Patent application number | Description | Published |
20090055157 | Server Having Remotely Manageable Emulated Functions - A new and unique server having server core, storage interface I/O function, local area network interface I/O function that comprises remote graphic controller manageable emulated function (RMEF). The RMEF comprises circuitry capable of emulating a standard graphic controller to the server core so as to enable the core to generate video frames and circuitry capable of remotely delivering the video frames to remote management console application and other I/O interface functions. The functions can be implemented on a single chip. | 02-26-2009 |
20100157524 | WALL MOUNTED SYSTEM WITH INSERTABLE COMPUTING APPARATUS - The present invention is directed to provide a computing system comprises plurality of apparatii mounted on the wall or floor adjacent to or embedded inside the LAN jack or a main power outlet. The apparatii are connected at the back side through Ethernet cable, optical fiber or main lines to the building LAN and connected at the front side through cables or wirelessly to display, keyboard, mouse or other peripheral devices. In a typical embodiment of the present invention power to the computing apparatus is supplied through the LAN cable. Another embodiment of the present invention utilizes a wall or floor mounted housing part comprising of an integrated LAN connector. This common housing enables easy installation of the said computing apparatus module and plurality of other compatible devices that may be plugged into that same housing. | 06-24-2010 |
20110208963 | SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR - Organizations often defend against security threats by physically isolate their internal classified networks from external networks attached to the internet. To enable easy user's access to several networks many organizations are using KVM (Keyboard Video Mouse) devices attached to multiple PCs or thin-clients, each attached to a different network. As KVMs may be abused by attackers to bridge or leak between isolated networks, Secure KVM typically used having isolated circuitry for each computer channel to reduce its vulnerability to leakages between channels. To enable remote installation of a KVM with isolated computers a remote Controller-Indicator is needed in order to present to the user the KVM front panel indications and to enable certain control functions. The current invention provides a KVM switch capable of providing secure remote extension of KVM control and indication functions. Another object of the present invention is to provide a KVM switch having secure remote extension of the complete user console with support of: remote keyboard, mouse, one or more displays, smart-card reader, audio devices, KVM control and KVM monitoring. | 08-25-2011 |
20130063854 | 3-DIMENSIONAL MULTI-LAYERED MODULAR COMPUTER ARCHITECTURE - A stackable layer is provided for 3-Dimensional multi-layered modular computers. The stackable layer comprises at least one encapsulated chip die. Sets of electrical contacts are provided on each one of the large surfaces of the layer. The encapsulated chip die and the two large opposite surfaces of the layer are substantially parallel. | 03-14-2013 |
Patent application number | Description | Published |
20110145451 | ISOLATED MULTI-NETWORK COMPUTER SYSTEM AND APPARATUS - The present invention presents apparatuses and systems for operating multiple computers from a single console using a secured KVM device, while preventing information leakage between the computers. The system comprises several hosts connected through a secured KVM device to keyboard and mouse and one or more user displays. Secured KVM enables standard bi-directional communication between Secured KVM and user keyboard and mouse and between hosts peripheral ports and Secured KVM. Secured KVM physically enforces unidirectional data flow from attached keyboard and mouse to attached hosts peripheral ports to avoid potential leakages between hosts. | 06-16-2011 |
20130067534 | COMPUTER MOTHERBOARD HAVING PERIPHERAL SECURITY FUNCTIONS - A secure motherboard for a computer, wherein each user accessible peripheral port is protected by hardware based peripheral protection circuitry soldered to the motherboard. The protection circuitry provides security functions decreasing the vulnerability of the computer to data theft. User input ports such as keyboard and mouse peripheral ports are coupled to the computer through a security function that enforce unidirectional data flow only from the user input devices to the computer. Display port uses a security function which isolates the EDID in the display from the computer. Authentication device such as smart card reader is coupled to the computer via a port having a security function which enumerates the authentication device before coupling it to the computer. | 03-14-2013 |
20130219525 | SECURE AUDIO PERIPHERAL DEVICE - A secure audio peripheral device, coupled to a computer, capable of enabling a user to use audio devices such as a microphone, speakers or headset when the device is in operational state, while giving to the user a clear visual indication that the audio devices are enabled. The device simultaneously disables the microphone; and turns off the visual indication when the device is in secure state. The operational state is activated by the user by pressing a momentary push-button switch. A timer resets the device to a secure state after a short preset time. The device has anti-tempering functionality and becomes permanently disabled if tempered with. Optionally the device is coupled to the computer via a USB port that powers a USB CODEC chip and a LED used as the visual indicator. | 08-22-2013 |
