meth Apparatus and methods for sealing a vascular puncture By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Apparatus for sealing a puncture communicating with a blood vessel includes a porous carrier formed from lyophilized hydrogel or other material. The plug may include at least first and second hydrogel precursors and a pH adjusting agent carried by the porous carrier in an unreactive state prior to exposure to an aqueous physiological environment. Once exposed to bodily fluids, the carrier expands as the lyophilized material hydrates to enhance and facilitate rapid hemostasis of the puncture. When the plug is placed into the puncture, the natural wetting of the plug by bodily fluids (e.g., blood) causes the first and second precursors to react and cross-link into an adhesive or “sticky” hydrogel that aids in retaining the plug in place within the puncture. Full Article
meth Fasteners, deployment systems, and methods for ophthalmic tissue closure and fixation of ophthalmic prostheses and other uses By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and devices for ophthalmic tissue closure and fixation of ophthalmic prostheses are provided. In accordance with some embodiments, devices for both grasping and clipping a plurality of ocular tissue and ocular prostheses are provided. Various device embodiments are provided for both malleable clips and delivery of normally closed clips (i.e. shape memory). The device may accommodate a plurality of clips which include, but are not limited to: malleable metals, absorbable, shape memory, drug-eluting, and adhesive dispensing. The clips may be pigmented to match the colors of associated tissue (cornea, iris, conjunctiva, sclera, retina) to serve to camouflage fixation clips for healing duration or permanently. According to one aspect, shallow angle access to anatomy may be provided by specialized angulation of device shaft and closure jaws that are intended to access the eye through a small self-healing cornea incision and/or any ocular tissue. Full Article
meth Systems and methods for posterior dynamic stabilization of the spine By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Devices, systems and methods for dynamically stabilizing the spine are provided. The devices include an expandable spacer having an undeployed configuration and a deployed configuration, wherein the spacer has axial and radial dimensions for positioning between the spinous processes of adjacent vertebrae. The systems include one or more spacers and a mechanical actuation means for delivering and deploying the spacer. The methods involve the implantation of one or more spacers within the interspinous space. Full Article
meth Systems and methods for the fusion of the sacral-iliac joint By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The sacral-iliac joint between an iliac and a sacrum is fused either by the creation of a lateral insertion path laterally through the ilium, through the sacral-iliac joint, and into the sacrum, or by the creation of a postero-lateral insertion path entering from a posterior iliac spine of an ilium, angling through the sacral-iliac joint, and terminating in the sacral alae. A bone fixation implant is inserted through the insertion path and anchored in the interior region of the sacrum or sacral alea to fixate the sacral-iliac joint. Full Article
meth Methods and apparatuses for flow restoration and implanting members in the human body By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A medical device for blood flow restoration and/or for use as an implantable member in a human vessel includes a self-expanding member, a guidewire, and a connection mechanism. The self-expanding member includes a plurality of cells and filaments having specific ranges of thicknesses, widths, and heights. The self-expanding member can take on a volume-reduced coiled form with overlapped edges, and can generate optimal radial forces against a vessel wall and/or thrombus when deployed and expanded. Full Article
meth Method and inserter for interbody fusion By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An elongate inserter has a distal end releasably connected to an expandable interbody fusion device and a proximal end including a trigger actuator. The interbody fusion device comprises a superior endplate and an inferior endplate that are movable in an expansion direction relative to each other in the intradiscal space. The inserter includes a lifting platform and an elevator that define cooperatively engaging ramps and ramps surfaces that upon operation of the trigger actuator cause the superior and inferior endplates to move relatively away from each other. A driver is supported by the inserter for pushing an insert into the expanded device between the superior and inferior endplates. Full Article
meth Apparatus and method of user interface with alternate tool mode for robotic surgical tools By www.freepatentsonline.com Published On :: Tue, 09 Jun 2015 08:00:00 EDT In one implementation, a method is disclosed in which a lock sensing mode is entered for a robotic surgical instrument. In the lock sensing mode, the degrees of freedom of movement in the robotic surgical instrument are switchably reduced. Further in the lock sensing mode, one or more end effectors of the robotic surgical instrument are switchably clamped together in the robotic surgical instrument. An increased level of torque may also be applied to the end effectors to increase a gripping force applied by the one or more end effectors in response to the reduced degrees of freedom of movement in the robotic surgical instrument. Full Article
meth Method and apparatus for a radiolucent and MRI compatible cranial stabilization pin By www.freepatentsonline.com Published On :: Tue, 14 Jul 2015 08:00:00 EDT A substantially radiolucent cranial stabilization pin is adapted for use with a fixture for immobilizing a patient's head during a medical procedure. The pin includes a tip and a body, which are secured together to form the pin. The tip and body are constructed from non-ferrous, non-magnetic materials that are biocompatible. The tip and body are safe for use with, and compatible with, imaging techniques including MR imaging and CT imaging. In some examples the tip is a titanium insert and the body is molded within and around at least a portion of the tip. In some versions, the tip includes a hollow portion and one or more openings providing access to the hollow portion. The molded body flows into and around portions of the tip creating a secure pin suitable to withstand torque and axial forces observed in use. Full Article
