Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Arm Ip Limited patents


Recent patent applications related to Arm Ip Limited. Arm Ip Limited is listed as an Agent/Assignee. Note: Arm Ip Limited may have other listings under different names/spellings. We're not affiliated with Arm Ip Limited, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Arm Ip Limited-related inventors


 new patent  Methods and protecting domains of a device from unauthorized accesses

A machine implemented method for protecting a target domain and a source domain from unauthorized accesses. The method comprising: identifying an exit call gateway comprising an exit transition instruction and at least one exit access parameter, said exit access parameters restricting exit from said source domain; identifying an entry call... Arm Ip Limited

Management of control parameters in electronic systems

The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the... Arm Ip Limited

A establishing trust between a device and an apparatus

There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted... Arm Ip Limited

Method and device for scanning for data processing devices

There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at the data processing device, the search input to provide a transformed output, wherein the transformed output is representative of the search input; transmitting, a communication... Arm Ip Limited

Management of relationships between a device and a service provider

An authentication device is used to create a secure connection between an Internet of Things (IoT) device and a service provider, so that the IoT device is not limited to only the services of one specific provider or the specific services of the provider of the IoT device. In addition,... Arm Ip Limited

Methods of communication between a remote resource and a data processing device

Methods of communication between a remote resource and a data processing device, the system include storing in a transaction queue a message posted from the remote resource; sending a request to create a guest transaction queue, the guest transaction queue being accessible by both the data processing device and the... Arm Ip Limited

Method, hardware and digital certificate for authentication of connected devices

A method of generating a shortcut certificate for authenticating a user digital certificate generated by an issuing certification authority; the method comprising: authenticating the digital certificate of the issuing certification authority; creating the shortcut certificate for the digital certificate of the issuing certification authority when the digital certificate of the... Arm Ip Limited

Communication mechanism for data processing devices

A method for controlling communications between a data processing device in a first network and a target service in a second network via a gateway apparatus, the method comprising: transmitting a request to communicate with the target service from the data processing device to the gateway apparatus; transmitting device credentials... Arm Ip Limited

Time-limited access to configuration settings

Broadly speaking, embodiments of the present techniques provide methods and apparatus to implement a time-limited configuration settings hierarchy. The time-limited configuration settings hierarchy introduces a temporary override setting that allows a fail-back to a prior setting after the expiry of a time period. This allows temporary users of IoT devices... Arm Ip Limited

Proximity authentication protocol

A machine implemented method of authenticating a communication channel between a first device and a second device by providing proof of proximity between both devices, the method comprising: generating, at the first device, an acoustic authentication signal to be received at the second device via a solid body acoustic coupling... Arm Ip Limited

Methods and resources for generating secure communications

A method of generating wireless communications from a transmit-only device, the method comprising: generating, at the transmit-only device, a first current session key; generating, at the transmit-only device, operational data; generating, at the transmit-only device, crypto-data by performing a cryptographic operation on the operational data using the first current session... Arm Ip Limited

Energy-based scheduling of operations to be executed by a data processing apparatus

A method of scheduling operations to be executed by a data processing apparatus 2 includes determining energy cost functions for candidate schedules of operations, based on which resources of the data processing apparatus are required for execution of the operations. One of the candidate schedules is selected based on the... Arm Ip Limited

Method for mitigating a dos attack on a device

There is described a method for mitigating a power-denial of service attack on a first device by a second device, the method comprising: transmitting, from the first device to the second device, a first communication comprising a first task to be solved by the second device; receiving, at the first... Arm Ip Limited

Control mechanisms for data processing devices

A method of controlling a data processing device, the method comprising: receiving, at the data processing device, a communication from a remote device wherein the communication comprises verification data; verifying the verification data at the data processing device; initiating an action by a watchdog associated with the data processing device... Arm Ip Limited

Methods of accessing and providing access to a remote resource from a data processing device

A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first URL corresponding to the remote resource (4), obtaining secret data corresponding to the first URL, using the secret data to generate an obscured URL at the data processing device (2), and accessing... Arm Ip Limited

Methods of accessing and providing access to data sent between a remote resource and a data processing device

A method of accessing data sent between a remote resource and a data processing device, the method comprising: caching data uploaded from the remote resource or caching data sent to the remote resource at one or more intermediate network nodes between the data processing device and the remote resource; and... Arm Ip Limited

Method and device for updating software executed from non-volatile memory

A data processing device has a processor which executes software directly from non-volatile memory. The processor has a runtime component which dynamically maps software element identifiers specified by the software to corresponding software elements in memory. Mapping information is used to determine which software elements identifiers correspond to which software... Arm Ip Limited

A wearable device having a fingerprint sensor

A device worn by a user has a device body providing a first surface that is located adjacent to skin of the user when the device is being worn. Fingerprint sensor circuitry on the device comprises a capacitive fingerprint sensor and associated control circuitry, a primary impedance path being established... Arm Ip Limited

Resource access control using a validation token

Access to a resource controlled by a resource server (6, 8) is provided using a validity token issued by a validation server (4). When a resource request from a user (12) is received at the resource server (6, 8), then the resource server (6, 8) determines if the resource request... Arm Ip Limited

Detecting undesired energy consumption in electronic devices

A method for detecting and responding to a configuration setting capable of causing undesired energy consumption in a configurable electronic device comprises measuring a power state of at least one connection point of the configurable electronic device to establish a measured power state value; comparing the measured power state value... Arm Ip Limited

System for monitoring a plurality of distributed devices

Apparatus and methods for remotely monitoring a plurality of distributed devices is provided. The apparatus and methods determine logging conditions which define a state of a device at which recording of the state of the device should begin prior to an event, in order to identify a sequences of actions... Arm Ip Limited

Methods for verifying data integrity

A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for... Arm Ip Limited

Data access and ownership management

In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the... Arm Ip Limited

Access control and code scheduling

A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls... Arm Ip Limited

Managing interaction constraints

A method for operating an electronic device to configure a subject device, the method comprising steps of: receiving an intent from a subject device, wherein the received intent comprises an action identifier identifying an action the subject device wishes to perform; receiving action data about the received intent from an... Arm Ip Limited








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Arm Ip Limited in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Arm Ip Limited with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###