20130222609 | SECURE VIDEO CAMERA DEVICE - A secure video camera device for reducing the risk of visual and audio eavesdropping has a video camera and an electromechanical shutter behind a transparent cover in a secured enclosure. The shutter optically obscures the camera lens when the device is in secure state. A visual indicator indicates when the device is in operational state. A switch controllable by the user, select the state of the device by concurrently disabling the camera turning off the visual indicator in a secure state; and setting said device in an operational state by concurrently enabling the camera and turning on said lighted indicator. The device has a built in, or auxiliary microphone, and audio outputs which are disabled in secure state of the device. The device is tempered proof by an anti-tempering circuitry. | 08-29-2013 |
20140015673 | SECURE PERIPHERAL CONNECTING DEVICE - A secure peripheral device, coupled to a computer, capable of enabling a user to use a peripheral device such as a microphone, speakers, headset or video camera when the device is in operational state, while giving to the user a clear visual indication that the device is enabled. The device simultaneously disables the user peripheral device; and turns off the visual indication when the secure peripheral device is in secure state. The operational state is activated by the user by pressing a momentary push-button switch. A timer resets the device to a secure state after a short preset time. The device has anti-tempering functionality and becomes permanently disabled if tempered with. Optionally the device is coupled to the computer via a USB port that powers it. | 01-16-2014 |
20140019652 | SECURE KM SWITCH - A system enabling a computer user to securely share a single set of keyboard and mouse (KM) among multiple isolated computers. The system enables one set of peripheral devices to independently interact with multiple coupled isolated computers through mouse position analysis on a virtual display area corresponding to multiple physical user displays of the particular installation. The system may be used to enable computer user having multiple isolated computers each with one or more coupled display to automatically switch a single set of keyboard mouse and other peripheral devices between the different computers. As isolated computers may have different security levels, the method and apparatus of the present invention prevents and potential data leakages between computers and coupled networks. | 01-16-2014 |
20140053256 | USER AUTHENTICATION DEVICE HAVING MULTIPLE ISOLATED HOST INTERFACES - Devices and methods provide for enabling a user to use a single user authentication device such as smart-card reader, such that the user is capable of securely interfacing with two or more isolated computers and enabling the user to authenticate and remain authenticated at multiple computers at the same time. Once the user removes the smart-card from the smart-card reader, the authentication session on all coupled computers is terminated at once. The user authentication device comprises: an authentication module connected via a channel selection switch to one of a plurality of channels, each interfacing with a respective coupled computer. | 02-20-2014 |
20140075535 | METHOD AND APPARATUS FOR STREAMING VIDEO SECURITY - A streaming video security device is provided that comprises an input LAN interface, at least one streaming video decoder, an output LAN interface, at least one streaming video encoder coupled at one side to said LAN interface for streaming video output and coupled at the other side to a raw video display-compatible output interface; and unidirectional data flow element coupled at the transmitting side to the streaming video decoder through the raw video display-compatible output interface and coupled at the receiving side to one or more video encoder through the raw video display-compatible input interface. | 03-13-2014 |
20140244880 | SINGLE OPTICAL FIBER KVM EXTENDER - Single Optical Fiber KVM (Keyboard Video Mouse) systems are provided that comprises of two subsystems: an electro-optical transmitter subsystem and an electro-optical receiver subsystem. The single optical fiber KVM is configured to support all required bi-directional communications. | 08-28-2014 |
20140289433 | ISOLATED MULTI-NETWORK COMPUTER SYSTEM AND APPARATUS - The present invention presents apparatuses and systems for operating multiple computers from a single keyboard and a single mouse and view composite videos generated from video output of the multiple computers on a single display, while preventing any possible information leakage between the computers. Keyboard and mouse commands detected by a host controller are used to control a video processor and a peripheral switch. The peripheral switch directs keyboard and mouse signals to one selected host and at the same time, the video processor creates an active display window showing video information from the selected host. Physical unidirectional isolators in the video, keyboard and mouse channels prevent any potential data leakages between hosts. | 09-25-2014 |
