITTING APPARATUS AND DATA RECEIVING APPARATUS - In secret communication using a Y-00 protocol, provided is a data communication apparatus which realizes reduction in a random number generation speed by using a plurality of random number generators, and which also ensures security. The data communication apparatus includes: a plurality of random number generation sections | 2009-12-31 |
20090323956 | ENCRYPTION DEVICE, PROGRAM, AND METHOD - Disclosed is an encryption device for generating a pseudo-random number based on a secret key and generates an encrypted text by applying the pseudo-random number sequence to a plain text, uses, an internal state in accordance with a state based on a permutation of a sequence of a finite number of numeric values, as an internal state used for generation of the pseudo-random number sequence, executes a predetermined leftward or rightward rotate shift, depending on a number smaller than an internal state number, based on the result of linear or non-linear, or combination of linear and non-linear using one or more numeric values of the internal state and sets at least one temporary variable used for generation of the pseudo-random number sequence to be a temporary variable having as a value a result of the execution of the predetermined leftward or rightward rotate shift, and generates the pseudo-random number by a predetermined prescribed operation on one or a plurality of numeric values of the internal state and the temporary variable. | 2009-12-31 |
20090323957 | SCRAMBLING UNDER AN EXTENDED PHYSICAL-LAYER CELL IDENTITY SPACE - A method for wireless communications is provided. The method includes determining a set of physical layer cell identities and analyzing a current set of scrambling sequences. The method increases the current set of scrambling sequences to account for increases in the physical layer cell identities. | 2009-12-31 |
20090323958 | EXTENDING A SECRET BIT STRING TO SAFEGUARD THE SECRET - A method and system extends a secret bit string to safeguard the secret. In one embodiment, the method comprises adding a secret bit string of length s to a product of two random bit strings using arithmetic defined for polynomials over GF(2) to produce an extended bit string. The extended bit string has a length m that is longer than s. A total of n shares are generated from the extended bit string, of which at least k shares are needed to reconstruct the secret bit string. The n shares are distributed to a plurality of cooperating computing entities for secret sharing. | 2009-12-31 |
20090323959 | Method for producing two-dimensional code reader for reading the two-dimensional code - A method of producing a two-dimensional code having a code area in which data codes coded as codewords are mapped. First type of data codes is mapped in the code area. The first type of data codes are coded as the codewords and indicating data to be disclosed. An end identification code is added to an end of a code string composed of the first type of data codes, the end identification code showing the end. Second type of data codes are mapped after the end identification code in the code area, the second type of data codes being coded as the codewords and indicating data to be kept in secret. Filler codes showing no data after the second type of data codes are mapped to fill up the code area, when a total amount of the codewords in the code area is less than a capacity of the code area. | 2009-12-31 |
20090323960 | METHOD AND SYSTEM FOR HIDING THE DECRYPTION KEY IN A DISPERSIVE WAY - A method for hiding the decryption key in a dispersive way is disclosed. A decryption key corresponding to content to be accessed is decomposed into at least two partial decryption keys, comprising first partial decryption key and second partial decryption key. The first partial decryption key is stored in a memory device. The second partial decryption key is stored in a hidden area of the memory device. When the memory device is installed on an electronic device, an application installed in the electronic device is activated. The application retrieves the first partial decryption key from the memory device and the second partial decryption key from the hidden area of the memory device, re-organizes and codes the first and second partial decryption keys to recover the decryption key, and decrypts the content using the decryption key, enabling the electronic device to access the content. | 2009-12-31 |
20090323961 | DATA ENCRYPTION AND/OR DECRYPTION BY INTEGRATED CIRCUIT - In an embodiment, an apparatus is provided that may include an integrated circuit to be removably communicatively coupled to at least one storage device. The integrated circuit of this embodiment may be capable of encrypting and/or and decrypting, based at least in part upon a first key, data to be, in at least in part, stored in and/or retrieved from, respectively, at least one region of the at least one storage device. The at least one region and a second key may be associated with at least one access privilege authorized, at least in part, by an administrator. The second key may be stored, at least in part, externally to the at least one storage device. The first key may be obtainable, at least in part, based, at least in part, upon at least one operation involving the second key. Of course, many alternatives, modifications, and variations are possible without departing from this embodiment. | 2009-12-31 |
