Patent application number | Description | Published |
20080250406 | Virtual Machine Support for Metered Computer Usage - A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring | 10-09-2008 |
20080319779 | Activation system architecture - Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound. | 12-25-2008 |
20100037325 | Enhanced Packaging for PC Security - A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers. | 02-11-2010 |
20120005721 | PROCESSING UNIT ENCLOSED OPERATING SYSTEM - A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data, and subsystem functions such as a secure clock, policy management, and policy enforcement. Data in functions within the secure memory are not accessible from outside the processing unit. | 01-05-2012 |
20140095394 | ACTIVATION SYSTEM ARCHITECTURE - Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound. | 04-03-2014 |
20150067768 | ZONE POLICY ADMINISTRATION FOR ENTITY TRACKING AND PRIVACY ASSURANCE - The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected. | 03-05-2015 |
20150215245 | USER INTERFACE FOR GRAPHICAL REPRESENTATION OF AND INTERACTION WITH ELECTRONIC MESSAGES - A method and a device are disclosed including a user interface configured to display and manage grouped graphical representations of electronic data and messages, such as files and emails, that can be zoomed in to access different types of information and details about one or a group of messages. The user interface further allows searching for, dispositioning, and taking various actions on one or a group of messages. In various embodiments, the graphical representation includes grids of grids or tiles, and in other embodiments, it includes fractal representations such as quadratic fractals. At least four types of zoom operations are disclosed including digital zoom to enlarge images, context-zoom to show different information types about messages like folders, categories, collections, etc. depending on context; semantic-zoom to show different data depending on level of detail; and metadata-zoom to show metadata about a message such as timestamp, existence of attachments, and the like. | 07-30-2015 |
20150264024 | SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING - A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks. | 09-17-2015 |
Patent application number | Description | Published |
20090205141 | MULTI-PURPOSE UNTENSIL - The Multi-Purpose Utensil is kitchen tool that has a plurality of functions such as a peeler, julienne, sharpener, pitter, among others. | 08-20-2009 |
20090212583 | ELEVATED LOCKING TONGS - The object of the Kitchen Tongs With Integrated Elevating Feet is to provide an easy to use locking system which allows the user to lock the tong in the closed position. Additionally, the tongs are supported so that when they are placed on a horizontal surface the end used for grasping food or other items is raised above the horizontal surface on which they are placed. | 08-27-2009 |
20100050378 | TILTED UP HANDLE - The instant invention provides a stable, ergonomic handle that can be used with any type of kitchen utensil or other tool. | 03-04-2010 |
20100119674 | TEA PRESS - The purpose of the current invention, the Tea Press, is to provide the user with a beverage infuser that can be used away from a kitchen. It is compact enough to be carried in a purse or bag and has a location to store loose tea. After using the Tea Press, the tea can be quickly dried and stored for future use or disposal. The Tea Press also allows the user to determine the strength of his tea by allowing him to determine how much tea is placed within the infuser or, in the alternative, allows the user to brew volumes of greater than one cup of tea at one time. | 05-13-2010 |
20110030221 | Multi-Purpose Utensil - The purpose of the Multi-Purpose Utensil is to provide one tool that has a plurality of functions such as a peeler, julienne, sharpener, pitter, among others and, does not occupy any more space than a conventional peeler. A further object of the Multi-Purpose Utensil is to provide an ergonomic handle that can comfortably be used by the left- or right-handed user. | 02-10-2011 |
20140314929 | REAMER - A Reamer has a first portion which is at an angle α with respect to a second portion of the blade. Angle α is between 1° and 189 °. | 10-23-2014 |
20150014311 | FLIP TRAY - A tray system used to prevent microbial pathogen contamination. | 01-15-2015 |
20150265096 | HANGING ROASTER DEVICE AND METHOD - A device for roasting a food item includes a stand having a frame adapted to be positioned on a surface of a cooking device. The frame includes an upper frame member. A food hanger is adapted to support the food item and engages the upper frame member in a removable fashion so that a majority of the food item is suspended below the upper frame member and above the surface of the cooking device when the frame is positioned thereon. | 09-24-2015 |