Patent application number | Description | Published |
20120093318 | Encryption Key Destruction For Secure Data Erasure - Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key material retained in a memory of a storage device renders the device securely erased, even when the device is otherwise inoperable. The memory (e.g. non-volatile, such as flash) stores key material for encrypting/decrypting storage data for the device. An eraser provides power and commands to the memory, even when all or any portion of the device is inoperable. The commands (e.g. erase or write) enable zeroizing or destroying the key material, rendering data encrypted with the destroyed key material inaccessible, and therefore securely erased. Alternatively, the memory is a removable component (e.g. an external security device or smartcard) coupled to the device during storage operation. Removing and physically destroying the memory renders the device securely erased. The device and/or the memory are sealed to enable tamper detection. | 04-19-2012 |
20150304108 | Encryption Key Destruction For Secure Data Erasure - Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key material retained in a memory of a storage device renders the device securely erased, even when the device is otherwise inoperable. The memory (e.g. non-volatile, such as flash) stores key material for encrypting/decrypting storage data for the device. An eraser provides power and commands to the memory, even when all or any portion of the device is inoperable. The commands (e.g. erase or write) enable zeroizing or destroying the key material, rendering data encrypted with the destroyed key material inaccessible, and therefore securely erased. Alternatively, the memory is a removable component (e.g. an external security device or smartcard) coupled to the device during storage operation. Removing and physically destroying the memory renders the device securely erased. The device and/or the memory are sealed to enable tamper detection. | 10-22-2015 |
Patent application number | Description | Published |
20090037204 | METHOD FOR PROVIDING PRODUCT SAFETY TO A MANUFACTURED ITEM USING A MULTIPLE USE VERIFICATION CODE - In a method and system for providing product safety to a manufactured item, a verification code is associated with the manufactured item. The verification code is initialized to an unvalidated state. The manufactured item is then supplied with this verification code hidden from view. The verification code may be exposed by a user and submitted to a validation service for validation for any number of occasions. In response to the validation service receiving the verification code for validation, the user is provided with an indicator of a current state of the verification code. A first successful validation of the verification code is then used as an event that triggers a state transition of the verification code from the unvalidated state to a validated state. | 02-05-2009 |
20090212101 | METHOD AND SYSTEM FOR PROVIDING PRODUCT SAFETY TO A MANUFACTURED ITEM WITH VERIFICATION CODES - In a method and system for providing anti-counterfeit and product safety to a manufactured item, two substantially unique verification codes, one readable and the other hidden, are associated and supplied with the manufactured item. The verification codes are initialized to a first state at a validation service. Either or both codes may be submitted to a validation service for validation for any number of occasions, with the validation service responding with a message appropriate to the current state of the code. When the hidden verification code is exposed and submitted to the validation service for validation, a first successful validation is used as an event that triggers a state transition of both the readable and the hidden verification codes from the first state to a second state. | 08-27-2009 |
20100017330 | PROTECTING A MANUFACTURED ITEM FROM COUNTERFEITING - A method and system are described for protecting a manufactured item from counterfeiting. The manufactured item, which is marked with an identifier, such as a serial number, is associated with a code generator that has secret functions and data for generating verification codes. The manufactured item is then supplied along with the corresponding code generator. Thereafter, the identifier from the manufactured item and the verification code generated by the code generator are used to verify authenticity of the manufactured item. | 01-21-2010 |
20100153281 | SYSTEM AND METHOD FOR INITIATING WARRANTY COVERAGE AND PROVIDING WARRANTY STATUS FOR A MANUFACTURED ITEM - In a system and method for initiating warranty coverage and providing warranty status for a manufactured item, an electronic device with a destructible extrusion is associated and supplied with the manufactured item, where detachment, unplugging, cutting, or tearing of the destructible extrusion is detected and initiates warranty coverage. The electronic device with the destructible extrusion is then attached in such a way as to require detachment, unplugging, cutting, or tearing of the destructible extrusion during an event that is appropriate to initiate warranty coverage. This may be the opening of the manufactured item's package, or it may be required before the manufactured item can be put to use. | 06-17-2010 |
