Power management within a wireless communication system
    3.
    发明授权
    Power management within a wireless communication system 有权
    无线通信系统内的电源管理

    公开(公告)号:US07274929B1

    公开(公告)日:2007-09-25

    申请号:US10320177

    申请日:2002-12-16

    CPC classification number: H04W52/0258 Y02D70/142 Y02D70/144

    Abstract: Enhanced power management is achieved in a wireless communication system. In one aspect of the invention, power management profiles related to application type are used to achieve enhanced power management. In another aspect of the invention, the interval at which buffered broadcast and multicast traffic is transmitted to users in a network is adjusted during system operation based on a predetermined adjustment criterion to achieve enhanced power management.

    Abstract translation: 在无线通信系统中实现增强的功率管理。 在本发明的一个方面,使用与应用类型相关的功率管理简档来实现增强的功率管理。 在本发明的另一方面,基于预定的调整标准,在系统操作期间调整向网络中的用户发送缓冲的广播和组播业务的间隔,以实现增强的电力管理。

    Apparatus And Method To Protect Digital Content
    4.
    发明申请
    Apparatus And Method To Protect Digital Content 有权
    保护数字内容的设备和方法

    公开(公告)号:US20140281584A1

    公开(公告)日:2014-09-18

    申请号:US13833119

    申请日:2013-03-15

    Abstract: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within the memory, and if the destination address is associated with a memory location stores a portion of the digital content, erase the page associated with the memory location. If the destination address is associated with another memory location that does not store any of the digital content, the protection logic is to permit execution of the write instruction. Other embodiments are described and claimed.

    Abstract translation: 在本发明的一个实施例中,处理器包括内容存储逻辑,用于将数字内容解析为部分并使每个部分被存储到存储器的对应页面中。 处理器还包括用于接收具有存储器内的目的地地址的写入指令的保护逻辑,并且如果目的地址与存储器位置相关联地存储数字内容的一部分,则擦除与存储器位置相关联的页面。 如果目的地地址与不存储任何数字内容的另一存储器位置相关联,则保护逻辑允许执行写指令。 描述和要求保护其他实施例。

    Speech recognition command via an intermediate mobile device
    5.
    发明授权
    Speech recognition command via an intermediate mobile device 有权
    通过中间移动设备的语音识别命令

    公开(公告)号:US07184960B2

    公开(公告)日:2007-02-27

    申请号:US10187232

    申请日:2002-06-28

    CPC classification number: G10L15/30

    Abstract: According to an embodiment of the invention, a physical location of a mobile device is determined, and a determination is made that a subject device is available for command via the mobile device based at least in part on the physical location of the mobile device. Information regarding voice recognition capability of the subject device is transferred to the mobile device. A voice command is received by the mobile device, the voice command is interpreted, and an instruction is provided to the subject device based at least in part on the voice command.

    Abstract translation: 根据本发明的实施例,确定移动设备的物理位置,并且至少部分地基于移动设备的物理位置来确定主题设备可经由移动设备可用于命令。 关于被摄体设备的语音识别能力的信息被传送到移动设备。 语音命令由移动设备接收,语音命令被解释,并且至少部分地基于语音命令向目标设备提供指令。

    REPEATABLE APPLICATION-SPECIFIC ENCRYPTION KEY DERIVATION USING A HIDDEN ROOT KEY
    6.
    发明申请
    REPEATABLE APPLICATION-SPECIFIC ENCRYPTION KEY DERIVATION USING A HIDDEN ROOT KEY 审中-公开
    可重复的应用特定加密使用隐藏根密钥进行主要衍生

    公开(公告)号:US20150030153A1

    公开(公告)日:2015-01-29

    申请号:US13995296

    申请日:2012-02-09

    Abstract: Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption engine. The execution hardware is to execute instructions to deterministically generate an application-specific encryption key using the encryption algorithm.

    Abstract translation: 公开了用于可重复应用特定加密密钥导出的发明的实施例。 在一个实施例中,处理器包括根密钥,加密引擎和执行硬件。 加密引擎是使用根密钥执行加密操作,其中根密钥仅可由加密引擎访问。 执行硬件是执行指令以使用加密算法确定性地生成特定于应用的加密密钥。

    Automatic device assignment through programmable device discovery for policy based network management
    7.
    发明授权
    Automatic device assignment through programmable device discovery for policy based network management 有权
    通过可编程设备发现自动设备分配,用于基于策略的网络管理

