Patent application number | Description | Published |
20150379277 | Encryption Architecture - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379278 | Method and Apparatus for Differently Encrypting Different Flows - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379279 | Method and Apparatus for Encrypting Data Messages after Detecting Infected VM - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379280 | Method and Apparatus for Dynamically Creating Encryption Rules - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379281 | Method and Apparatus for Encrypting Messages based on Encryption Group Association - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379282 | Encryption System in a Virtualized Environment - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150381578 | Method and Apparatus for Differently Encrypting Data Messages for Different Logical Networks - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
Patent application number | Description | Published |
20100258710 | OPTICAL SENSORS THAT REDUCE SPECTRAL REFLECTIONS - An optical sensor device, according to an embodiment of the present invention, includes a light source and a light detector. The light source includes one or more light emitting elements, and the light detector includes one or more light detecting elements. A first opaque light barrier portion, between the light source and the light detector, is configured to block light from being transmitted directly from the light source to the light detector. A second opaque light barrier portion, extending from the first opaque light barrier portion in a direction towards the light source, is configured to reduce an amount of specular reflections that would occur if a light transmissive cover plate were placed over the optical sensor device. A third opaque light barrier portion, extending from the first light barrier portion in a direction towards to the light detector, is configured to reduce an amount of specular reflections that would be detected by the light detector, if a light transmissive cover plate were placed over the optical sensor device. | 10-14-2010 |
20100258712 | OPTICAL SENSORS THAT REDUCE SPECTRAL REFLECTIONS - An optical sensor device comprises a light source, a light detector, and an opaque light barrier including a first portion to block light from being transmitted directly from the source to the detector. A second portion of the light barrier extends from the first portion in a direction towards the light source, such that a portion of the second portion covers at least a portion of light emitting element(s) of the source, to reduce an amount of specular reflections, if a light transmissive cover plate were placed over the sensor. Additionally, a third portion of the barrier can extend from the first portion, in a direction towards to the detector, such that a portion of the third portion covers at least a portion of light detecting element(s) of the detector, to reduce an amount of specular reflections that would be detected by the detecting element(s) of the detector, if a light transmissive cover plate were placed over the sensor. Additionally, an off-centered lens can cover a portion of the light source. | 10-14-2010 |
20100259766 | OPTICAL SENSORS AND METHODS FOR PROVIDING OPTICAL SENSORS - Provided herein are optical sensor devices, methods for making the same, and systems including the same. An optical sensor device, according to an embodiment, includes a light detector die and a light source die attached to the same or different die attachment substrates so that there is a space between the light source die and the light detector die. A light transmissive material covers the light detector die, the light source die and at least a portion of the space between the light detector die and the light source die. A groove is formed (e.g., saw, blade or laser cut, or cast) in the light transmissive material between the light detector die and the light source die, and an opaque material is put within the groove to provide a light barrier between the light detector die and the light source die. | 10-14-2010 |
20130207126 | OPTOELECTRONIC APPARATUSES AND METHODS FOR MANUFACTURING OPTOELECTRONIC APPARATUSES - A method for manufacturing an optoelectronic apparatus includes attaching bottom surfaces of first and second packaged optoelectronic semiconductor devices (POSDs) to a carrier substrate (e.g., a tape) so that there is a space between the first and second POSDs. An opaque molding compound is molded around portions of the first and second POSDs attached to the carrier substrate, so that peripheral surfaces of the first POSD and the second POSD are surrounded by the opaque molding compound, the space between the first and second POSDs is filled with the opaque molding compound, and the first and second POSDs are attached to one another by the opaque molding compound. The carrier substrate is thereafter removed so that electrical contacts on the bottom surfaces of the first and second POSDs are exposed. A window for each of the POSDs is formed during the molding process or thereafter. | 08-15-2013 |
