Sei sulla pagina 1di 9

US Patent Application Review Series

Apple

Week of 22 April 2010 Issue

Provide to you by:

D-Publish
c

All information provided “as is“ for informational purposes only, not intended for research
or development purposes or advice. Neither D-Publish nor its associates are liable for any
informational errors, incompleteness, or delays, or for any actions taken in reliance, direct
or indirect, on information contained herein.

Apple - Week of 22 April 2010 USPTO Patent Applications 1


A few words from the editor

A few words from the editor


If I have seen a little further it is by standing on the shoulders of giants.
- Issac Newton

If you want your views to be known, we now open this monthly review to columnists, bloggers
and IP practitioners. Send us an email at info@d-publish.com and lets discuss how we can
work together. We also accept advertorial and advertisement placements.

Structure of this review IPC Catchword Index is an alphabetical sorted list of


catchwords of the IPC appeared in the review.
The Table of Contents is created based on
alphabetical order of IPC. The patent applications
are also sorted by alphabetical order of IPC. A brief How to use this review?
description of each IPC is shown. We find that the IPC
description could help ‘deciphering’ the abstract of an For creativity stimulation purpose:
patent application. If a patent application belongs to • quickly flip the pages and write down the page
multiple IPC, the patent application will only be shown number of the diagrams that interests you for
under the section of first IPC. later review.
For each patent application, the following information
will be shown: • look up the IPC Catchword Index and go to the
IPC that you are interested
1. App. No. – patent application no. – it is unique
to each patent application. For business intelligent purpose:
2. Assignee – this is owner of the patent • quickly flip the pages and identify the IPC that
application. If there is no assignee being could “ring a bell”
specified, either the inventor of the patent
application own the patent application or the • study all patent applications belong to the
owner of the patent application did not record identified IPC.
such information when the patent application
was filed. For engineering design purpose:

3. Title – this is the title of the patent application. • quickly flip the pages and identify the diagrams
that may be similar to your work.
4. Abstract – this is the abstract of the patent
application. There are rules on how an abstract • click on the patent application link and visit the
should be drafted. Most patent attorneys like to US server for more detailed information of the
have the abstract based on the first claim of the patent application.
patent application.
• read the description of IPC carefully.
5. Pri. Date – priority date – it is the date
of filing of the first application of the patent • if you are interested in IPC, compare the patent
application (a patent application could have applications belong to it.
multiple application dates because of divisional
patents as well as overseas patent applications). Copyright
It is considered to be the effective date of filing
for the examination of novelty and inventive Patent applications are free of copyrights unless the
step or non-obviousness for the subsequent inventor specifically stated so in the patent application.
application claiming the priority of the first However, this review is protected by copyright law due
application. to the editing effort we have invested in. We hope you
find this review useful and would recommend your
6. App. Date – application date – it is the date of friend to purchase another review from us. Please
filing of the patent application at the US. do not copy or distribute this review. This would be
a violation of copyright law and reduce the amount of
7. Pub. Date – publishing date – it is the date of the revenue we should earn.
patent application published by US. Usually, it is
about 18 months after the application date. We hope you find this review useful. If you
would like to contact us or have us to develop a
Patent Index is a numerical sorted list the patent customized review, please send us an email at
applications appeared in the review. info@d-publish.com.

Apple - Week of 22 April 2010 USPTO Patent Applications 2


Table of Contents

G06F 17/00 - Digital computing or data


processing equipment or methods,
specially adapted for specific functions . 4
G06K 09/40 - Noise filtering . . . . . . . . . . 5

Table of Contents H04 - Transmission of digital information, e.g.


telegraphic communication 5
H04L 09/06 - the encryption apparatus
using shift registers or memories for
blockwise coding, e.g. D.E.S. systems . 5
H04L 09/28 - using particular encryption
A few words from the editor 2 algorithm . . . . . . . . . . . . . . . . . 7
Table of Contents 3 H04L 09/32 - including means for verifying
the identity or authority of a user of the
G06 - Electric digital data processing 4 system . . . . . . . . . . . . . . . . . . . 7
G06F 07/38 - Methods or arrangements
for performing computations using Patent Index 8
exclusively denominational number
representation, e.g. using binary,
ternary, decimal representation . . . . . 4 IPC Catchword Index 9

Apple - Week of 22 April 2010 USPTO Patent Applications 3


G06F 17/00

G06F 07/38: Electric digital data processing Ü Methods or arrangements


for processing data by operating upon the order or content of the data
handled Ü Methods or arrangements for performing computations using
exclusively denominational number representation, e.g. using binary,
ternary, decimal representation
App. No. 20100100947 Assignee Apple Inc.
Title Scheme for authenticating without password exchange
Abstract Aspects relate to systems and methods implementing a scheme allowing a Verifier (V) to
authenticate a Prover (P). The scheme comprises pre-sharing between V and P a graph of nodes.
Each node is associated with a polynomial. V sends P data comprising data for selecting a
polynomial of the graph, such as traversal data for proceeding from a known node to another
node, a time interval, and a number k. P uses the time interval in an evaluation of the polynomial.
P then uses the evaluation as a x3bb; in a Poisson distribution, and determines a value related to
a probability that a number of occurrences of an event equals k. P sends the determined value
to V. V performs a similar determination to arrive at a comparison value. P authenticates V if
the separately determined values match, or otherwise meet expectations. The process can be
repeated to increase confidence in authentication.
Pri. Date 20081022 App. Date 20081021 Pub. Date 20100422