20150020189 | ELECTRO-MECHANIC USB LOCKING DEVICE - USB ports present risk of data leak from computers. The invention provides an electromechanical USB port protection device capable of mechanically block unused USB port, thus preventing the connection of any USB device to that port. Removal of the device requires electrically energizing the lock using security code. Security software provides scalable and secure centralized keys management. The device provides clear and continuous user visual indications when device is secure. Device derivative secures USB cable to the computer USB port. Another device derivative filters and secures a connected user peripheral device, for example a USB locking device that only allows a connection of USB mouse or keyboard. | 01-15-2015 |
Patent application number | Description | Published |
20090210494 | Device, System, and Method of Electronic Communication to Facilitate Collaboration and Meeting - Device, system, and method of electronic communication to facilitate collaboration and meeting. For example, a method of inducing social interaction among users of an electronic communication network includes: receiving a first behavioral profile representing one or more schedule items of a first user; receiving a second behavioral profile representing one or more schedule items of a second user; identifying a time-slot in which the first and second users are available according to the first and second behavioral profiles, respectively, and identifying a common activity-of-interest reflected in the first and second behavioral profiles; and sending to the first and second users invitations to engage in said activity-of-interest in said time-slot. | 08-20-2009 |
20090222441 | System, Method and Computer Program Product for Performing Unstructured Information Management and Automatic Text Analysis, Including a Search Operator Functioning as a Weighted And (WAND) - Disclosed is a system architecture, components and a searching technique for an Unstructured Information Management System (UIMS). The UIMS may be provided as middleware for the effective management and interchange of unstructured information over a wide array of information sources. The architecture generally includes a search engine, data storage, analysis engines containing pipelined document annotators and various adapters. The searching technique makes use of a two-level searching technique. A search query includes a search operator containing of a plurality of search sub-expressions each having an associated weight value. The search engine returns a document or documents having a weight value sum that exceeds a threshold weight value sum. The search operator is implemented as a Boolean predicate that functions as a Weighted AND (WAND). | 09-03-2009 |
20090222481 | Device, System, and Method of Project Planning and Management - Device, system, and method of project planning and management. For example, a method of project planning and management includes: publishing a representation of a project specification comprising one or more discrete objects; publishing a collaborative comment to one or more of the discrete objects; and receiving a supplier proposal to fulfill one or more of the discrete objects. | 09-03-2009 |
20090307209 | TERM-STATISTICS MODIFICATION FOR CATEGORY-BASED SEARCH - An apparatus for searching a document collection is provided. The apparatus includes a memory, which is arranged to store a plurality of documents that are respectively associated with one or more categories and contain terms, a search processor, which is arranged to provide an index of the terms indicating the documents in which the terms appear, to estimate a first statistical distribution of each of at least some of the terms in the index over the documents in the collection, to estimate a second statistical distribution of each of at least some of the categories over the documents in the collection, to accept a query comprising one or more of the terms and a specified category restriction referring to at least one of the categories, to compute a local term distribution, which is indicative of occurrence frequencies of at least one of the terms in the query within the specified category restriction, using the first and second estimated statistical distributions to determine a category-specific score for the at least one of the terms responsively to the local term distribution within the specified category restriction, and to apply the query to the index using the category-specific score so as to return a response, wherein the processor is arranged to construct term histograms of the at least some of the terms in the index, to construct category histograms of the at least some of the categories, and to map the documents in the collection to bins of the histograms, so as to estimate the first and second statistical distributions, and wherein the processor is arranged to determine a category restriction histogram based on the category histogram of the at least one of the categories responsively to the category restriction, and to multiply the category restriction histogram by the term histogram of the at least one of the terms in the query so as to produce a localized term histogram. | 12-10-2009 |
