Patent application number | Description | Published |
20080240420 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 10-02-2008 |
20090052662 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 02-26-2009 |
20100008529 | Speakerphone Including a Plurality of Microphones Mounted by Microphone Supports - In various embodiments, a speakerphone may comprise multiple (e.g., 16) microphones placed in a circular array around a central speaker. Each microphone may be mounted to the speakerphone through a microphone support. The microphone support may be made of a flexible material and have various features designed to minimize interference to the microphone (e.g., from the speaker and/or vibrations external to the speakerphone). The centrally mounted speaker may be coupled to a stiff internal speaker enclosure. The speaker enclosure may be made of a stiff, heavy material (e.g., a dense plastic) to prevent the speaker vibrations from excessively vibrating the speakerphone enclosure (which may affect the microphones). | 01-14-2010 |
20100122088 | METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL - Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained. | 05-13-2010 |
20100235644 | Method and System for a Recursive Security Protocol for Digital Copyright Control - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 09-16-2010 |
20120219139 | Providing Audio Playback During a Conference Based on Conference System Source - In various embodiments, a system may include a first conferencing system with a first speaker and a second speaker. The first conferencing system may be coupled to a second conferencing system and a third conferencing system. In some embodiments, audio from the second conferencing system may be reproduced through the first speaker, and audio from the third conferencing system may be reproduced through the second speaker. In some embodiments, audio from various participants at various conferencing systems may be reproduced on audio system components relative to the location of participants at the conferencing system. For example, audio from a first participant on the left side of a camera at a second conferencing system may be reproduced through left side speakers at the first conferencing system. | 08-30-2012 |
20120224022 | Providing Audio Playback During a Conference Based on Location of Corresponding Video on a Display - In various embodiments, a system may include a first conferencing system with a first speaker and a second speaker. The first conferencing system may be coupled to a second conferencing system and a third conferencing system. In some embodiments, audio from the second conferencing system may be reproduced through the first speaker, and audio from the third conferencing system may be reproduced through the second speaker. In some embodiments, audio from various participants at various conferencing systems may be reproduced on audio system components relative to the location of participants at the conferencing system. For example, audio from a first participant on the left side of a camera at a second conferencing system may be reproduced through left side speakers at the first conferencing system. | 09-06-2012 |
20130227302 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 08-29-2013 |
20130238902 | METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL - Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained. | 09-12-2013 |
20130254494 | METHOD AND SYSTEM FOR PROCESS WORKING SET ISOLATION - Embodiments of systems and methods disclosed herein may isolate the working set of a process such that the data of the working set is inaccessible to other processes, even after the original process terminates. More specifically, in certain embodiments, the working set of an executing process may be stored in cache and for any of those cache lines that are written to while in secure mode those cache lines may be associated with a secure descriptor for the currently executing process. The secure descriptor may uniquely specify those cache lines as belonging to the executing secure process such that access to those cache lines can be restricted to only that process. | 09-26-2013 |
20150089231 | SYSTEMS AND METHODS FOR ESTABLISHING AND USING DISTRIBUTED KEY SERVERS - Systems and methods in which multiple key servers operate cooperatively to securely provide authorization codes to requesting devices. In one embodiment, a server cloud receives a device authorization code request and selects an “A server”. The “A server” requests authorization from one or more “B servers” and authorizes the “B servers” to respond. The “B servers” provide authorization to the “A server”, and may provide threshold key inputs to enable decryption of device authorization codes. The “A server” cannot provide the requested device authorization code without authorization from the “B server(s)”, and the “B server(s)” cannot provide the requested server authorization code and threshold inputs without a valid request from the “A server”. After the “A server” receives authorization from the “B server(s)”, it can provide the initially requested device authorization code to the requesting device. | 03-26-2015 |