20090323962 | SECURE MULTICAST CONTENT DELIVERY - In one embodiment, a method for establishing a secure multicast channel between a service provider and a terminal is provided. A request is received from the service provider for a configuration of the terminal. A configuration of the terminal at a first time is sent to the service provider. A security key is obtained, wherein the security is bound to the configuration of the terminal at the first time. Then the security key is decrypted using a configuration of the terminal at a second time, wherein the decryption fails if the configuration of the terminal at the second time is not identical to the configuration of the terminal at the first time. A secure multicast channel is then established with the service provider using the security key. | 2009-12-31 |
20090323963 | Methods and Media for Recovering Lost Encryption Keys - An information handing system provides a method for recovering encryption keys. The method includes providing a first recording medium of a plurality of recording media in a first drive of a plurality of drives. A first key is requested from a primary key manager (PKM) associated with the first drive, wherein the first drive provides a first key identifier (ID) to the PKM. If it is determined that the PKM provides the first key corresponding to the first key ID, a first identifying information for the PKM is stored in a memory for the first recording medium. | 2009-12-31 |
20090323964 | SYSTEM AND METHOD OF UPDATING KEY BASED ON COMMUNICATION COST AND SECURITY DAMAGE COST - A system and method of updating a key based on communication and security damage costs are provided. The key updating system for group communication between a plurality of group members, includes a key update cycle determining unit to determine a key update cycle based on a communication cost and a security damage cost, and a key updating unit to perform a key updating with respect to one or more group members of the group communication based on the determined key update cycle. | 2009-12-31 |
20090323965 | Systems and Methods for Monitoring Performance of a Communication System - Monitoring the performance of communication systems is an important part of network operations. In one aspect the invention provides a method for monitoring the performance by collecting data pertaining to a mobile terminal accessing the system. In some embodiments, the method includes receiving an identifier for identifying the mobile terminal; using the identifier to detect the UE accessing the network via an access point; and in response to detecting the UE accessing the network, transmitting to the access point a message comprising an encrypted version of the identifier with a command to initiate the collection of data pertaining to the mobile terminal. | 2009-12-31 |
20090323966 | METHOD AND SYSTEM FOR ENHANCING DATA ENCRYPTION USING MULTIPLE-KEY LISTS - A method for enhancing data encryption using multiple-key lists is disclosed. A first multiple-key list and a second multiple-key list for a decryption key are created, wherein each multiple-key list comprises plural partial decryption keys. Content to be accessed is encrypted using an encryption key corresponding to the decryption key. The first multiple-key list is stored in a hidden area of a memory device storing the content. The second multiple-key list is stored in the memory device. When the memory device is installed on an electronic device, an application installed in the electronic device is activated to select a first partial decryption key from the first multiple-key list stored in the hidden area and a second partial decryption key from the memory device, re-organizes and codes the first and second partial decryption keys to recover the decryption key, and decrypts the content using the decryption key, enabling the electronic device to access the content. | 2009-12-31 |
20090323967 | PRODUCTION OF CRYPTOGRAPHIC KEYS FOR AN EMBEDDED PROCESSING DEVICE - A system and method for producing cryptographic keys for use by an embedded processing device within a manufactured product. A pseudo random number generator is seeded with entropy data gathered by the embedded device, and the result is used to generate a public-private key pair. The process can be carried out during manufacturing so that the public key of each manufactured product can be stored in a database along with a unique identifier for the embedded device associated with the key. In one particular example, a vehicle having an installed telematics unit uses the key generating process to self-generate keys using entropy data available to the vehicle. | 2009-12-31 |
20090323968 | DESCRAMBLING APPARATUS AND DESCRAMBLING METHOD IN A TV SYSTEM - A descrambling apparatus and a descrambling method to descramble a scrambled data in a receiver of a digital TV system are provided. The descrambling apparatus comprises: a receiving module, a storing module, a comparator, a retrieving module and a descrambler. The receiving module receives a packet, wherein the packet comprises a key-status field, a packet identifier field and a scrambled data; the storing module stores a key data and a formerly received packet data; the comparator compares the formerly received packet data and a key-status value of the key-status field to generate a compare result; the retrieving module retrieves a descramble key from the key data and the formerly received packet data according to the compare result, the key-status value and a packet identifier value of the packet identifier field; and the descrambler descrambles the scrambled data according to the descramble key to generate a descrambled data. | 2009-12-31 |