Patent application number | Description | Published |
20130295901 | System and Method for Sensor-Based Determination of User Role, Location, and/or State of One of More In-Vehicle Mobile Devices and Enforcement of Usage Thereof - Systems and methods are disclosed for computing various determinations at one or more mobile devices and/or central machines. In part, such determinations are computed based on analysis of one or more inputs originating at one or more sensors of one or more devices. Such determinations include determining an in-vehicle role, an in-vehicle location, a handheld state, and a vehicle class. Various transformations, modifications, and outputs can result from such determinations. Also disclosed are systems and methods for restricting operation of a mobile device, including restrictions that impede operation by a driver moreso than operation by a passenger. Also disclosed are systems and methods for orienting a coordinate system of a mobile device. | 11-07-2013 |
20140287738 | In-Vehicle Device Location Determination and Enforcement of Usage Thereof - Systems and methods are disclosed for computing various determinations at one or more mobile devices and/or central machines. In part, such determinations are computed based on analysis of one or more inputs originating at one or more sensors of one or more devices. Such determinations include determining an in-vehicle role, an in-vehicle location, a handheld state, and a vehicle class. Various transformations, modifications, and outputs can result from such determinations. Also disclosed are systems and methods for restricting operation of a mobile device, including restrictions that impede operation by a driver moreso than operation by a passenger. Also disclosed are systems and methods for orienting a coordinate system of a mobile device. | 09-25-2014 |
Patent application number | Description | Published |
20080208894 | METHOD AND APPARATUS FOR MULTI-FILE CONTROLS - A method and apparatus for enabling a unit such as a complex control comprising multiple pages, which should be implemented as a single pair of user interface file and code file, to be implemented in a multiplicity of files, to enable multiple developers to work concurrently on the control, and to enable dynamic addition, deletion or update of pages in a control. The method comprises constructing a template describing the complex control, generating separate pages according to the template, and in run time aggregating the separate pages, renaming elements within the separate pages and routing events to the event handlers implemented by the separate pages. | 08-28-2008 |
20080263509 | METHOD AND APPARATUS FOR APPLICATION PATTERNS AND APPLICATIONS GENEARATION - A method and apparatus for defining and creating generic context-related application patterns, and for defining and creating specific applications based on the application patterns. The method and apparatus include defining generic user interface preferably through interfacing specific environments, and content retrieval preferably through interfacing specific systems, such as enterprise systems. The application development then uses the generated patterns, and the specific user-interface and content retrieval components for developing a specific application. | 10-23-2008 |
20120297437 | SYSTEMS AND METHODS PROVIDING BUSINESS DATA VIA A TELEVISION BASED ON A BUSINESS CONTEXT - According to some embodiments, a stream of television information to be displayed on a television may be received. In substantially real time, the received television information may be automatically analyzed to determine a business context. Based on the determined business context and business data stored at a remote business server, an interaction with a viewer may be arranged via the television. | 11-22-2012 |
20130018966 | MESSAGE ATTACHMENT TRACKINGAANM Kubovsky; Inbal ZilbermanAACI Givat SchmuelAACO ILAAGP Kubovsky; Inbal Zilberman Givat Schmuel ILAANM Soffer; GuyAACI Ra'ananaAACO ILAAGP Soffer; Guy Ra'anana IL - The present disclosure involves systems, software, and computer implemented methods for tracking files attached to electronic messages. One process includes operations for receiving a message, the message including information to be displayed by a message reading application, the message including a first indication that a file was attached to the earlier message, wherein the first indication is marked to not be displayed with the information by the message reading application; determining that the file is not attached to the message; sending a request for the file to a user identifier, the user identifier being included in the message and associated with the file or the earlier message or both; and receiving the file. | 01-17-2013 |
20130073969 | SYSTEMS AND METHODS FOR WEB BASED APPLICATION MODELING AND GENERATION - According to some embodiments, a service list including a plurality of available services is displayed via a web-based display on a remote client device. Each available service may be, for example, associated with meta-data available at a server. A user selection of at least one of the available services may then be received. A platform list, including a plurality of potential execution platforms, may be displayed to the user and a user selection of one of the potential execution platforms may be received. The server may then automatically generate application code based on the selected available service, the meta-data associated with the selected available service, and the selected execution platform. | 03-21-2013 |
