Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Arm Ip Limited patents


Recent patent applications related to Arm Ip Limited. Arm Ip Limited is listed as an Agent/Assignee. Note: Arm Ip Limited may have other listings under different names/spellings. We're not affiliated with Arm Ip Limited, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Arm Ip Limited-related inventors


Methods and apparatus for protecting domains of a device from unauthorized accesses

A machine implemented method for protecting a target domain and a source domain from unauthorized accesses. The method comprising: identifying an exit call gateway comprising an exit transition instruction and at least one exit access parameter, said exit access parameters restricting exit from said source domain; identifying an entry call gateway corresponding to said exit call gateway, said entry call gateway comprising a transition instruction and at least one entry access parameter, said entry access parameters restricting access to said target domain; determining that said exit access parameters and said entry access parameters are compatible with each other; and performing a context switch from said source domain to said target domain, when said exit access parameters and said entry access parameters are complied with.. ... Arm Ip Limited

Management of control parameters in electronic systems

The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.. . ... Arm Ip Limited

Method and device for scanning for data processing devices

There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at the data processing device, the search input to provide a transformed output, wherein the transformed output is representative of the search input; transmitting, a communication comprising the transformed output from the data processing device to the remote device; receiving, at the data processing a device, a communication from the remote device based on the transformed output.. . ... Arm Ip Limited

Methods of communication between a remote resource and a data processing device

Methods of communication between a remote resource and a data processing device, the system include storing in a transaction queue a message posted from the remote resource; sending a request to create a guest transaction queue, the guest transaction queue being accessible by both the data processing device and the remote resource; creating the guest transaction queue; reading, by the data processing device, the message from the remote resource; responding, from the data processing device to the remote resource by posting a message to the guest transaction queue; reading, by the remote resource, the message from the data processing device.. . ... Arm Ip Limited

Method, hardware and digital certificate for authentication of connected devices

A method of generating a shortcut certificate for authenticating a user digital certificate generated by an issuing certification authority; the method comprising: authenticating the digital certificate of the issuing certification authority; creating the shortcut certificate for the digital certificate of the issuing certification authority when the digital certificate of the issuing certification authority is authenticated; wherein the shortcut certificate comprises a signed entry of an authentication of the issuing certification authority.. . ... Arm Ip Limited

Communication mechanism for data processing devices

A method for controlling communications between a data processing device in a first network and a target service in a second network via a gateway apparatus, the method comprising: transmitting a request to communicate with the target service from the data processing device to the gateway apparatus; transmitting device credentials from the data processing device to the gateway apparatus, wherein the credentials comprise information relating to the target service; verifying at the gateway apparatus an authentication status of the data processing device based on the device credentials; establishing a communication path between the data processing device and the target service if the authentication status is verified.. . ... Arm Ip Limited

Proximity authentication protocol

A machine implemented method of authenticating a communication channel between a first device and a second device by providing proof of proximity between both devices, the method comprising: generating, at the first device, an acoustic authentication signal to be received at the second device via a solid body acoustic coupling established between the first device and the second device thereby providing proof of proximity between both devices and so authenticating the communication channel between the first device and the second device.. . ... Arm Ip Limited

Time-limited access to configuration settings

Broadly speaking, embodiments of the present techniques provide methods and apparatus to implement a time-limited configuration settings hierarchy. The time-limited configuration settings hierarchy introduces a temporary override setting that allows a fail-back to a prior setting after the expiry of a time period. ... Arm Ip Limited

Methods and resources for generating secure communications

A method of generating wireless communications from a transmit-only device, the method comprising: generating, at the transmit-only device, a first current session key; generating, at the transmit-only device, operational data; generating, at the transmit-only device, crypto-data by performing a cryptographic operation on the operational data using the first current session key; transmitting, from the transmit-only device, a first identifier to enable a resource derive the first current session key; transmitting, from the transmit-only device, the crypto-data.. . ... Arm Ip Limited

Energy-based scheduling of operations to be executed by a data processing apparatus

A method of scheduling operations to be executed by a data processing apparatus 2 includes determining energy cost functions for candidate schedules of operations, based on which resources of the data processing apparatus are required for execution of the operations. One of the candidate schedules is selected based on the energy cost functions. ... Arm Ip Limited