20130221380 | OPTOELECTRONIC APPARATUSES WITH POST-MOLDED REFLECTOR CUPS AND METHODS FOR MANUFACTURING THE SAME - A method for manufacturing a plurality of optoelectronic apparatuses include attaching bottom surfaces of a plurality of packaged optoelectronic semiconductor devices (POSDs) to a carrier substrate (e.g., a tape) so that there is a space between each POSD and its one or more neighboring POSD(s). A light reflective molding compound is molded around a portion each of the POSDs attached to the carrier substrate so that a reflector cup is formed from the light reflective molding compound for each of the POSDs. The light reflective molding compound can also attach the POSDs to one another. Alternatively, an opaque molding compound can be molded around each POSD/reflector cup to attach the POSDs/reflector cups to one another and form a light barrier between each POSD and its neighboring POSD(s). The carrier substrate is thereafter removed so that electrical contacts on the bottom surfaces of the POSDs are exposed. | 08-29-2013 |
20140145069 | PACKAGED LIGHT DETECTOR SEMICONDUCTOR DEVICES WITH NON-IMAGING OPTICS FOR AMBIENT LIGHT AND/OR OPTICAL PROXMITY SENSING, METHODS FOR MANUFACTURING THE SAME, AND SYSTEMS INCLUDING THE SAME - Packaged light detector semiconductor devices (PLDSDs), methods for manufacturing PLDSDs, and systems including a PLDSD are described herein. In an embodiment, a PLDSD includes a light detector die having a surface including an active photosensor region, and a non-imaging optical concentrator including an entrance aperture and an exit aperture axially aligned with one another and with the active photosensor region. A molding material forms the non-imaging optical concentrator and encapsulates at least a portion of the surface of the light detector die that extends beyond the exit aperture of the non-imaging optical concentrator. The non-imaging optical concentrator concentrates light from the entrance aperture toward the exit aperture and onto the active photosensor region. In certain embodiments, a reflective material is disposed on an inner surface of the non-imaging optical concentrator, and a light transmissive molding material fills at least a portion of an inner volume of the non-imaging optical concentrator. | 05-29-2014 |
20140312377 | OPTOELECTRONIC APPARATUSES WITH POST-MOLDED REFLECTOR CUPS - An optoelectronic apparatus includes one or more packaged optoelectronic semiconductor devices (POSDs), each including one or more optoelectronic elements encapsulated by a light transmissive molding compound. Each POSD includes a top surface formed by a top surface of the light transmissive molding compound that encapsulates the one or more optoelectronic elements of the POSD. Each POSD also includes a bottom surface including electrical contacts for the one or more optoelectronic elements of the POSD. A peripheral surface extends between the top and bottom surfaces. A light reflective molding compound surrounds the peripheral surface of each POSD and forms a reflector cup for each POSD. The electrical contacts on the bottom surface of each POSD are exposed, and thus, are accessible for electrical connections to other circuitry. Where the optoelectronic apparatus includes a plurality of POSDs, the light reflective molding compound also connects neighboring POSDs to one another. | 10-23-2014 |
Patent application number | Description | Published |
20090265750 | TECHNIQUES AND SYSTEMS FOR SUPPORTING PODCASTING - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates can be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 10-22-2009 |
20110040658 | Network-Based Purchase and Distribution of Media - Methods and systems for network-based purchase and distribution of media are disclosed. The purchase and distribution of media by these methods and systems are not only secure but also controlled. The security restricts access to media within media files during downloads as well as while stored at a server and/or client. For example, a potential purchaser can search and browse through numerous media items on-line that are available for purchase. The potential purchaser can thereafter purchase one or more media items on-line with great ease. Upon purchasing a media item, the content for the media item can be downloaded over the network to the purchaser. The content for the media item is then encrypted for the purchaser's use and stored on the purchaser's machine. Thereafter, the purchaser can make use of the media item (e.g., play the media item). Improved graphical user interfaces suitable for reviewing, browsing, previewing and/or purchasing numerous media items are also disclosed. | 02-17-2011 |