G06F 17/00: Electric digital data processing Ü Digital computing or


data processing equipment or methods, specially adapted for specific
functions
App. No. 20100100212 Assignee APPLE INC.
Title Efficient techniques for modifying audio playback rates
Abstract Improved techniques for modifying a playback rate of an audio item (e.g., an audio stream) are
disclosed. As a result, the audio item can be played back faster or slower than normal. The
improved techniques are resource efficient and well suited for audio items containing speech.
The resource efficiency of the improved techniques make them well suited for use with portable
media devices, such as portable media players.
Pri. Date 20081022 App. Date 20091224 Pub. Date 20100422

Apple - Week of 22 April 2010 USPTO Patent Applications 4


H04L 09/06

G06K 09/40: Recognition of data Ü Methods or arrangements for reading


or recognising printed or written characters or for recognising patterns,
e.g. fingerprints Ü Image preprocessing, i.e. processing the image
information without deciding about the identity of the image Ü Noise
filtering
App. No. 20100098350 Assignee APPLE INC.
Title Blur computation algorithm
Abstract Disclosed herein is an improved blur computation algorithm. The proposed algorithm
accomplishes a blur of an image using fragment programs on a GPU. Alternatively, the blur may
be computed on a CPU through emulation or directly programmed. Modifications of the program
are possible that accomplish motion blur, zoom blur, radial blur, and various other forms of blur
that vary across an image computed for the purpose of simulating depth-of-field.
Pri. Date 20081218 App. Date 20091222 Pub. Date 20100422

H04L 09/06: Transmission of digital information, e.g. telegraphic communication


Ü Arrangements for secret or secure communication Ü the encryption
apparatus using shift registers or memories for blockwise coding, e.g.
D.E.S. systems
App. No. 20100098244 Assignee Apple Inc.
Title System and method for stream/block cipher with internal random states
Abstract Disclosed herein are systems, methods, and computer readable-media for performing data
encryption and decryption using a stream or block cipher with internal random states. The method
includes splitting the input data into a predetermined number of blocks and processing each block.
The processing includes creating sub-blocks, permuting the sub-blocks, replacing bytes using a
lookup table, rotating bits, performing expansion and combining sets of bits. The element of
randomness employed in this process allows for the same input to yield the same output, with
differing internal states.
Pri. Date 20081020 App. Date 20081021 Pub. Date 20100422

Apple - Week of 22 April 2010 USPTO Patent Applications 5


H04L 09/06

App. No. 20100098255 Assignee Apple Inc.


Title System and method for a derivation function for key per page
Abstract Disclosed herein are systems, methods and computer-readable media to perform data encryption
and decryption using a derivation function to obtain a key per page of data in a white-box
environment. The method includes sharing a master key with the sender and receiver, splitting
the input data into blocks and sub-blocks, and utilizing a set of keys and a master key to derive
a page key. In another aspect of this disclosure, the key validation and shuffling operations are
included. This method allows for the derivation of a key instead of storing a predetermined key,
thus maintaining system security in a white-box environment.
Pri. Date 20070228 App. Date 20081021 Pub. Date 20100422

Apple - Week of 22 April 2010 USPTO Patent Applications 6


H04L 09/32

H04L 09/28: Transmission of digital information, e.g. telegraphic communication


Ü Arrangements for secret or secure communication Ü using particular
encryption algorithm
Patent applications also belong to this classification and have been already shown:
20100098255 page 6

H04L 09/32: Transmission of digital information, e.g. telegraphic communication


Ü Arrangements for secret or secure communication Ü including means
for verifying the identity or authority of a user of the system

Apple - Week of 22 April 2010 USPTO Patent Applications 7


Patent Index

Patent Index
Patent Application Page Patent Application Page Patent Application Page
20100098244 5 20100098255 6 20100098350 5
20100100212 4 20100100947 4

Apple - Week of 22 April 2010 USPTO Patent Applications 8


IPC Catchword Index

IPC Catchword Index

Catch Word IPC Page


ACCOUNT(S) electric digital computers for accounting G06F 17/00 4
BANK(S) -accounting computers G06F 17/00 4
COMPILING statistics G06 4
COMPUTER(S) G06 4
COMPUTER(S) multimedia applications G06F 17/00 4
DATA processing G06 4
EQUATIONS solving EQUATIONS G06 4
FUNCTIONS evaluating FUNCTIONS G06 4
INVENTORY electric digital computers for INVENTORY G06F 17/00 4
INVOICING electric digital computers for INVOICING G06F 17/00 4
RESERVATION electric computers for RESERVATION of seats G06F 17/00 4
SEAT(S) electric digital computers for SEAT(S) reservation G06F 17/00 4
STATISTICS electric digital computers for STATISTICS G06F 17/00 4
TOTALISATORS for electrically computing outcome of betting G06F 17/00 4
TRAFFIC electric digital computers for TRAFFIC control G06F 17/00 4
WEAPON(S) electric digital computers for WEAPON(S) G06F 17/00 4

Apple - Week of 22 April 2010 USPTO Patent Applications 9

Potrebbero piacerti anche