Method for mitigating a dos attack on a device

There is described a method for mitigating a power-denial of service attack on a first device by a second device, the method comprising: transmitting, from the first device to the second device, a first communication comprising a first task to be solved by the second device; receiving, at the first device from the second device, a second communication comprising one of a proposed solution to the first task and at least one trust credential; verifying, at the first device, the second communication; responsive to an unsuccessful verification of the second communication, transmitting, from the first device to the second device a third communication comprising a second task to be solved by the second device.. . ... Arm Ip Limited

Control mechanisms for data processing devices

A method of controlling a data processing device, the method comprising: receiving, at the data processing device, a communication from a remote device wherein the communication comprises verification data; verifying the verification data at the data processing device; initiating an action by a watchdog associated with the data processing device based on the verification.. . ... Arm Ip Limited

Methods of accessing and providing access to a remote resource from a data processing device

A method of accessing a remote resource (4) from a data processing device (2) includes obtaining a first url corresponding to the remote resource (4), obtaining secret data corresponding to the first url, using the secret data to generate an obscured url at the data processing device (2), and accessing the remote resource using the obscured url. This allows the user of the device (2) to see a first url which is intelligible and provides useful information about the device, without sharing that information with the network. ... Arm Ip Limited

Methods of accessing and providing access to data sent between a remote resource and a data processing device

A method of accessing data sent between a remote resource and a data processing device, the method comprising: caching data uploaded from the remote resource or caching data sent to the remote resource at one or more intermediate network nodes between the data processing device and the remote resource; and accessing the cached data stored at the one or more intermediate network nodes.. . ... Arm Ip Limited

05/11/17 / #20170131996

Method and device for updating software executed from non-volatile memory

A data processing device has a processor which executes software directly from non-volatile memory. The processor has a runtime component which dynamically maps software element identifiers specified by the software to corresponding software elements in memory. ... Arm Ip Limited

05/04/17 / #20170126685

Resource access control using a validation token

Access to a resource controlled by a resource server (6, 8) is provided using a validity token issued by a validation server (4). When a resource request from a user (12) is received at the resource server (6, 8), then the resource server (6, 8) determines if the resource request satisfies a policy. ... Arm Ip Limited

05/04/17 / #20170124371

A wearable device having a fingerprint sensor

A device worn by a user has a device body providing a first surface that is located adjacent to skin of the user when the device is being worn. Fingerprint sensor circuitry on the device comprises a capacitive fingerprint sensor and associated control circuitry, a primary impedance path being established between electrodes of the capacitive fingerprint sensor when a user places a finger on the capacitive fingerprint sensor. ... Arm Ip Limited

04/20/17 / #20170108913

Detecting undesired energy consumption in electronic devices

A method for detecting and responding to a configuration setting capable of causing undesired energy consumption in a configurable electronic device comprises measuring a power state of at least one connection point of the configurable electronic device to establish a measured power state value; comparing the measured power state value with a stored power state value for the connection point; and responsive to a discrepancy between the measured power state value and the stored power state value for the connection point where the discrepancy is capable of causing undesired energy consumption, emitting a condition signal.. . ... Arm Ip Limited

03/16/17 / #20170075748

System for monitoring a plurality of distributed devices

Apparatus and methods for remotely monitoring a plurality of distributed devices is provided. The apparatus and methods determine logging conditions which define a state of a device at which recording of the state of the device should begin prior to an event, in order to identify a sequences of actions which occur at the devices prior to the event.. ... Arm Ip Limited

02/09/17 / #20170039085

Access control and code scheduling

A data processing system operates in a plurality of modes including a first privilege mode and a second privilege mode with the first privilege mode giving rights of access that are not available in the second privilege mode. Application code executes in the second privilege mode and generates function calls to hypervisor code which executes in the first privilege mode. ... Arm Ip Limited

02/02/17 / #20170031333

Managing interaction constraints

A method for operating an electronic device to configure a subject device, the method comprising steps of: receiving an intent from a subject device, wherein the received intent comprises an action identifier identifying an action the subject device wishes to perform; receiving action data about the received intent from an intent store, wherein the action data comprises an action associated with each action identifier, and at least one constraint associated with the action; and generating invocation data to perform the action, wherein the invocation data comprises the action identifier, and zero or more parameters.. . ... Arm Ip Limited








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Arm Ip Limited in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Arm Ip Limited with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###