20110106665 | ONLINE PURCHASE OF DIGITAL MEDIA BUNDLES - Techniques for interacting with an online media store to obtain a media asset bundle, such as a digital boxset, are disclosed. These techniques involve, for instance, browsing for a media asset bundle that includes at least one non-playable media asset, purchasing the media asset bundle, obtaining the media assets contained in the media asset bundle, determining if a presentation request has been made for a media asset in the media asset bundle, and presenting the requested media asset. Further, these techniques involve playing the media assets in a media asset bundle by selecting a media asset in the media asset bundle, determining whether the media asset is playable or non-playable, presenting the media asset using an appropriate media asset viewer if it is playable, not playing (skipping) the media asset if it is non-playable, and selecting/playing other media assets in the media asset bundle until no more media assets are available to be played. | 05-05-2011 |
20110179166 | MANAGEMENT OF PODCASTS - Improved techniques that facilitate the use of podcasts are disclosed. The improved techniques can pertain to publishing, hosting, accessing, subscribing, managing, organizing, searching, browsing, transferring, and/or playing podcasts. According to one aspect, tags are embedded into syndication feeds (e.g., RSS feeds) that may be made available for distribution by an online media store to facilitate the management of podcasts. Such tags can include a block tag that may be embedded into a syndication feed to indicate whether the feed is to be blocked from being included in the online media store. According to another aspect, management of podcasts may be facilitated by other mechanisms. In accordance with one embodiment, a user may challenge the ownership of a podcast to block or remove a podcast from the online media store. In accordance with another embodiment, images may be stored to allow efficient retrieval of the corresponding episode(s) of a podcast. | 07-21-2011 |
20120011227 | TECHNIQUES AND SYSTEMS FOR SUPPORTING PODCASTING - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates can be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 01-12-2012 |
20120192104 | Graphical User Interface for Browsing, Searching and Presenting Media Items - Improved graphical user interfaces suitable for reviewing, browsing, previewing and/or purchasing media items are disclosed. The graphical user interfaces are particularly useful for a system that provides purchase and distribution of media in a client-server environment. | 07-26-2012 |
20120284422 | TECHNIQUES AND SYSTEMS FOR SUPPORTING PODCASTING - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates can be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 11-08-2012 |
20130238640 | PODCAST ORGANIZATION AND USAGE AT A COMPUTING DEVICE - Improved techniques that facilitate the use of podcasts are disclosed. The improved techniques can pertain to publishing, hosting, accessing, subscribing, managing, organizing, searching, browsing, transferring, and/or playing podcasts. According to one aspect, tags are embedded into syndication feeds (e.g., RSS feeds) that may be made available for distribution by an online media store to facilitate the management of podcasts. In accordance with one embodiment, an explicit tag may be embedded at the feed and/or episode level to indicate that the feed and/or episode includes explicit content. In accordance with another embodiment, a duration tag may be embedded at the episode level to indicate an estimated duration associated with the episode. Upon downloading the episode, the duration may be replaced by the actual duration of the episode. In accordance with yet another embodiment, a new feed-URL tag may be embedded in a syndication feed to identify a new URL at which the feed is to be accessed. | 09-12-2013 |
20140026049 | Techniques and Systems for Supporting Podcasting - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates can be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 01-23-2014 |
20150039727 | PODCAST ORGANIZATION AND USAGE AT A COMPUTING DEVICE - Improved techniques that facilitate the use of podcasts are disclosed. The improved techniques can pertain to publishing, hosting, accessing, subscribing, managing, organizing, searching, browsing, transferring, and/or playing podcasts. According to one aspect, tags are embedded into syndication feeds (e.g., RSS feeds) that may be made available for distribution by an online media store to facilitate the management of podcasts. In accordance with one embodiment, an explicit tag may be embedded at the feed and/or episode level to indicate that the feed and/or episode includes explicit content. In accordance with another embodiment, a duration tag may be embedded at the episode level to indicate an estimated duration associated with the episode. Upon downloading the episode, the duration may be replaced by the actual duration of the episode. In accordance with yet another embodiment, a new feed-URL tag may be embedded in a syndication feed to identify a new URL at which the feed is to be accessed. | 02-05-2015 |
20150373090 | Techniques and Systems for Supporting Podcasting - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application, can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates am be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 12-24-2015 |