Abstract:
Methods for transferring among key holders in encoding and cryptographic systems the right to decode and decrypt messages in a way that does not explicitly reveal decoding and decrypting keys used and the original messages. Such methods are more secure and more efficient than typical re-encoding and re-encryption schemes, and are useful in developing such applications as document distribution and long-term file protection.
Abstract:
A sliding miter saw is provided, the saw including a base device, a motor, a saw blade, a bracket for a saw unit and a ram slidably received in a guiding groove provided along a diametrical direction of a turntable. A rear end portion of the ram is connected to a lower portion of a supporting member. By exploiting the ram sliding in the guiding groove, the supporting member may be made thick and rigid. A front end portion of the ram always lies under the saw blade and the ram moves backward synchronously with the saw unit so that the invention is able to spare operating space and storage space.
Abstract:
Methods and circuitry for implementing high speed first-in first-out (FIFO) structures. In one embodiment, a FIFO is disclosed that allows the frequency of one clock, e.g., the write clock, to be different than (e.g., half) that of the other (read) clock. In another embodiment a FIFO is presented that can be set and/or reset asynchronously. Other embodiments are disclosed wherein the read and write pointers are effectively monitored to ensure proper timing relationship, to detect loss of clock as well as to detect other abnormal FIFO conditions.
Abstract:
Methods and circuitry for implementing high speed first-in first-out (FIFO) structures. In one embodiment, a FIFO is disclosed that allows the frequency of one clock, e.g., the write clock, to be different than (e.g., half) that of the other (read) clock. In another embodiment a FIFO is presented that can be set and/or reset asynchronously. Other embodiments are disclosed wherein the read and write pointers are effectively monitored to ensure proper timing relationship, to detect loss of clock as well as to detect other abnormal FIFO conditions.
Abstract:
A method for updating a benefit program with a plurality of plans receives an input from an individual indicating a change to the benefit program, and updates the benefit program and the salary information of the individual consistent with the input. The individual is presented with a summary of the updated benefit program and the updated salary information, and can indicate additional changes to the benefit plan immediately after the summary presented to the individual.
Abstract:
Disclosed is an Internet-based method that enables users to search and browse for information (such as price) about a plurality of items (such as books) available for sale on the Internet, compare prices for the items individually or considered as a package, and optimize the package price. In a preferred embodiment, the invention searches for the lowest price and second lowest price for the desired items from Internet Web sites and databases, records the data in two matrices, and employs algorithms that implement certain set operations, including Cartesian product and set union, to optimize the result for all items.
Abstract:
Driver circuits of the present invention provide current to drive laser diodes. The output current of the driver circuit includes a data signal and a low frequency tone signal. The low frequency tone signal is within the bandwidth of a power control feedback loop. The tone signal introduces low frequency noise into the output signal of the driver circuit. The low frequency noise causes jitter at the zero crossing points of the driver circuit output signal. A laser driver circuit of the present invention provides a compensation current to a laser diode. The compensation current is out of phase with the tone signal. The compensation current eliminates the low frequency noise in the output signal of the laser driver circuit.
Abstract:
A multi-stage watermarking system and process that creates a watermark specification which describes how to generate a watermark, generates a template specification which describes how to merge the watermark into a target document, generates the watermark based on the watermark specification, and merges the watermark into the target document based on the template specification to provide a watermarked document.
Abstract:
Methods for transferring among key holders in encoding and cryptographic systems the right to decode and decrypt messages in a way that does not explicitly reveal decoding and decrypting keys used and the original messages. Such methods are more secure and more efficient than typical re-encoding and re-encryption schemes, and are useful in developing such applications as document distribution and long-term file protection.
Abstract:
A content provider, such as a document publisher or distributor, provides, for example, protected content to a user, for consumption within a trusted user environment. By providing integrity certification and verification services, the authenticity of the content consumption environments can be verified. The content provider forwards to the user a protected version of the digital content which includes, for example, a license agreement and an integrity profile identification. The profile includes, for example, the applications and system components that are allowed to be used in conjunction with the protected content. Additionally, the content provider initiates a request for an integrity profile. This request for the integrity profile is forwarded to an integrity certification and verification device. The integrity certification and verification device can, for example, if an integrity profile does not already exist for the requested applications and/or systems components, query a content consumption system/application provider, who, for example, has supplied the system components to the user. The content consumption system/application provider returns to the integrity certification and verification device authentication information about the particular applications or system components. The authentication information allows a comparison, or integrity verification, to be made between an application and/or system component on a user's system, and the original application or system component as distributed by the content consumption system/application provider.