    公开(公告)号:US06611863B1

    公开(公告)日:2003-08-26

    申请号:US09587291

    申请日:2000-06-05

    CPC classification number: H04L41/12 H04L41/0213 H04L41/0896

    Abstract: A technique for automatically identifying and assigning devices to device proxies in a policy based network management system is described. Each device proxy registers a filter with the device discovery. The filter may identify one or more characteristics of devices and may also include a communications protocol to be used by the device discovery to communicate with devices. The device discovery, preferably using the specified protocol, obtains device specific information and then identifies devices in the network that match the filters. The device discovery notifies each device proxy of which devices match the proxy's filter. Each device proxy updates its list of devices that it can policy manage based on the notification from the device discovery. Control policies are distributed from a policy server to each of the device proxies. Each device proxy then sends a policy to one or more devices to be policy managed.

    Abstract translation: 描述了一种在基于策略的网络管理系统中自动识别和分配设备到设备代理的技术。 每个设备代理都会使用设备发现注册过滤器。 滤波器可以识别设备的一个或多个特性,并且还可以包括要由设备发现使用以与设备进行通信的通信协议。 设备发现,优选地使用指定的协议,获得设备特定信息,然后识别网络中与过滤器匹配的设备。 设备发现通知每个设备代理哪些设备与代理的过滤器匹配。 每个设备代理根据设备发现的通知更新其可以策略管理的设备列表。 控制策略从策略服务器分发到每个设备代理。 每个设备代理然后将策略发送到要策略管理的一个或多个设备。

    HARDWARE ATTESTATION TECHNIQUES
    8.
    发明申请
    HARDWARE ATTESTATION TECHNIQUES 审中-公开
    硬件测试技术

    公开(公告)号:US20110154501A1

    公开(公告)日:2011-06-23

    申请号:US12646582

    申请日:2009-12-23

    Abstract: Hardware attestation techniques are described. An apparatus may comprise a platform comprising a processor capable of operating in an isolated execution mode and persistent storage having entity information associated with an entity having control of a software application. The platform may include a security controller communicatively coupled to the platform, the security controller having a signature generator operative to generate a platform signature for the software application executing on the platform, the platform signature comprising a cryptographic hash of entity information, and an attest module operative to provide the platform signature to the software application with the platform signature to attest that that the platform is associated with the software application. Other embodiments are described and claimed.

    Abstract translation: 描述硬件认证技术。 装置可以包括平台,该平台包括能够以隔离执行模式操作的处理器和具有与具有软件应用控制的实体相关联的实体信息的持久存储器。 所述平台可以包括通信地耦合到所述平台的安全控制器,所述安全控制器具有签名生成器,用于生成用于在所述平台上执行的所述软件应用的平台签名,所述平台签名包括实体信息的密码散列,以及证明模块 用于向软件应用程序提供具有平台签名的平台签名,以证明平台与软件应用程序相关联。 描述和要求保护其他实施例。

    Automatic device assignment through programmable device discovery for policy based network management
    10.
    发明授权
    Automatic device assignment through programmable device discovery for policy based network management 有权
    通过可编程设备发现自动设备分配,用于基于策略的网络管理

    公开(公告)号:US06859827B2

    公开(公告)日:2005-02-22

    申请号:US10443040

    申请日:2003-05-22

    CPC classification number: H04L41/12 H04L41/0213 H04L41/0896

    Abstract: A technique for automatically identifying and assigning devices to device proxies in a policy based network management system is described. Each device proxy registers a filter with the device discovery. The filter may identify one or more characteristics of devices and may also include a communications protocol to be used by the device discovery to communicate with devices. The device discovery, preferably using the specified protocol, obtains device specific information and then identifies devices in the network that match the filters. The device discovery notifies each device proxy of which devices match the proxy's filter. Each device proxy updates its list of devices that it can policy manage based on the notification from the device discovery. Control policies are distributed from a policy server to each of the device proxies. Each device proxy then sends a policy to one or more devices to be policy managed.

    Abstract translation: 描述了一种在基于策略的网络管理系统中自动识别和分配设备到设备代理的技术。 每个设备代理都会使用设备发现注册过滤器。 滤波器可以识别设备的一个或多个特性,并且还可以包括要由设备发现使用以与设备进行通信的通信协议。 设备发现,优选地使用指定的协议,获得设备特定信息,然后识别网络中与过滤器匹配的设备。 设备发现通知每个设备代理哪些设备与代理的过滤器匹配。 每个设备代理根据设备发现的通知更新其可以策略管理的设备列表。 控制策略从策略服务器分发到每个设备代理。 每个设备代理然后将策略发送到要策略管理的一个或多个设备。

Patent Agency Ranking