Patent application number | Description | Published |
20160049542 | HOMOGENEOUS PRECURSOR FORMATION METHOD AND DEVICE THEREOF - A direct solution method based on a versatile amine-thiol solvent mixture which dissolves elemental metals, metal salts, organometallic complexes, metal chalcogenides, and metal oxides is described. The metal containing and metal chalcogenide precursors can be prepared by dissolving single or multiple metal sources, chalcogens, and/or metal chalcogenide compounds separately, simultaneously, or stepwise. Multinary metal chalcogenides containing at least one of copper, zinc, tin, indium, gallium, cadmium, germanium, and lead, with at least one of sulfur, selenium, or both are obtained from the above-mentioned metal chalcogenide precursors in the form of thin films, nanoparticles, inks, etc. Furthermore, infiltration of metal containing compounds into a porous structure can be achieved using the amine-thiol based precursors. In addition, due to the appreciable solubility of metal sources, metal chalcogenides, and metal oxides in the mixture of amine(s) and thiol(s), this solvent mixture can be used to remove these materials from a system. | 02-18-2016 |
Patent application number | Description | Published |
20090129961 | METAL INJECTION MOLDING METHODS AND FEEDSTOCKS - Metal injection molding methods and feedstocks. Metal injection molding methods include forming a feedstock, molding the feedstock into a molded article, substantially removing a lubricant, a thermoplastic, and an aromatic binder from the molded article, and sintering the molded article into a metal article. In some examples, metal injection molding methods include oxygen reduction methods. In some examples, metal injection molding methods include densification methods. Metal injection molding feedstocks include a lubricant, a thermoplastic, and aromatic binder, and a metal powder. | 05-21-2009 |
20110059268 | Methods of Forming Porous Coatings on Substrates - Methods of forming porous coatings on substrates. Methods of forming porous coatings include preparing a binder, applying the binder to a substrate to form a binder layer, applying a coating material to the binder layer to form a coating material layer, and sintering the coated substrate. In some examples, preparing a binder includes mixing together metal particles including titanium hydride or cobalt disilicide, a polymer including polybutene or poly-isobutylene, a brazing agent, and methyl cellulose. In some examples, the coating material includes titanium or cobalt. Applying the binder may include spray coating the binder onto the substrate. | 03-10-2011 |
Patent application number | Description | Published |
20150042468 | ACTIVITY RECOGNITION WITH ACTIVITY REMINDERS - An athletic performance monitoring system, for motivating a user to reach a goal level of athletic activity. The system may motivate the user by calculation a deficit between a current total level of activity and the goal level of athletic activity, and suggesting activity types that the user may carry out an order to reach the goal level, wherein the suggested activity types may be based on activities that are geographically close to the user, or sporting equipment worn by, or in possession of, the user. | 02-12-2015 |
20150042475 | ACTIVITY RECOGNITION WITH ACTIVITY REMINDERS - An athletic performance monitoring system, for motivating a user to reach a goal level of athletic activity. The system may motivate the user by calculation a deficit between a current total level of activity and the goal level of athletic activity, and suggesting activity types that the user may carry out an order to reach the goal level, wherein the suggested activity types may be based on activities that are geographically close to the user, or sporting equipment worn by, or in possession of, the user. | 02-12-2015 |
20150044648 | ACTIVITY RECOGNITION WITH ACTIVITY REMINDERS - An athletic performance monitoring system, for motivating a user to reach a goal level of athletic activity. The system may motivate the user by calculation a deficit between a current total level of activity and the goal level of athletic activity, and suggesting activity types that the user may carry out an order to reach the goal level, wherein the suggested activity types may be based on activities that are geographically close to the user, or sporting equipment worn by, or in possession of, the user. | 02-12-2015 |
20150057944 | SESSIONS AND GROUPS - Athletic activity may be tracked while providing encouragement to perform athletic activity. For example, energy expenditure values and energy expenditure intensity values may be calculated and associated with a duration and type of activity performed by an individual. These values and other movement data may be displayed on an interface in a manner to motivate the individual and maintain the individual's interest. The interface may track one or more discrete “sessions”. The sessions may be associated with energy expenditure values during a duration that is within a second duration, such as a day, that is also tracked with respect to variables, such as energy expenditure. Other individuals (e.g., friends) may also be displayed on an interface through which a user's progress is tracked. This may allow the user to also view the other individuals' progress toward completing an activity goal and/or challenge. | 02-26-2015 |
