DYNAMIC KEYSTONE CORRECTION
    41.
    发明申请
    DYNAMIC KEYSTONE CORRECTION 有权
    动态梯形校正

    公开(公告)号:US20120176587A1

    公开(公告)日:2012-07-12

    申请号:US12987639

    申请日:2011-01-10

    CPC classification number: G03B21/53 G03B21/26 H04N9/3185 H04N9/3194

    Abstract: An apparatus and method are disclosed for dynamic keystone correction. A measurement module measures distances from a projector to each of at least three projected points of a first projected image projected on a first surface with projection angles between each projected point. The at least three projected points are endpoints for at least two vectors with a target ratio of vector lengths. An adjustment module calculates an actual ratio of actual vector lengths of the at least two vectors. The adjustment module further adjusts a first aspect ratio of first projected image until the actual ratio is equivalent to the target ratio.

    Abstract translation: 公开了用于动态梯形失真校正的装置和方法。 测量模块测量从投影仪到在每个投影点之间具有投影角度投影在第一表面上的第一投影图像的至少三个投影点中的每一个的距离。 至少三个投影点是至少两个向量长度的目标比例向量的端点。 调整模块计算至少两个向量的实际矢量长度的实际比率。 调整模块进一步调整第一投影图像的第一宽高比,直到实际比率等于目标比率。

    Embedded email receiver authentication
    42.
    发明授权
    Embedded email receiver authentication 有权
    嵌入式电子邮件接收器认证

    公开(公告)号:US08171523B2

    公开(公告)日:2012-05-01

    申请号:US11414165

    申请日:2006-04-29

    CPC classification number: H04L63/08 H04L51/00 H04L63/0442

    Abstract: The present invention relates to a method and system for providing an option when sending an email which will require the recipient of the email to provide an extra level of authentication before displaying the email contents in order to prove that he or she is indeed the correct recipient of the email. Validation is required by the recipient every time he or she opens an email. This validation occurs in the form of authentication that the user is indeed the intended recipient of the email, and can be provided in various means, including biometric identification, password phrases, and so forth.

    Abstract translation: 本发明涉及一种用于在发送电子邮件时提供选项的方法和系统,该电子邮件将要求电子邮件的收件人在显示电子邮件内容之前提供额外的认证级别,以证明他或她确实是正确的接收者 的电子邮件 收件人每次打开电子邮件时都需要进行验证。 该验证以认证的形式发生,用户确实是电子邮件的预期接收者,并且可以以各种方式提供,包括生物识别,密码短语等。

    METHOD AND APPARATUS FOR MAINTAINING OPERABILITY WITH A CLOUD COMPUTING ENVIRONMENT
    43.
    发明申请
    METHOD AND APPARATUS FOR MAINTAINING OPERABILITY WITH A CLOUD COMPUTING ENVIRONMENT 有权
    用于保持云计算环境的可操作性的方法和装置

    公开(公告)号:US20120084355A1

    公开(公告)日:2012-04-05

    申请号:US12897549

    申请日:2010-10-04

    CPC classification number: G06F8/60

    Abstract: A method and apparatus for maintaining operability with a cloud computing environment. The apparatus includes a storage module and a local environment module. The storage module may store cloud computing data from a cloud computing environment onto a local storage device. The storage module may communicate with the cloud computing environment through a remote connection. The local environment module may operate a local cloud computing environment from the local storage device while the remote connection to the cloud computing environment is unavailable. The local cloud environment may replicate at least a portion of the cloud computing environment and may be operated from the stored cloud computing data.

    Abstract translation: 一种用于通过云计算环境维护可操作性的方法和装置。 该装置包括存储模块和本地环境模块。 存储模块可以将来自云计算环境的云计算数据存储到本地存储设备上。 存储模块可以通过远程连接与云计算环境进行通信。 本地环境模块可以在与云计算环境的远程连接不可用的情况下从本地存储设备操作本地云计算环境。 本地云环境可以复制至少一部分云计算环境,并且可以从存储的云计算数据中进行操作。

    Authenticating suspect data using key tables
    45.
    发明授权
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US08024579B2

