Patent application number | Description | Published |
20100107448 | Article of Footwear for Dancing - An article of footwear with a pivot portion including a plurality of flex grooves is disclosed. The plurality of flex grooves provides increased flexibility in different portions of a sole of the article. In addition, a periphery of the sole includes sole pods to increase the traction on the periphery of the sole. | 05-06-2010 |
20110203137 | Article of Footwear with Arch Member - An article of footwear with a pair of arch members is disclosed. The arch members provide the only structural connection between a forefoot portion of a sole and a heel portion of the sole. In particular, the arch members provide a connection between a forefoot portion and a rearward portion of the heel portion of the sole. | 08-25-2011 |
20120198727 | Tendon Assembly For an Article of Footwear - A tendon assembly for an article of footwear is disclosed. The tendon assembly includes a tendon positioned between a base layer and a cover layer in a non-bonded manner such that the tendon may move freely within the layers. The tendon assembly may be rigidly secured to a shoe upper. One end of the tendon may be rigidly secured at or near the sole of the footwear. A second portion of the tendon may be integrated with a fastening system of the footwear such that the tendon may pull the footwear upper snugly against a wearer's foot to provide added support. | 08-09-2012 |
20120233885 | Footwear Sole Structure Incorporating A Plurality Of Chambers - A plurality of fluid-filled chambers may be incorporated into sole structures of articles of footwear. The chambers may be configured to be substantially diamond-shaped. The chambers may lie within cavities formed by a lower surface of the midsole and may extend into apertures in the outsole. The apertures in the outsole may be aligned with the cavities of the midsole. The chambers may be bounded by bounding regions between and at the perimeter of the chambers. The bounding regions may be formed of a polymer foam material of the midsole. The chambers may additionally be connected. | 09-20-2012 |
20130118038 | Article of Footwear for Dancing - An article of footwear with a pivot portion including a plurality of flex grooves is disclosed. The plurality of flex grooves provides increased flexibility in different portions of a sole of the article. In addition, a periphery of the sole includes sole pods to increase the traction on the periphery of the sole. | 05-16-2013 |
20130298425 | Article of Footwear with Outsole Web and Midsole Protrusions - An article of footwear is disclosed that includes an upper, an outsole, and a midsole. The upper is configured to receive a foot, and the outsole is secured to the upper. The outsole defines a plurality of apertures extending entirely through the outsole. In addition, the outsole has a ground-engaging surface positioned at a first elevation. The midsole is positionable such that a lower surface of the midsole extends into the apertures of the outsole and is exposed by the apertures. | 11-14-2013 |
20150068065 | Article of Footwear with Outsole Web and Midsole Protrusions - An article of footwear is disclosed that includes an upper, an outsole, and a midsole. The upper is configured to receive a foot, and the outsole is secured to the upper. The outsole defines a plurality of apertures extending entirely through the outsole. In addition, the outsole has a ground-engaging surface positioned at a first elevation. The midsole is positionable such that a lower surface of the midsole extends into the apertures of the outsole and is exposed by the apertures. | 03-12-2015 |
20150143716 | Article Of Footwear Incorporating A Knitted Component With Body And Heel Portions - An article of footwear may include a knitted component formed of multiple knitted component portions. The knitted component includes a body portion and a heel portion. The body portion is formed of unitary knit construction and extends through a forefoot region, a midfoot region, and at least partially into a heel region of the article of footwear. The heel portion is formed of unitary knit construction and extends through the heel region and includes a cuff that defines a throat opening of the upper for receiving a foot. The body portion and the heel portion are joined along adjacent edges to form the knitted component. Knitting directions of the knitted component portions vary along the adjacent edges. An overlay element may also be provided to cover a seam attaching the adjacent edges of the knitted component portions. | 05-28-2015 |
Patent application number | Description | Published |
20120056943 | FLUID-EJECTION PRINTHEAD DIE HAVING AN ELECTROCHEMICAL CELL - A fluid-ejection printhead die includes a fluid-ejection firing element and an electrochemical cell. The fluid-ejection firing element is to cause droplets of fluid to be ejected from the fluid-ejection printhead die. The electrochemical cell is to measure an electrical property of the fluid. The fluid-ejection firing element and the electrochemical cell are both part of the fluid-ejection printhead die. | 03-08-2012 |
20140318957 | ELECTROCHEMICAL SENSING WELL - A well is formed in a body of dielectric material and has a chamfered edge about a top side of the well. A top electrode layer is on a top face of the body and on the chamfered edge of the well. A bottom electrode is on a floor of the well. | 10-30-2014 |