20150057945 | SESSIONS AND GROUPS - Athletic activity may be tracked while providing encouragement to perform athletic activity. For example, energy expenditure values and energy expenditure intensity values may be calculated and associated with a duration and type of activity performed by an individual. These values and other movement data may be displayed on an interface in a manner to motivate the individual and maintain the individual's interest. The interface may track one or more discrete “sessions”. The sessions may be associated with energy expenditure values during a duration that is within a second duration, such as a day, that is also tracked with respect to variables, such as energy expenditure. Other individuals (e.g., friends) may also be displayed on an interface through which a user's progress is tracked. This may allow the user to also view the other individuals' progress toward completing an activity goal and/or challenge. | 02-26-2015 |
Patent application number | Description | Published |
20120023334 | METHODS FOR ANONYMOUS AUTHENTICATION AND KEY AGREEMENT - Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device remains anonymous to the remote entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA). | 01-26-2012 |
20120249806 | COLLABORATIVE IMAGE CONTROL - Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices. | 10-04-2012 |
20120284518 | METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES - Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA). | 11-08-2012 |
20120328097 | APPARATUS AND METHOD FOR SKEIN HASHING - Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data. | 12-27-2012 |
20130276075 | Secure Peer-to-Peer Network Setup - Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master device. The wireless processing unit is operable to receive encoded data in a two-dimensional (2D) barcode. The encoded data comprise at least user information associated with the master device including a user identifier, a device identifier, or both. The encoded data further comprise network information including a network identifier, a password, and a profile lifetime value. In one embodiment, the apparatus further comprises a display unit to display at least part of the user information and the network information to a user. The wireless processing unit is operable to initiate a peer-to-peer network setup with the master device based at least on a response from the user. | 10-17-2013 |
20140046727 | METHOD, DEVICE, AND SYSTEM FOR GENERATING ONLINE SOCIAL COMMUNITY PROFILES - A device, method, and system for generating online social community profiles includes collecting behavioral characteristics of community members of an online social community and aggregating the behavioral characteristics to generate a social community profile for the online social community. The social community profile may be used to elicit proposals from vendors, which may be voted on or responded to by the community members of the online social community. | 02-13-2014 |
20140075496 | MOBILE PLATFORM WITH SENSOR DATA SECURITY - Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data. | 03-13-2014 |
20140082362 | METHOD OF ANONYMOUS ENTITY AUTHENTICATION USING GROUP-BASED ANONYMOUS SIGNATURES - Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA). | 03-20-2014 |
20140095936 | System and Method for Correct Execution of Software - In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein. | 04-03-2014 |
20140143608 | SYSTEM AND METHOD FOR DETERMINING EXECUTION OF SOFTWARE - An embodiment provides a level of assurance regarding correct operation of software. An embodiment creates baseline and real-time measurements of software and compares the measurements to determine whether the software is operating correctly. An application provider may include “tracing elements” in target software application. While producing the application the trace elements are detected and provide trace events, which collectively provide a “baseline trace” indicating proper application execution. The provider supplies the application and the baseline trace to a user. The user operates the application in real-time to produce a “real-time trace” based on the application still having trace elements that produce trace events (which collectively form the “real-time” trace). A comparator compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are included herein. | 05-22-2014 |
20140181794 | SYSTEM AND METHOD FOR CORRECT EXECUTION OF SOFTWARE - In an embodiment a software application may include a “baseline trace” indicating proper application execution. The baseline trace may include counts for various types of instructions (e.g., how many times each of a LR instruction and a MV instruction occurs during an execution of code). The finished application includes the baseline trace. Upon execution the application randomly selects which of the various types of instructions to count during execution (e.g., LR or MV instruction) to produce a “real time trace”. The application executes and produces the real-time trace. The baseline trace is then compared to the real-time trace, which is specific to the randomly chosen type of instruction. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are described herein. | 06-26-2014 |