20130166721 | SYSTEMS AND METHODS FOR A SOCIAL MEDIA NETWORK/BUSINESS PLATFORM INTERFACE - According to some embodiments, information associated with a task may be received, including a trigger entity and a related action entity. A social media network/business platform interface may monitor a trigger condition associated with the trigger entity. The social media network/business platform interface may then automatically detect that the trigger condition is satisfied. Responsive to that detection, an action defined by the action entity related to the trigger entity may be automatically performed. | 06-27-2013 |
20130325461 | BUSINESS PLATFORM VOICE INTERACTIONS - According to some embodiments, a user device may receive business enterprise information from a remote enterprise server. The user device may then automatically convert at least some of the business enterprise information into speech output provided to a user of the user device. Speech input from the user may be received via and converted by the user device. The user device may then interact with the remote enterprise server in accordance with the converted speech input and the business enterprise information. | 12-05-2013 |
20140346225 | PLATFORM FOR MODELING AND EMBEDDING BUSINESS SCENARIOS IN BAR CODES - According to some embodiments, a business bar code application may execute at a mobile user device associated with a user. The user may initiate a capture of an image of a bar code, and responsive to said capturing, information about the user may be automatically fetched. Information associated with the bar code may be transmitted to a remote business bar code server. The business bar code server may automatically determine a business model associated with the received bar code information and interact with an enterprise system to execute a business process workflow for the user in accordance with the determined business model. | 11-27-2014 |
Patent application number | Description | Published |
20090232023 | Combined omni- and directional- communications in high-frequency wireless networks - In a wireless communication network, specific portions of the communication may combine directional transmission with omnidirectional reception. In particular, sector-level directional transmission may be established through sector sweeps, followed by antenna training for more directionality. In some embodiments, collisions during the exchange may be reduced by having different network devices use different sub-channels or different time slots. In some embodiments, each network may restrict its network communications to a single sub-channel that is different than the sub-channels used by adjacent networks. | 09-17-2009 |
20090233564 | TECHNIQUES FOR EFFICIENT CARRIER RECOVERY FOR PASSBAND COMMUNCIATION SYSTEMS - A method, apparatus, and article containing computer instructions are described. In an embodiment an apparatus includes a radio-frequency receiver to receive a training packet. The receiver may include a processor. The processor may include modules for performing carrier recovery. A coarse estimator module may derive a coarse frequency offset from the training packet; and a fine estimator module may derive a fine frequency offset from the training packet substantially simultaneously and in parallel with the coarse estimator module. A carrier recovery module may perform carrier recovery using the fine and coarse frequency offsets. | 09-17-2009 |
20100111229 | METHOD AND APPARATUS OF GENERATING PACKET PREAMBLE - A wireless communication device, a wireless communication system and a method for transmitting a packet preamble of signal sequences to both a single carrier wireless device and a multiple carrier wireless device. The packet preamble includes a first sequence for detecting a signal and a second sequence for estimating a channel. | 05-06-2010 |
20110249615 | COMBINED OMNI- AND DIRECTIONAL- COMMUNICATIONS IN HIGH-FREQUENCY WIRELESS NETWORKS - In a wireless communication network, specific portions of the communication may combine directional transmission with omnidirectional reception. In particular, sector-level directional transmission may be established through sector sweeps, followed by antenna training for more directionality. In some embodiments, collisions during the exchange may be reduced by having different network devices use different sub-channels or different time slots. In some embodiments, each network may restrict its network communications to a single sub-channel that is different than the sub-channels used by adjacent networks. | 10-13-2011 |
Patent application number | Description | Published |