20150070446 | FLUID EJECTION DEVICE WITH ACEO PUMP - In an embodiment, a fluid ejection device includes a fluidic channel having first and second ends and a drop generator disposed within the channel. A fluid reservoir is in fluid communication with the first and second ends of the channel, and an alternating-current electro-osmotic (ACEO) pump is disposed within the channel to generate net fluid flow from the reservoir at the first end, through the channel, and back to the reservoir at the second end. | 03-12-2015 |
20160075136 | THERMAL INKJET PRINTHEAD STACK WITH AMORPHOUS THIN METAL PROTECTIVE LAYER - The present disclosure is drawn to a thermal inkjet printhead stack with an amorphous thin metal protective layer, comprising an insulated substrate, a resistor applied to the insulated substrate, a resistor passivation layer applied to the resistor, and an amorphous thin metal protective layer applied to the resistor passivation layer. The amorphous thin metal protective layer can comprise from 5 atomic % to 90 atomic % of a metalloid of carbon, silicon, or boron. The film can also include a first and second metal, each comprising from 5 atomic % to 90 atomic % of titanium, vanadium, chromium, cobalt, nickel, zirconium, niobium, molybdenum, rhodium, palladium, hafnium, tantalum, tungsten, iridium, or platinum. The second metal is different than the first metal, and the metalloid, the first metal, and the second metal account for at least 70 atomic % of the amorphous thin metal protective layer. | 03-17-2016 |
Patent application number | Description | Published |
20100223457 | GENERATION AND/OR RECEPTION, AT LEAST IN PART, OF PACKET INCLUDING ENCRYPTED PAYLOAD - An embodiment may include circuitry to generate, at least in part, and/or receive, at least in part, a packet. The packet may include at least one field and an encrypted payload. The at least one field may include, at least in part, a first key and/or at least one value. The first key and at least one value, as included in the at least one field, may be encrypted by a second key. The encrypted payload may be capable of being decrypted, at least in part, based, at least in part, upon the first key and/or the at least one value to yield an unencrypted payload. The unencrypted payload may include at least a portion of application layer data that is to be communicated in a secure session. | 09-02-2010 |
20100250797 | PLATFORM BASED VERIFICATION OF CONTENTS OF INPUT-OUTPUT DEVICES - A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions. | 09-30-2010 |
20130283383 | PLATFORM BASED VERIFICATION OF CONTENTS OF INPUT-OUTPUT DEVICES - A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions. | 10-24-2013 |
20160070910 | PLATFORM BASED VERIFICATION OF CONTENTS OF INPUT-OUTPUT DEVICES - A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions. | 03-10-2016 |
Patent application number | Description | Published |
20110161677 | SEAMLESSLY ENCRYPTING MEMORY REGIONS TO PROTECT AGAINST HARDWARE-BASED ATTACKS - Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction. | 06-30-2011 |
20120117348 | TECHNIQUES FOR SECURITY MANAGEMENT PROVISIONING AT A DATA STORAGE DEVICE - Techniques for a data storage device to locally implement security management functionality. In an embodiment, a security management process of the data storage device is to determine whether an access to non-volatile media of the data storage device is authorized. In certain embodiments, the data storage device is to restrict access to a secure region of the non-volatile storage media, the secure region to store information used and/or generated by a security management process of the data storage device. | 05-10-2012 |
20120166812 | METHOD, APPARATUS AND SYSTEM FOR SECURE COMMUNICATION OF RADIO FRONT END TEST/CALIBRATION INSTRUCTIONS - Techniques for a programmable engine to provide security mechanisms protecting information which is in support of testing and/or calibration a radio front end. In an embodiment, test/calibration information is to be communicated to, from or within the programmable engine for processing by a particular resource of the programmable engine. In another embodiment, test/calibration is exchanged along a dedicated hardware data path between a security module of the programmable engine and an execution module of the programmable engine, wherein any data exchanged in the dedicated hardware data path is only accessible from the dedicated hardware data path via one or both of the security module and the execution module. | 06-28-2012 |
20130279690 | PRESERVING IMAGE PRIVACY WHEN MANIPULATED BY CLOUD SERVICES - An apparatus and method for preserving image privacy when manipulated by cloud services includes middleware for receiving an original image, splitting the original image into two sub-images, where the RGB pixel values of the sub-images have a bit value that is less than RGB pixel values of the original image. The sub-images are encrypted by adding a keystream to the RGB pixel values of the sub-images. The sub-image data is transmitted to a cloud service such as a social network or photo-sharing site, which manipulate the images by resizing, cropping, filtering, or the like. The sub-image data is received by the middleware and is successfully decrypted irrespective of the manipulations performed by the cloud services. In an alternative embodiment, the blocks of the original image are permutated when encrypted, and then reverse-permutated when decrypted. | 10-24-2013 |
20130311777 | SYMMETRIC KEY DISTRIBUTION FRAMEWORK FOR THE INTERNET - A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key. | 11-21-2013 |