20140293013 | COLLABORATIVE IMAGE CONTROL - Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices. | 10-02-2014 |
20140358713 | METHOD AND SYSTEM FOR BULK PURCHASE NEGOTIATING USING AN AD HOC ONLINE GROUP - A method and system enables the formation of an ad hoc group to negotiate a bulk purchase of a product or service in an online user networking environment and to execute the bulk purchase using an electronic commerce transaction. | 12-04-2014 |
20150023500 | APPARATUS AND METHOD FOR SKEIN HASHING - Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data. | 01-22-2015 |
20150030153 | REPEATABLE APPLICATION-SPECIFIC ENCRYPTION KEY DERIVATION USING A HIDDEN ROOT KEY - Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption engine. The execution hardware is to execute instructions to deterministically generate an application-specific encryption key using the encryption algorithm. | 01-29-2015 |
20150095654 | CRYPTOGRAPHIC KEY GENERATION BASED ON MULTIPLE BIOMETRICS - In an embodiment, an apparatus includes a processor including a first core. The first core includes multi-biometric logic to output first biometric data w | 04-02-2015 |
20150188702 | EFFICIENT KEY DERIVATION FOR END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY - Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: | 07-02-2015 |
Patent application number | Description | Published |
20080313462 | APPARATUS AND METHOD FOR DERIVING KEYS FOR SECURING PEER LINKS - Apparatus and methods to establish a secure peer-to-peer link in which the construction of a link authentication and key encryption keys are separated from the session encryption key are described herein. In an embodiment, a secure peer-to-peer link is established in a wireless mesh network. | 12-18-2008 |
20080313698 | APPARATUS AND METHODS FOR NEGOTIATING A CAPABILITY IN ESTABLISHING A PEER-TO-PEER COMMUNICATION LINK - Apparatus and method to negotiate parameters of a policy in establishment of a peer-to-peer link are described herein. In an embodiment, a security policy is negotiated in establishment of a peer-to-peer link in a wireless mesh network. | 12-18-2008 |
20090327694 | Methods and apparatus for providing integrity protection for management and control traffic of wireless communication networks - Embodiments of the present invention provide a method comprising transmitting, by a communication node, an information element (IE), the IE including a feature field indicating whether the communication node operates in accordance with an integrity protection protocol specifically for management frames, and the IE further including an enforcement field that advertises whether the integrity protection protocol for management and control frames is mandatory, and generating, by the communication node, a pairwise transient key (PTK), the PTK including a first plurality of keys and a pairwise integrity key (PIK), wherein the first plurality of keys are configured to protect an integrity of data frames transmitted by the communication node and the PIK is configured to protect an integrity of management frames transmitted by the communication node, wherein management frames are dedicated to management traffic and wherein the first plurality of keys and the PIK are different keys. Other embodiments may be described and claimed. | 12-31-2009 |
20110150223 | WIRELESS DEVICE AND METHOD FOR REKEYING WITH REDUCED PACKET LOSS FOR HIGH-THROUGHPUT WIRELESS COMMUNICATIONS - Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key. | 06-23-2011 |
20120084411 | METHOD, APPARATUS AND SYSTEM FOR MAINTAINING MOBILITY RESISTANT IP TUNNELS USING A MOBILE ROUTER - A method, apparatus and system enable a mobile device to roam while maintaining a persistent IP tunnel. Specifically, a mobile router may be utilized to enable a mobile device to maintain a persistent IP tunnel while the device roams. In one embodiment, the mobile device is a virtual host and the mobile router is a virtual mobile router. | 04-05-2012 |
20120102212 | METHOD, APPARATUS AND SYSTEM FOR PLATFORM IDENTITY BINDING IN A NETWORK NODE - Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed. | 04-26-2012 |
20120185696 | DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK - In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method. | 07-19-2012 |
20140126722 | WIRELESS DEVICE AND METHOD FOR REKEYING WITH REDUCED PACKET LOSS FOR HIGH-THROUGHPUT WIRELESS COMMUNICATIONS - Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key. | 05-08-2014 |
20150365826 | Methods, Systems and Apparatus to Pair Medical Devices to an In-Body Network - Methods, apparatus, systems and articles of manufacture are disclosed to pair devices to an in-body network. An example apparatus disclosed herein includes a device capability manager to identify remote sensors associated with a candidate medical device, an encryption engine to provide the candidate medical device with hashing instructions to be applied to input values from selected ones of the remote sensors, a measurement engine to acquire input values from local sensors corresponding to the selected ones of the available remote sensors during a measurement schedule, the encryption engine to apply the hashing instructions to the input values from the local sensors, and a pairing engine to authorize the candidate medical device when an encryption key associated with the remote sensors includes a threshold indication of parity with an encryption key associated with the local sensors. | 12-17-2015 |