20130094365 | Adaptive Traffic Manager for Wireless Applications - An adaptive traffic manager assembly, which includes a computing module configured to operate on a current adaptive traffic manager configuration, and includes an adapting mechanism configured to adaptively change the current adaptive traffic manager configuration according to current wireless link conditions, a current Adaptive Coding and Modification (ACM) profile, or upon detection of an ACM event, and further includes a switch assembly configured to receive a first signal over a wired link and to output a second signal over a wireless link, and configured to store the current adaptive traffic manager configuration, and is further configured to automatically change a modulation and coding scheme associated with the current adaptive traffic manager configuration upon receiving an instruction from the computing module, in response to the detection of the ACM event. | 04-18-2013 |
20130094438 | Split Architecture Remote Radio - A wireless communication system, which includes at least one base station module configured to implement a media access controller and a physical layer, and includes at least one remote radio head module configured to prepare an analog signal or a digital data signal for transmission and receipt over a link in accordance with dedicated interface specifications, and also includes at least one outdoor signal conversion module configured to perform a high rate digital-to-analog conversion and a high rate analog-to-digital conversion in accordance with the dedicated interface specifications, and further includes at least two millimeter wave antenna assemblies, where each antenna assembly is configured to transmit and receive the analog signal over a wireless link in accordance with the dedicated interface specifications. | 04-18-2013 |
20130094549 | MULTI GIGABIT MODEM FOR MMWAVE POINT TO POINT LINKS - A millimeter wave modem assembly, which includes an input/output interface module configured to receive and transmit standardized data streams in accordance with dedicated interface specifications, and includes an encoder module configured to encode the standardized data streams to form coded digital bits, and also includes a physical layer module configured to convert the coded digital bits into digital symbols and into digital samples, and to convert the digital samples into the digital symbols and then into the coded digital bits; and further includes a data conversion module configured to perform a high rate conversion of the digital samples to form an analog signal suitable for wireless transmission over a link in accordance with the dedicated interface specifications. | 04-18-2013 |
Patent application number | Description | Published |
20090185505 | MEDIA ACCESS CONTROL (MAC) FOR AN ACTIVE RFID SYSTEM - A system of radio frequency communication between Readers and Tags, the system comprising at least one tag Reader and a plurality of Tags, each tag is given a unique tag ID, deployed in a region in which at least some of the Tags are in radio communication with the tag Reader and a Media Access Control protocol such that the tag Reader is configured to send and receive radio communication to and from at least some of the plurality of Tags. The plurality of Tags are configured to send and receive radio communication to and from the tag Reader and the Media Access Control protocol is configured to control the radio communication between the tag Reader and the plurality of Tags The Media Access Control protocol includes a multi-dimensional addressing scheme allowing Readers to efficiently address tag communities ranging from small to very large in unicast, multicast and broadcast modes. The multi-dimensional addressing scheme enables division of the plurality of Tags into a number of groups for different stages of Media Access Control protocol processing, based on different portions of the tag ID. A hash function is used to transform the tag ID into a pseudo random ID, so as to achieve better spreading of tag population and lower statistical dependency between dimensions. The MAC has an inherent flexibility in the sense that it allows readers to communicate with different versions of tags and also to optimize communication parameters to reader's capabilities, without pre-configuration of the tags. Furthermore, the MAC supports means to achieve very high access reliability, such as relay between tags, and the ability to work with tags that alternate between active and sleep mode) including means for power savings. All of these novel features, coupled with some prior art concepts like collision resolution algorithms, result in a scalable MAC protocol for an active RFID system employing multiple access. | 07-23-2009 |
20140191847 | MEDIA ACCESS CONTROL (MAC) FOR AN ACTIVE RFID SYSTEM - A system of radio frequency communication between Readers and Tags having a scalable Media Access Control (MAC) protocol for an active RFID system employing multiple access. The system comprising at least one tag Reader and a plurality of Tags each having a unique tag ID and deployed in a region in which at least some of the Tags are in radio communication with the tag Reader. A multi-dimensional addressing scheme of the MAC protocol enables division of the plurality of Tags into a number of groups for different stages of MAC protocol processing, based on different portions of the tag ID. The MAC has an inherent flexibility in the sense that it allows readers to communicate with different versions of tags and also optimize communication parameters to reader's capabilities, without pre-configuration of the tags. Furthermore, the MAC supports means to achieve very high access reliability, such as relay between tags. | 07-10-2014 |