Patent application number | Description | Published |
20100271370 | METHOD FOR DISTRIBUTED CLIPPING OUTSIDE OF VIEW VOLUME - A distributed clipping scheme is provided, view frustum culling is distributed in several places in a graphics processing pipeline to simplify hardware implementation and improve performance. In general, many 3D objects are outside viewing frustum. In one embodiment, clipping is performed on these objects with a simple algorithm in the PA module, such as near Z clipping, trivial rejection and trivial acceptance. In one embodiment, the SE and RA modules perform the rest of clipping, such as X, Y and far Z clipping. In one embodiment, the SE module performs clipping by way of computing a initial point of rasterization. In one embodiment, the RA module performs clipping by way of conducting the rendering step of the rasterization process. This approach distributes the complexity in the graphics processing pipeline and makes the design simpler and faster, therefore design complexity, cost and performance may all be improved in hardware implementation. | 10-28-2010 |
20110102443 | Virtualized GPU in a Virtual Machine Environment - Methods and systems are disclosed for virtualizing a graphics accelerator such as a GPU. In one embodiment, a GPU can be paravirtualized. Rather than modeling a complete hardware GPU, paravirtualization may provide for an abstracted software-only GPU that presents a software interface different from that of the underlying hardware. By providing a paravirtualized GPU, a virtual machine may enable a rich user experience with, for example, accelerated 3D rendering and multimedia, without the need for the virtual machine to be associated with a particular GPU product. | 05-05-2011 |
20130181998 | PARA-VIRTUALIZED HIGH-PERFORMANCE COMPUTING AND GDI ACCELERATION - The present invention extends to methods, systems, and computer program products for para-virtualized GPGPU computation and GDI acceleration. Some embodiments provide a compute shader to a guest application within a para-virtualized environment. A vGPU in a child partition presents compute shader DDIs for performing GPGPU computations to a guest application. A render component in a root partition receives compute shader commands from the vGPU and schedules the commands for execution at the physical GPU. Other embodiments provide GPU-accelerated GDI rendering capabilities to a guest application within a para-virtualized environment. A vGPU in a child partition provides an API for receiving GDI commands, and sends GDI commands and data to a render component in a root partition. The render component schedules the GDI commands on a 3D rendering device. The 3D rendering device executes the GDI commands at the physical GPU using a sharable GDI surface. | 07-18-2013 |
20130181999 | PARA-VIRTUALIZED DOMAIN, HULL, AND GEOMETRY SHADERS - The present invention extends to methods, systems, and computer program products for providing domain, hull, and geometry shaders in a para-virtualized environment. As such, a guest application executing in a child partition is enabled use a programmable GPU pipeline of a physical GPU. A vGPU (executing in the child partition) is presented to the guest application. The vGPU exposes DDIs of a rendering framework. The DDIs enable the guest application to send graphics commands to the vGPU, including commands for utilizing a domain shader, a hull shader, and/or a geometric shader at a physical GPU. A render component (executing within the root partition) receives physical GPU-specific commands from the vGPU, including commands for using the domain shader, the hull shader, and/or the geometric shader. The render component schedules the physical GPU-specific command(s) for execution at the physical GPU. | 07-18-2013 |
Patent application number | Description | Published |
20100201615 | Touch and Bump Input Control - A touch and motion sensitive input control configured to use a combination of touch sensor output and motion sensor output to determine if an input event has occurred at an input area. The touch and motion sensitive input control can detect a particular input event (e.g., a button press) when a touch sensor detects a touch at a particular input area at around the same time as a motion sensor detects a change in motion. Based on the amount and nature of the motion detected, this can indicate that a user intended to cause an input event other than one caused by a mere touching of the input area. | 08-12-2010 |
20140247567 | EJECTABLE COMPONENT ASSEMBLIES IN ELECTRONIC DEVICES - Electronic devices are provided with ejectable component assemblies that can be substantially flush with the external surfaces of the housings of the devices, despite variations in their manufacture. The ejectable component assemblies may include connectors coupled to circuit boards of the devices, and trays that can be loaded with removable modules, inserted through openings in the housings of the devices, and into the connectors for functionally aligning the removable modules with the circuit boards. The ejectable component assemblies may also include ejectors coupled to the housings of the devices for ejecting the trays from the connectors and, thus, from the devices themselves. | 09-04-2014 |
