Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Lyle W. Paczkowski, Mission Hills US

Lyle W. Paczkowski, Mission Hills, KS US

Patent application numberDescriptionPublished
20100036933Dynamic Portal Creation Based on Personal Usage - Methods, media and systems are provided for generating a dynamic web portal in a wireless network, and the portal is based on personal usage. An initialized portal contains no web content. Systems include one or more network elements configured to monitor requests for resource components, to generate web portals, and to dynamically update the portals based on the requests for resource components. Data structures embodied on a computer-readable media are included for storing numerical data regarding the requests and for storing a plurality of portals. The dynamic web portal is updated to contain component resources from visited web pages, each having a respective universal resource locator (URL) or portion of code with which it is associated. Requests for resources are monitored and added to a web portal when a specified threshold is surpassed so that an updated web portal can be presented.02-11-2010
20110211531Method and System for Selective Application of Cellular-PBX Integration Service - A method and system for selectively applying a cellular-PBX integration service. When a radio access network (RAN) receives a call request seeking to set up a call for a cellular wireless communication device (WCD) that is operating in the coverage area of the RAN, a determination is made as to whether the WCD is currently checked-into a cellular-PBX integration service. A service control point (SCP), for instance, may make the determination. If the determination is that the WCD is currently checked-in, then the call is set up to an IP PBX server that services the WCD, and the IP PBX server may then handle the call as it would handle a call placed to any IP PBX extension. Further, differential billing can be applied, charging an enterprise billing-account for the call if the WCD is checked-in, and charging a WCD billing-account for the call if the WCD is not checked-in.09-01-2011
20130305333Web Server Bypass of Backend Process on Near Field Communications and Secure Element Chips - A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure element; a web browser; a near field communications system; an over-the-air proxy; an application programming interface layer; and a web server residing on a secure storage area of the mobile access terminal, wherein the web browser is provided with exclusive access to the web server.11-14-2013
20130345530End-to-End Trusted Communications Infrastructure - A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being by a first sensor, obtaining a biometric from the human being by a second sensor, receiving input from the first and second sensors by a secure application executing in a trusted security zone of a processor, whereby access to the input from the first and second sensors by applications executing in a normal partition of the processor is blocked, wherein the input from the first and second sensors comprises the measurement of the parameter and the biometric, and transmitting a message based on the input from the first and second sensors via a trusted end-to-end communication link to a medical data server, wherein an application that receives the message executes in a trusted security zone of the server.12-26-2013
20140033316TRUSTED SECURITY ZONE ACCESS TO PERIPHERAL DEVICES - A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.01-30-2014
20140047548Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device - A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.02-13-2014
20140281544Trusted Security Zone Containers for the Protection and Confidentiality of Trusted Service Manager Data - Embodiments relate generally to systems and methods for providing access to a trusted security zone container within a trusted security zone of a mobile device. An application may receive trusted service manager validation data from a trusted service manager. The application may also receive a trusted security zone master key, wherein the trusted security zone master key provides access to a plurality of trusted security zone containers within the trusted security zone. The application may hash the trusted service manager validation data with the trusted security zone master key. The application may generate the trusted security zone sub key based on hashing to access one or more containers. One or more signal may be transmitted to provision the set of one or more trusted security zone containers with the trusted security zone sub key. The application may provide the sub key to the trusted service manager to access a container.09-18-2014
20160004876Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device - A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.01-07-2016

Patent applications by Lyle W. Paczkowski, Mission Hills, KS US

Website © 2016 Advameg, Inc.