1
Fred Thomas Fred Thomas
Thomas Fred C Iii, Watson Brent, Fowler Steven M, Bero James M, Taylor Wilhelm: Distributed cryptography technique for protecting removable data storage media. Iomega, September 5, 2001: EP1130494-A2 (3 worldwide citation)

An apparatus, system and technique for cryptographically securing data in a secure computing environment are provided. Different components of a computer system have associated cryptographic data that is either common to the enterprise or unique to the system component for a given file transfer. In ...


2
Fred Thomas Fred Thomas
Thomas Fred C Iii, Bero James M, Watson Brent, Taylor Wilhelm, Fowler Steven M: Detachable data storage system protected with encryption. Iomega, September 7, 2001: JP2001-243105 (1 worldwide citation)

PROBLEM TO BE SOLVED: To provide a distributed encryption method for a portable storage system.SOLUTION: A computer system has a common cipher data component (C) for an enterprise system to transfer files and a unique cipher data component (U). One or more users (300), a host (90), a data storage (5 ...


3
Ugochukwu Njoku
Ugochukwu Charles Njoku, Frank W Brice Jr, David Craddock, Richard K Errickson, Mark S Farrell, Charles W Gainey Jr, Donald W Schmidt, Gustav E Sittmann III: Virtualization of an I/O adapter port using enablement and activation functions. International Business Machines Corporation, Eugene I Shkurko, April 3, 2007: US07200704 (91 worldwide citation)

A method for configuring a communication port of a communications interface of an information handling system into a plurality of virtual ports. A first command is issued to obtain information indicating a number of images of virtual ports supportable by the communications interface. A second comman ...


4
Craig Allen
Craig Allen Long, William Robert Worger, Bradley Robert Schaefer: Method and apparatus for seamless crypto rekey system. Motorola, Frank J Bogacz, August 17, 1999: US05940508 (9 worldwide citation)

Equipment (10, 20) for facilitating point-to-point cryptographic data communication systems is disclosed. The seamless rekey cryptosystem permits changing of the crypto key (70, 80) with no down time. The cryptosystem will facilitate seamless key installation to eliminate data loss or reduce storage ...


5
Randy Ekl
Surender Kumar, Mark A Birchler, Randy L Ekl, Thomas C Hill, Michael D Kotzin, Whay Chiou Lee, Peggy K Matson, Peter J Stanforth: Method and system for incentive-based ad hoc networking. Motorola, Barbara R Doutre, August 31, 2010: US07788387 (7 worldwide citation)

A system (100) and method (300) for mesh/ad hoc participation is provided. The method can include providing (310) an incentive to a user operating a device in an ad hoc network and determining (320) network resources associated with providing the incentive. The method can establish a credit system f ...


6
Sagy Pundak Mintz
Kemp Gary Allan Ii, Schluetter Jens Uwe, Garrison David W, Mintz Sagy: Method and apparatus for message flow and transaction queue management. Trading Technologies International, IRVINE Robert J III, January 22, 2004: WO/2004/008309 (7 worldwide citation)

Management of transaction message flow utilizing a transaction message queue. The system and method are for use in financial transaction messaging systems. The system is designed to enable an administrator to monitor, distribute, control and receive alerts on the use and status of limited network an ...


7
Randy Ekl
Randy L Ekl, Mark J Johnson, Anthony R Metke, Aparna Pandey, Joseph E Phillips, Christopher G Ware: Method and apparatus for omniscient root node selection in an ad hoc network. Motorola, Randi L Karpinia, Anthony P Curtis, April 13, 2010: US07697456 (6 worldwide citation)

Techniques are provided for selecting a root node in an ad hoc network that contains a plurality of nodes including a first node. According to one implementation of these techniques, a first node can receive a message from at least one of the other nodes. Each message includes a number of primary fa ...


8
Randy Ekl
Randy L Ekl, Anthony R Metke: Method of reliable multicasting. Motorola, Indira Saladi, Anthony P Curtis, July 14, 2009: US07561599 (5 worldwide citation)

A method for providing reliable multicasting is described. A transmitted multicast packet is received at second devices, each of which in response transmits a first acknowledgement. If a second acknowledgement, which acknowledges the first acknowledgement, is not received within a predetermined time ...


9
Randy Ekl
Robert D LoGalbo, Randy L Ekl, Ron Rotstein, Christopher G Ware: Methods for delivery in a wireless communications network. Motorola, Randi L Karpinia, Indira Saladi, August 5, 2008: US07408931 (5 worldwide citation)

Methods for delivery of multicast packets in a wireless communication system are disclosed. The methods comprise transmitting a contention free period initiation signal from an access point to the station, transmitting broadcast packets from the access point to the station, transmitting multicast pa ...


10
Craig Allen
Craig Allen Huegen, Ellis Roland Dobbins, Ian Foo, Robert Eric Gleichauf: Arrangement for tracking IP address usage based on authenticated link identifier. Cisco Technology, Leon R Turkevich, November 29, 2011: US08068414 (4 worldwide citation)

Link layer authentication information is supplied by a link layer authentication device to an access router for tracking IP address usage by a client device. The authentication information supplied to the access router includes an authenticated client identifier and a corresponding authenticated lin ...



Click the thumbnails below to visualize the patent trend.