20140307370 | COLD WORKED METAL HOUSING FOR A PORTABLE ELECTRONIC DEVICE - A cold worked stainless steel bezel for a portable electronic device. The bezel is secured flush to a housing to form part of the case of the portable electronic device. A brace that includes a slot for receiving a wall extending from the bezel is fixed to the housing. When the bezel engages the housing, the wall of the bezel is inserted in the slot of the brace and releasably held by a spring that engages both the brace and the wall. The bezel can be released by disengaging the spring. The bezel is hard and resistant to impacts. Cold worked steel also facilitates manufacturing within design constraints and tolerances, and requires very little machining after manufacturing to comply with those constraints. the portable electronic device may include a personal media device, a mobile telephone, or any other suitable device or combination thereof. | 10-16-2014 |
20150122540 | HIGH TOLERANCE CONNECTION BETWEEN ELEMENTS - An electronic device may include a ring-shaped housing member defining an interior volume. The ring-shaped housing member may be configured to receive electronic device components. The ring-shaped housing member may include a first element comprising an angled region, and a second element comprising an angled region. A first intermediate element may be placed between the first and second elements, where the intermediate element is secured to internal surfaces of each of the first and second elements such that the first and second elements do not overlap. The first intermediate element may fasten the first and second elements to one another, and electrically isolate the first and second elements from one another. | 05-07-2015 |
20150370376 | Force Determination Based on Capacitive Sensing - A device configured to determine the location and magnitude of a touch on a surface of the device. The device includes a transparent touch sensor that is configured to detect a location of a touch on the transparent touch sensor. The device also includes a force-sensing structure disposed at the periphery of the transparent touch sensor. The force sensor includes an upper capacitive plate and a compressible element disposed on one side of the upper capacitive plate. The force sensor also includes a lower capacitive plate disposed on a side of the compressible element that is opposite the upper capacitive plate. | 12-24-2015 |
20160054537 | Protection and Assembly of Outer Glass Surfaces of an Electronic Device Housing - Improved housings for electronic devices are disclosed. An electronic device housing can make use of at least one outer member (e.g., cover) that can be aligned, protected and/or secured with respect to other portions of the housing for the electronic device. In one embodiment, an electronic device housing can have one or more outer members (e.g., exposed major surfaces), such as front or back surfaces, that are formed of glass. Protective sides can be provided in some embodiments to protect the edges of the one or more glass surfaces so as to dissipate impact forces and thus reduce damage to the electronic device housing. The one or more glass surfaces can be part of outer member assemblies that can be secured to other portions of the electronic device housing. The electronic device can be portable and in some cases handheld. | 02-25-2016 |
Patent application number | Description | Published |
20090184435 | CONTROLLING THE SYNTHESIS AND GEOMETRY OF LIPID TUBULE NETWORKS - Nano-sized lipid vesicles with tailored properties are used as building blocks to generate lipid tubules between two glass surfaces. The tubules formed not only have defined orientation, width, and length, but they can also grow to be as long as 13 mm under ambient conditions, without externally supplied flow, temperature control, or catalyzing agents. The tubule membrane and its internal aqueous content can be manipulated by controlling the combination of different vesicle's lipid composition and aqueous entrapment. This self-assembly process opens up new pathways for generating complicated and flexible architectures for use in biocompatible molecular and supramolecular engineering. Aspects of the invention generate, for example, tubules encapsulated with siRNA, tubules with multiple branches, and polymerized fluorescent tubules in a single-throughput self-assembly process. | 07-23-2009 |
20110193270 | SYSTEMS FOR AND METHODS OF MANUFACTURING MICRO-STRUCTURES - Methods of and devices for making pores, nozzles, and slits are described. In some embodiments, the methods create pattern in the molded substrate by controlling the location and direction of a controlled flow stream through molding plates. The molding plate contains a predefined pattern that is able to be used to create the desired pattern in the molding plate. | 08-11-2011 |