    公开(公告)日:2011-09-20

    申请号:US11647932

    申请日:2006-12-29

    CPC classification number: G06F21/57 G06F21/51 H04L9/0897 H04L9/3236

    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    Abstract translation: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    IT administrator initiated remote hardware independent imaging technology
    46.
    发明授权
    IT administrator initiated remote hardware independent imaging technology 有权
    IT管​​理员启动远程硬件独立成像技术

    公开(公告)号:US07917916B2

    公开(公告)日:2011-03-29

    申请号:US11472494

    申请日:2006-06-20

    CPC classification number: G06F9/4411 G06F8/63

    Abstract: The present invention relates to a method for removing the driver map component from being stored on the service partition and placing it on a server for retrieval at a later time. Only the actual device drivers that are required for that system will be provided. A central repository will be provided for applications and device drivers that would leverage the AMT area. The AMT IDE-R would be used to store the hook to network install, for example an IT administrator initiated network install to an unpowered system. Two situations exist in which this method will be used. The first situation involves supplying ImageUltra content to a system that is connected to the Local Area Network while ImageUltra is running. The second situation involves supplying ImageUltra content to a system that is not connected to the Local Area Network while ImageUltra is running.

    Abstract translation: 本发明涉及一种用于将驱动程序映射组件移除存储在服务分区上并将其放置在服务器上以便稍后进行检索的方法。 仅提供该系统所需的实际设备驱动程序。 将为使用AMT区域的应用程序和设备驱动程序提供中央存储库。 AMT IDE-R将用于存储钩子到网络安装,例如IT管理员启动网络安装到无动力系统。 存在使用这种方法的两种情况。 第一种情况是在ImageUltra运行时将ImageUltra内容提供给连接到局域网的系统。 第二种情况是在ImageUltra正在运行时,将ImageUltra内容提供给未连接到局域网的系统。

    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT
    47.
    发明申请
    METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT 有权
    用于管理客户端的方法,装置和前向缓存系统

    公开(公告)号:US20100205375A1

    公开(公告)日:2010-08-12

    申请号:US12368882

    申请日:2009-02-10

    Abstract: A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.

    Abstract translation: 公开了一种用于被管理客户端的前向缓存的方法,装置和系统。 存储模块将软件映像存储在后端服务器的存储设备上。 后端服务器通过用于多个无盘数据处理设备的第一中间网络点在存储设备上提供虚拟磁盘存储。 每个无盘数据处理装置与第一中间网络点直接通信。 存储模块在第一中间网络点高速缓存软件映像的图像实例。 跟踪模块检测对存储设备上的软件映像的更新。 存储模块将更新的软件映像作为更新的图像实例复制到第一中间网络点。

    Authenticating suspect data using key tables
    49.
    发明申请
    Authenticating suspect data using key tables 有权
    使用关键表验证可疑数据

    公开(公告)号:US20080162932A1

    公开(公告)日:2008-07-03

    申请号:US11647932

    申请日:2006-12-29

    CPC classification number: G06F21/57 G06F21/51 H04L9/0897 H04L9/3236

    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.

    Abstract translation: 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。

    Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System
    50.
    发明申请
    Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System 有权
    提供集中用户授权以允许安全登录到计算机系统的方法和装置

    公开(公告)号:US20080148389A1

    公开(公告)日:2008-06-19

    申请号:US11612092

    申请日:2006-12-18

    CPC classification number: G06F21/575

    Abstract: A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.

    Abstract translation: 公开了一种用于提供集中式用户授权以允许对计算机系统进行安全登录的方法。 响应于尝试启动计算机系统的用户,由计算机内的虚拟机管理程序向可信服务器发送消息,以请求计算机系统的新的硬盘驱动器密码。 如果用户没有权限访问计算机系统,则可信服务器发送一个数据包,以指示管理程序停止计算机系统上的任何引导过程。 如果用户被授权访问计算机系统,则包含部分硬盘驱动器密码的分组由可信服务器发送到计算机系统。 然后,计算机系统使用系统公钥对数据包进行加密,以产生部分硬盘驱动器密码。 计算机系统随后将部分硬盘驱动器密码与用户密码相结合,以生成新的完整硬盘驱动器密码,以继续引导过程。

Patent Agency Ranking