20090323969 | COMMUNICATION METHOD, COMMUNICATION APPARATUS, AND INTEGRATED CIRCUIT - An object of the present invention is to realize a communication apparatus, a communication method, and an integrated circuit, capable of performing a key updating operation, while having resistibility with respect to noises and DoS attacks without increasing a frequency bandwidth. The present invention is such a communication apparatus for transmitting key update information via a transmission line to another communication apparatus, comprising: a key update information producing unit which generates the key update information having a first time width; a code information producing unit which generates code information which is employed so as to code the key update information; a time width expanding unit | 2009-12-31 |
20090323970 | SYSTEM AND METHOD FOR PROTECTING DATA IN A SECURE SYSTEM - A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets. | 2009-12-31 |
20090323971 | Protecting independent vendor encryption keys with a common primary encryption key - Apparatus, systems and methods for protection of independent vendor encryption keys with a common primary encryption key are disclosed including an apparatus including memory to store a plurality of encrypted vendor keys, memory to store a primary key; and cipher logic to use the primary key to decrypt an encrypted vendor key of the plurality of encrypted vendor keys to provide an effective key. Other implementations are disclosed. | 2009-12-31 |
20090323972 | PRIVACY-PRESERVING LOCATION TRACKING FOR DEVICES - A privacy-preserving device-tracking system and method to assist in the recovery of lost or stolen Internet-connected mobile devices. The function of such a system seem contradictory, since it is desirable to hide a device's legitimately-visited locations from third-party services and other parties to achieve location privacy, while still enabling recovery of the device's location(s) after it goes missing by tracking the device to determine its location. An exemplary embodiment uses a DHT for storing encrypted location information and other forensic information in connection with indices that are successively determined based on initial pseudorandom seed information (i.e., state) that is retained by the owner of the device. Using the seed information, the software can determine indices mapped to location information stored after the device went missing, enabling the device to be located. Numerous extensions are discussed for the basic exemplary design that increase its suitability for particular deployment environments. | 2009-12-31 |
20090323973 | SELECTING AN AUDIO DEVICE FOR USE - Selecting for use an audio input device such as a microphone based on the quality of sound sampled from multiple available input devices. The sample is analyzed to determine a background sound level and a peak deviation level above the background. That device having the greatest deviation above the background is selected and all other input devices deactivated. The selection process may also require that the peak value meet or exceed some threshold value in order to be considered. The sampling may occur starting with system activation or may occur prior to activation with selection occurring after system activation. | 2009-12-31 |
20090323974 | SYSTEM AND METHOD FOR TESTING AUDIO DEVICE OF MOTHERBOARD - A system for testing audio of a motherboard includes a recording fixture and a computer. The recording fixture includes a recording device and a soundproof device. The soundproof device is configured for soundproofing the audio device and the recording device from environmental noise. The computer includes an output/input module, a comparing module and a displaying module. The output/input module is configured for outputting a first sound signal generated by the computer to the audio device to cause the audio device to generate a sound and receiving the sound generated by the audio device and recorded by the recording device from the recording device and transforming the sound into a second sound signal. The comparing module is configured for comparing the first and second sound signals. The displaying module is configured for displaying the compared result. | 2009-12-31 |
20090323975 | HEADPHONES WITH EMBEDDABLE ACCESSORIES INCLUDING A PERSONAL MEDIA PLAYER - A set of headphones is configured with an integrated accessory receiving space and a device connector that interface with a variety of different interchangeable accessories. The accessories can range from a personal media player that can render audio, such as MP3 (Moving Pictures Expert Group, MPEG-1, audio layer 3) content, to rechargeable battery packs, storage devices, and modules that can support wireless communication between the headphones and other devices such as media centers, game consoles, and personal computers (“PCs”). A user can pick an accessory and snap it into the receiving space of the headphones. When so installed, the accessory becomes physically and functionally embedded so that its functionality becomes seamlessly integrated with operation of the headphones. | 2009-12-31 |
20090323976 | NOISE REDUCTION AUDIO REPRODUCING DEVICE AND NOISE REDUCTION AUDIO REPRODUCING METHOD - A noise reduction audio reproducing method includes the steps of: generating, from an audio signal of collected and obtained noise, an audio signal for noise cancellation to cancel the noise by synthesizing the audio signal for noise cancellation and the noise in an acoustic manner, reproducing the audio signal for noise cancellation acoustically to synthesize this with the noise in an acoustic manner; emphasizing an audio component to be listened to, of collected audio; synthesizing an audio signal with the audio component to be listened to being emphasized, and the audio signal for noise cancellation to supply the synthesized signal thereof to an electro-acoustic converting unit; and controlling so as to supply an audio signal, with the audio component to be listened to having been emphasized, to a synthesizing unit, regarding only a section based on a control signal. | 2009-12-31 |