meth Data distributing and accessing method and system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A data distributing and accessing method for sharing a file via a network system includes steps of: dividing the file into a plurality of blocks; distributing the blocks in a plurality of data hosts interconnected via the network system; one of the data hosts receiving a file-reading request from a user host and issuing collecting requests to other data hosts to collect the blocks from the data hosts; and transferring the collected blocks from the data hosts to the user host to be combined into the file. Full Article
meth Receiving device and method By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A receiving device receives messages, detects the priority levels set in the headers of the messages, and reads the first and second messages. When the receiving device receives the header of the second message during reading of the first message, it controls, in accordance with the priority levels of the first and second messages, the reading rates at which the first and second messages are read. Full Article
meth Method and system for processing digital content according to a workflow By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content, includes the steps, iterated at the processing device, of: a) receiving from a server a signed workflow information, a workflow information comprising a status of the content processing, a signature of the process definition and a hash of the content;b) verifying the workflow information;c) when the workflow information is verified, processing the content according to the process definition and according to status of the content processing;d) updating and signing the workflow information;e) sending to the server the signed workflow information;and the steps iterated at the server of:f) receiving from a processing device a signed workflow information;g) publishing the signed workflow information received from the processing device. A system for performing the method is also provided. Full Article
meth Communication terminal, communication system, communication method and communication program By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not completely matched between communication terminals. A cipher key transfer device acquires a one-time pad cipher key from a key sharing system, divides the acquired one-time pad cipher key with a predetermined number of bits, and transfers the same to a mobile communication terminal after converting the same into one-time pad cipher key cartridges. Along with the partner's terminal, the mobile communication terminal negotiates which one-time pad cipher key cartridge will be used to perform cipher communication, decides the one-time pad cipher key cartridge to be used, and begins cipher communication. Full Article
meth System and method for remote reset of password and encryption key By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. Full Article
meth Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus. Full Article
meth Device and method for obfuscating visual information By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A device is described for the hiding and subsequent recovery of visual information. The device comprises two or more tokens (1), each containing a mask (2,3) of coloured pixels (4), are overlaid (5), so that when the pixels are aligned, hidden information, invisible in the individual tokens. The hidden information consists of one or more recognisable alphabetic, numerical or pictorial characters (6). During token overlay and alignment, the information becomes recognisable because it is made up of pixels whose colour is differentiated from the other pixels in the overlay. The information is hidden by adding pixels of certain colours. When the tokens are overlaid and the pixels aligned, the added pixels are effectively subtracted, revealing the hidden information. The tokens may be printed on various media, or may be displayed on an electronic device. Full Article
meth Private key generation apparatus and method, and storage media storing programs for executing the methods By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user. Full Article
meth Broadcast receiving apparatus and control method thereof By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether or not the obtaining unit can obtain an encrypted second-type encryption key that can be decrypted by the decrypting unit using the updated first-type encryption key; and an updating unit that updates the computer program stored in the memory to the updated program in the case where the determination unit has determined that the obtainment is possible for all the channels. Full Article
meth System and methods for UICC-based secure communication By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed. Full Article
meth Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit. Full Article
meth Methods for managing user information and devices thereof By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session. Full Article
meth Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys. Full Article
meth Apparatus and methods for managing messages sent between services By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed are methods and apparatus for managing services within a computer network. In one embodiment, a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service. Full Article
meth System and method for securely communicating with electronic meters By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information. Full Article
meth System and method for obtaining certificate status of subkeys By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced. Full Article
meth Method for reproducing content data and method for generating thumbnail image By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information; sending the reproduction management information to a user space; storing the decrypted content data in a secret buffer; obtaining the decrypted content data as reproduction target data from the secret buffer and transmitting the reproduction target data to a decoder; and decoding the reproduction target data by the decoder. Full Article
meth System and method for protecting information and related encryption keys By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory. Full Article
meth Method and system for providing a rotating key encrypted file system By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis. Full Article
meth Cryptanalysis method and system By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output;The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key. Full Article