20140032924 | MEDIA ENCRYPTION BASED ON BIOMETRIC DATA - Embodiments of techniques and systems for biometric-data-based media encryption are described. In embodiments, an encryption key may be created for a recipient user based at least in part on biometric data of the recipient user. This encryption key may be maintained on a key maintenance component and used by a sharing user to encrypt a media file for access by the recipient user. One or more access policies associated with recipient user may be encrypted in the encrypted media file as well. In embodiments, the media file may be encrypted for use by multiple recipient users. When a recipient user desires to access the encrypted media file, a decryption key may be generated in real time based on contemporaneously captured biometric data and used to provide access to the encrypted media file. Other embodiments may be described and claimed. | 01-30-2014 |
20140040632 | LOW-OVERHEAD CRYPTOGRAPHIC METHOD AND APPARATUS FOR PROVIDING MEMORY CONFIDENTIALITY, INTEGRITY AND REPLAY PROTECTION - A method and system to provide a low-overhead cryptographic scheme that affords memory confidentiality, integrity and replay-protection by removing the critical read-after-write dependency between the various levels of the cryptographic tree. In one embodiment of the invention, the cryptographic processing of a child node can be pipelined with that of the parent nodes. This parallelization provided by the invention results in an efficient utilization of the cryptographic pipeline, enabling significantly lower performance overheads. | 02-06-2014 |
20140044258 | METHODS AND SYSTEMS FOR CRYPTOGRAPHIC ACCESS CONTROL OF VIDEO - Methods and systems for cryptographic access control of multimedia video, include embedding as metadata access control policy (ACP) information, including authorization rules and cryptographic information tied to an encryption policy, into encrypted video. An authorized receiver device having credentials and/or capabilities matched to the authorization rules is able to extract the ACP information from the encrypted video and use it to decrypt and properly render the video. | 02-13-2014 |
20140101461 | PARALLELIZED COUNTER TREE WALK FOR LOW OVERHEAD MEMORY REPLAY PROTECTION - A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks along a counter tree structure. The memory encryption engine upon receiving an incoming read request for the protected memory region, performs a dependency check operation to identify dependency between the incoming read request and an in-process request and to remove the dependency when the in-process request is a read request that is not currently suspended. | 04-10-2014 |
20140137231 | INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC) - In one embodiment, the present invention includes a system on a chip (SoC) that has a first agent with an intellectual property (IP) logic, an interface to a fabric including a target interface, a master interface and a sideband interface, and an access control plug-in unit to handle access control policy for the first agent with respect to incoming and outgoing transactions. This access control plug-in unit can be incorporated into the SoC at integration time and without any modification to the IP logic. Other embodiments are described and claimed. | 05-15-2014 |
20140208109 | METHOD AND SYSTEM FOR PROTECTING MEMORY INFORMATION IN A PLATFORM - A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength. | 07-24-2014 |
20150074419 | SECURE VAULT SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT - Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed. | 03-12-2015 |
20150134952 | SECURE VAULT SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT - Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed. | 05-14-2015 |
20150161059 | MEMORY INTEGRITY - Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits. | 06-11-2015 |
20150186295 | Bridging Circuitry Between A Memory Controller And Request Agents In A System Having Multiple System Memory Protection Schemes - A processor is described that includes one or more processing cores. The processor includes a memory controller to interface with a system memory having a protected region and a non protected region. The processor includes a protection engine to protect against active and passive attacks. The processor includes an encryption/decryption engine to protect against passive attacks. The protection engine includes bridge circuitry coupled between the memory controller and the one or more processing cores. The bridge circuitry is also coupled to the protection engine and the encryption/decryption engine. The bridge circuitry is to route first requests directed to the protected region to the protection engine and to route second requests directed to the non protected region to the encryption/decryption engine. | 07-02-2015 |
20150189509 | APPARATUS, SYSTEM AND METHOD OF PROTECTING DOMAINS OF A MULTIMODE WIRELESS RADIO TRANSCEIVER - Some demonstrative embodiments include apparatuses, systems and/or methods of protecting domains of a multimode wireless radio transceiver. For example, an apparatus may include a protection domain controller (PDC) to restrict access of a configuration software to a protection domain of a plurality of protection domains of a multimode wireless radio transceiver based on a security level of the configuration software, wherein the protection domain includes one or more radio configuration parameters of the multimode wireless radio transceiver. | 07-02-2015 |
20150205732 | SEAMLESSLY ENCRYPTING MEMORY REGIONS TO PROTECT AGAINST HARDWARE-BASED ATTACKS - Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction. | 07-23-2015 |
20150304286 | SYMMETRIC KEY DISTRIBUTION FRAMEWORK FOR THE INTERNET - A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key. | 10-22-2015 |