key (Total 66808 Patents Found)

Key (66808 Patents Found)
A key operated rotary core cylinder lock having rotary disc tumblers arranged in a pack with intervening spacer members within a rotary core sleeve normally held against rotation within the lock casing by a locking bar which spans the shear line between the disc tumbler peripheries and the confronting wall of the rotar...
In a method of correcting a position of each ink fountain key, a position of an ink fountain key is set as a present position with reference to a home position by using print data including an image area ratio of a reference plate having a predetermined image. A printing product is printed by using the reference plate ...
The invention provides a conversation device having a space key for instructing feeding of a printing tape without printing, a pulse oscillator for producing pulses of predetermined period upon depression of the space key, a counter for counting the pulses generated from the pulse oscillator, a one-shot multivibrator f...
In an incoming call communication service using key groups to be hunted provided through a switching system, there is provided a master terminal for a group formed of a plurality of slave terminals and a call to the master terminal is connected to a call-acceptable slave terminal in the group. In this case, certain sla...
A circuit arrangement is provided for connecting a personal computer (PC) to a port of a key telephone system via an adapter circuit which also interfaces a digital key set to the port. The adapter circuit is connected to the computer via an RS-232 single channel data link. The PC is programmed to generate and receive ...
An automotive antitheft key arrangement for locking and unlocking an automotive vehicular door and for operating an ignition system includes a transmitter, first and second receiving means for receiving an input code signal sent from the transmitter unit, and a discriminator including a comparator which compares the in...
A cylinder lock-key-combination includes a lock cylinder, a cylinder housing (2) and a cylinder plug (3) provided with a key slot (3a) and a row of tumblers (5). The tumblers (5) and associated key (4) present mutually adapted engaging and receiving members which function to forcibly guide movement of the tumblers in t...
A method for establishing a contractually guaranteed and lucrative endowment fundraising program. The program utilizes a third party lender, such as a bank, that finances a premium for a life insurance policy. The life insurance policy is owned by the tax-exempt organization for the life of a key person of the tax-exem...
A key cutting machine for the cutting of keys includes a spindle adapted to be driven rotatably about an axis thereof. The spindle has an axially extending throughbore. A milling cutter is selectively mountable in the throughbore for corotation therewith. A carriage for supporting a clamp assembly is movable relative t...
Various features pertain to embedded key generation and provisioning systems, such as systems installed within smartphones for generating public-key/private-key pairs for use in encryption/decryption and digital signature generation. In some examples, an embedded system is provided that generates two public-key/private...
A method for protecting a key implemented, by an electronic circuit, in a symmetrical algorithm for ciphering or deciphering a message, including the steps of: selecting in non-deterministic fashion a pair of different masks from a set of at least four different masks, the masks having the property of representing diff...
When processing repeated operations on the keyboard of a mobile communication device, mainly at direct debits, used is a separate data carrier with a memory in which is stored at least one file with a sequence of keyboard orders of a macro type. Data carrier is energetically supplied contact-free by electromagnetic fie...
A press key includes: a keycap movable with respect to a base unit; and a magnetic restoring device including a first magnetic member connected to the keycap and disposed between the base unit and the keycap, and a second magnetic member disposed on the base unit. The first and second magnetic members produce a repulsi...
Various embodiments relate to an apparatus for controlling a lighting device. A light control circuit can use a controlled lighting sequence control and drive viewed sections of a lighting device to display chroma key color or emit infrared light, while driving other unviewed portions of the lighting device to display ...
A method for generating a key for secure communication between a household appliance and an appliance includes the following steps: determining the key using identification information associated with the household appliance; and sending the identification information via an air interface of the household appliance in ...
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that informati...
A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are combined to store an operational master key. The operational master key is used for private key encryption during a checkout process. The operational private key i...
Some embodiments include a computer server. The computer server can be configured to: add a security system associated with a user account; provision one or more communication devices associated with the security system; configure a cryptographic key to associate at least a communication device amongst the communicatio...
A system and method of authenticated ID-based key exchange and remote login with insecure token and PIN number can provide an authenticated key agreement protocol based on an elliptic curve bilinear type-3 pairing. A server acts as an Authentication Service to Clients and a Trusted Authority (TA) issues identity based ...
The invention relates to a communication system that comprises a vehicle electronic key, a vehicle telecommunication device and a portable telecommunication terminal, the electronic key including a first transmitter and the vehicle including a first receiver, the first transmitter and the first receiver being provided ...
Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different vi...
A key structure includes a carrying body, a frame body, a keycap and at least two connecting members. The frame body is disposed on the carrying body, and the frame body is disposed with a plurality of sliding grooves. The keycap has a plurality of cap edges and correspondingly covers the top of the frame body, and the...
Described herein are techniques for rendering additional keys on a display of an electronic device based on one or more characteristics of a user's selection of another key. After rendering the additional keys, the user may thereafter select one of the additional keys now available and rendered on the display....