meth Method for arbitrary-precision division or modular reduction By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value. Full Article
meth Apparatus and method for generating secret key using change in wireless channel on wireless communication network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random signal controller. The antenna receives a wireless signal from a counterpart terminal that performs wireless communication. The amplification/phase controllers control the amplification gain and phase of the wireless signal that is received via at least one antenna. The transceiver measures the status of a wireless channel using the wireless signal having the controlled amplification gain and phase, determines parameters based on results of the measurement, and generates a secret key based on results of the determination. The random signal controller controls the amplification/phase controllers so that the amplification gain and phase are adjusted whenever the transceiver generates a secret key. Full Article
meth Apparatus and method for converting random binary sequence into random integer By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer generated from the random binary sequence does not fall within the preset integer interval, the present invention repeatedly updates a random binary sequence until a random integer falling within the corresponding integer interval is obtained, thus outputting uniformly distributed random integers which fall within the preset integer interval. Full Article
meth Apparatus and method for address privacy protection in receiver oriented channels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag. Full Article
meth Methods and apparatus for base station assisted peer discovery through aggregation of expressions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression. Full Article
meth Communicating device and communicating method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The debugging unit writes a public key of the key issuing server and an initializing program given from outside, to the storage unit. The instruction executing unit reads and executes the initializing program stored in the storage unit. The debug disabling unit disables the debugging unit. The public-key encrypting unit encrypts the random number by the public key in the storage unit, the random number generated by the random number generating unit after the debugging unit is disabled. The transmitting unit transmits the encrypted random number to the key issuing server. The receiving unit receives an individual key encrypted by the random number from the key issuing server. The individual-key writing unit decrypts the encrypted individual key by the random number to obtain the individual key and write the individual key to the storage unit. Full Article
meth Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes assigning source data to one of a plurality of groups, the source data comprising text data, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by including in the source data a text character representative of the symbol. Full Article
meth Method and apparatus for authenticating public key without authentication server By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value. Full Article
meth Method and server for providing a mobility key By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber. Full Article
meth Disk array device and data management method for disk array device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A disk array device comprises a first storage unit that stores encrypted user data, a second storage unit that is different from the first storage unit and locks and stores configuration information including a first encrypted authentication key that unlocks the encrypted user data, a management unit that includes a decoder that decodes the first encrypted authentication key and a control unit that unlocks the locked configuration information using a second authentication key, the management unit managing data using the first and second authentication keys. the management unit includes a configuration information recovery portion that unlocks the locked configuration information by using the second authentication key and recovers the configuration information during booting and a user data unlocking portion that decodes the first encrypted authentication key included in the configuration information and unlocks the encrypted user data stored in the first storage unit by using the first decoded authentication key. Full Article
meth Method and system for providing conditional access to encrypted content By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data. Full Article
meth System and method of lawful access to secure communications By www.freepatentsonline.com Published On :: Tue, 14 Jul 2015 08:00:00 EDT The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values. Full Article
meth Method for producing photonic wire bonds By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method for making optical connections with optical waveguides includes mounting the optical waveguides or a device comprising the optical waveguides, on a component carrier. A partial region of the optical waveguides is embedded in a volume of resist material. Positions of the optical waveguides to be connected are detected with reference to a coordinate system using a measuring system. Favorable, three-dimensional geometries are determined for optical waveguide structures for connecting the optical waveguides to each other at predetermined connecting locations and the optical waveguide structure geometries are converted to a machine-readable dataset. The optical waveguide geometries in the volume of the resist material are three-dimensionally structured using a direct-writing lithography device operating on the basis of the machine-readable dataset. The structured resist material is treated using physical or chemical methods to form at least one optical waveguide structure having ends connected to predetermined connecting locations of the optical waveguides. Full Article
meth Method for making polyamide particles By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT This disclosure relates to a method of preparing polyamide particles. The method include spray drying a solution containing a polyamide to form polyamide particles having an average diameter of between about 0.5 μm and about 10 μm and at least about 85% of the polyamide particles having a diameter distribution of no more than about 1.5 μm. Full Article