Patent application number | Description | Published |
20090112101 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Spectral information may be employed in process control and/or quality control of goods and articles. Spectral information may be employed in process control and/or quality control of media, for example financial instruments, identity documents, legal documents, medical documents, financial transaction cards, and/or other media, fluids for example lubricants, fuels, coolants, or other materials that flow, and in machinery, for example vehicles, motors, generators, compressors, presses, drills and/or supply systems. Spectral information may be employed in identifying biological tissue and/or facilitating diagnosis based on biological tissue. | 04-30-2009 |
20110243571 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE DISTRIBUTED EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Objects such as manufactured goods or articles, works of art, media such as identity documents, legal documents, financial instruments, transaction cards, other documents, and/or biological tissue are sampled via sequential illumination in various bands of the electromagnetic spectrum, a test response to the illumination is analyzed with respect to reference responses of reference objects. The sequence may be varied. The sequence may define an activation order, a drive level and/or temperature for operating one or more sources. Illumination may be in visible, infrared, ultraviolet, or other portions of the electromagnetic spectrum. Elements of the evaluation system may be remote from one another, for example coupled by a network. | 10-06-2011 |
20120072154 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Spectral information may be employed in process control and/or quality control of goods and articles. Spectral information may be employed in process control and/or quality control of media, for example financial instruments, identity documents, legal documents, medical documents, financial transaction cards, and/or other media, fluids for example lubricants, fuels, coolants, or other materials that flow, and in machinery, for example vehicles, motors, generators, compressors, presses, drills and/or supply systems. Spectral information may be employed in identifying biological tissue and/or facilitating diagnosis based on biological tissue. | 03-22-2012 |
20130024151 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE DISTRIBUTED EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Objects such as manufactured goods or articles, works of art, media such as identity documents, legal documents, financial instruments, transaction cards, other documents, and/or biological tissue are sampled via sequential illumination in various bands of the electromagnetic spectrum, a test response to the illumination is analyzed with respect to reference responses of reference objects. The sequence may be varied. The sequence may define an activation order, a drive level and/or temperature for operating one or more sources. Illumination may be in visible, infrared, ultraviolet, or other portions of the electromagnetic spectrum. Elements of the evaluation system may be remote from one another, for example coupled by a network. | 01-24-2013 |
20130208260 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Spectral information may be employed in process control and/or quality control of goods and articles. Spectral information may be employed in process control and/or quality control of media, for example financial instruments, identity documents, legal documents, medical documents, financial transaction cards, and/or other media, fluids for example lubricants, fuels, coolants, or other materials that flow, and in machinery, for example vehicles, motors, generators, compressors, presses, drills and/or supply systems. Spectral information may be employed in identifying biological tissue and/or facilitating diagnosis based on biological tissue. | 08-15-2013 |
20150241338 | METHOD, APPARATUS, AND ARTICLE TO FACILITATE EVALUATION OF OBJECTS USING ELECTROMAGNETIC ENERGY - Spectral information may be employed in process control and/or quality control of goods and articles. Spectral information may be employed in process control and/or quality control of media, for example financial instruments, identity documents, legal documents, medical documents, financial transaction cards, and/or other media, fluids for example lubricants, fuels, coolants, or other materials that flow, and in machinery, for example vehicles, motors, generators, compressors, presses, drills and/or supply systems. Spectral information may be employed in identifying biological tissue and/or facilitating diagnosis based on biological tissue. | 08-27-2015 |