meth Injection moulding method for optional manufacturing of moulded parts with or without a breakthrough By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An injection-molding method for selectively manufacturing molded parts with and without a breakthrough is disclosed. A molded part with a breakthrough is manufactured by positioning a mold core in a mold cavity, whereas a molded part without breakthrough is manufactured by removing the mold core at least partly from the mold cavity. The mold cavity delimited by a nozzle-side mold platen and an ejector-side mold platen. The mold core is movable relative to at least one of the mold platens, in particularly the nozzle-side mold platen, in an advance direction, where the mold core is closer to the nozzle-side mold platen and an opposite withdrawal direction. At least one protective measure is provided for protecting the inner surface facing the mold cavity of the respective mold platen, in particularly the nozzle-side mold platen, from adverse mechanical effects during movement of the mold core in the advance direction. Full Article
meth Method of making flexible foaming member from recycled materials By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a method of making a flexible foaming member from recycled material. The present invention relates to a production method to recycling wastes containing rubber, plastic and metal materials and pulverize them into scraps under normal temperatures, then roughly separate the various materials contained in the waste scraps into different layers based on the difference of specific gravity, and further take out the scraps of rubber and plastic materials with lower specific gravity from the waste scraps, then conduct multiple heating and pulverizations under different temperatures to produce composite-material scraps, and then using some composite-material scraps to mix flexible materials and foaming agents, then pressing the mixture into a plate-like foaming material, and conduct vulcanization and foam forming for the plates of foam material to become a elastic foam. Full Article
meth Binder composition and method for treating particulate material By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In accordance with this invention a binder composition for treating particulate material to form a solid aggregate matrix is prepared by providing a urea formaldehyde precondensate; a polar solvent; additional urea; an acid or salt thereof, the acid or salt thereof being selected such as to render the pH of the binder composition to a value from 2.0 to 5.3; providing a sugar; providing a binding promoter for enhancing the binding between the binder composition and the particulate material; and mixing the above so as to form a binder composition. The binder composition is mixed with particulate material and allowed to set into a solid aggregate matrix over a period of longer than 30 minutes from being mixed with the said particulate material. Full Article
meth Method for making an elastomeric apertured web By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method for making an elastomeric apertured web comprises providing a precursor web comprising a laminate which is subjected to incremental stretching to form an elastomeric precursor web. A forming apparatus is provided comprising a first member and a second member, wherein the first member comprises a mating member, and the second member comprises teeth which are joined to the second member. The elastomeric precursor web is moved through the forming apparatus, wherein apertures are formed in the elastomeric precursor web material as the teeth on the second member penetrate the mating member forming an elastomeric apertured web. The elastomeric apertured web exhibits a WVTR of at least about 1000 g/m2/day. Full Article
meth Method for manufacturing ethylene vinyl acetate copolymer sheet for solar cell encapsulant By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Provided is a method for manufacturing a sheet for a solar cell encapsulant which has stability against yellowing after a crosslinking process and thus good appearance with improved productivity in the sheet manufacture process, specifically to a method for manufacturing a sheet for a solar cell encapsulant characterized by melt-mixing a resin composition with an organic peroxide, a co-crosslinking agent and a silane coupling agent at the degradation temperature of the organic peroxide or less, wherein the resin composition is obtained by melt-mixing EVA resin with an antioxidant, an UV absorber and a light stabilizer at 80-220° C., and forming a sheet from the obtained melt-mixed resin composition. Full Article
meth Method of processing a substrate By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In a method of processing a substrate in accordance with an embodiment, a trench may be formed in the substrate, imprint material may be deposited at least into the trench, the imprint material in the trench may be embossed using a stamp device, and the stamp device may be removed from the trench. Full Article
meth Solid imaging systems, components thereof, and methods of solid imaging By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT There is provided solid imaging methods and apparatus for making three-dimensional objects from solid imaging material. A tray with a film bottom is provided to hold solid imaging material that is selectively cured into cross-sections of the three-dimensional object being built. A coater bar is moved back and forth over the film to remove any uncured solid imaging material from a previous layer and to apply a new layer of solid imaging material. A sensor is provided to measure the amount of resin in the tray to determine the appropriate amount of solid imaging material to be added, from a cartridge, for the next layer. A shuttle, which covers the tray when the exterior door to the solid imaging apparatus is opened for setting up a build or removing a three-dimensional object, can also be used to move the coater bar and to selectively open one or more valves on the cartridge to dispense the desired amount of solid imaging material. Full Article
meth System, method, and apparatus for solar heated manufacturing By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system for a thermal manufacturing system including a heliostat and a mold. The heliostat includes at least one reflecting surface, a steering mechanism and a controller. The steering mechanism is coupled to the at least one reflecting surface and capable of directing at least a first portion of the at least one reflecting surface toward a first one of multiple, selectable focal points. The mold is located in a second one of the selectable focal points. A manufacturing method is also disclosed. Full Article