At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for dynamic switching and real time security control
on virtualized systems
In some embodiments, the invention involves securing network traffic to and from a host processor. A system and method is disclosed which utilizes a second...
Micro and macro trust in a decentralized environment
A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of...
Method and apparatus for providing personalized supplemental programming
A method and apparatus for providing personalized supplemental programming is provided. In one embodiment, the invention can include searching text for a...
Audio subsystem sharing in a virtualized environment
A device, method, and system are disclosed. In one embodiment the device includes a first virtual machine to directly access a physical audio codec. The device...
Structured web advertising
A system for selecting a candidate information unit for linking to a given information unit based on the content of the given information unit. The content of...
Memory error detection and/or correction
An embodiment may include circuitry that may detect and/or correct at least one error in a data codeword that may include a data word, cyclical redundancy check...
Redundant acknowledgment in loopback entry
Redundant acknowledgment between agents performing a loopback test over bidirectional communications bus is described. In one example, in a processor including...
Operational state preservation in the absence of AC power
A system is provided with the ability to intervene, when a suspend process is initiated in response to an AC failure condition to place the system in a...
Method and apparatus for verifying authenticity of initial boot code
Described herein is an alteration of the normal reset sequence of a programmable microprocessor to perform a cryptographic verification of a block of memory...
Launching a secure kernel in a multiprocessor system
In one embodiment of the present invention, a method includes verifying an initiating logical processor of a system; validating a trusted agent with the...
Providing metadata in a translation lookaside buffer (TLB)
In one embodiment, the present invention includes a translation lookaside buffer (TLB) to store entries each having a translation portion to store a virtual...
Satisfying memory ordering requirements between partial reads and
A method and apparatus for preserving memory ordering in a cache coherent link based interconnect in light of partial and non-coherent memory accesses is herein...
Offloading input/output (I/O) virtualization operations to a processor
In one embodiment, the present invention includes a method for receiving a request for a direct memory access (DMA) operation in an input/output (I/O) hub,...
Method, apparatus and system for reduced channel starvation in a DMA
Techniques for generating information identifying a next direct memory access (DMA) task to be serviced. In an embodiment, arbitration logic provides a sequence...
Method and system for communicating between memory regions
A method and system are provided for transferring data in a networked system between a local memory in a local system and a remote memory in a remote system. A...
Exposing device features in partitioned environment
An embodiment of the present invention is a technique to process an input/output (I/O) transaction. An emulated device driver in a guest partition interacts...
Method of measurement reporting, method of handling measurement reports,
cellular radio terminal and cellular...
A method of measurement reporting, a method of handling measurement reports, a cellular radio terminal and a cellular radio network unit are provided. A method...
Techniques for wireless network communications with high-directional
steerable antennas combining quasi...
An embodiment of the present invention provides a method, comprising communicating in a wireless network using a low-rate quasi omni-directional communications...
System, method, and computer program product for picture resizing
System, method, and computer program product to adaptively blend the interpolation results from an 8-tap Lanczos filter and the interpolation results from a...
Virtual TPM keys rooted in a hardware TPM
The present subject matter related to trusted computing, and more particularly, to virtual trusted platform module keys rooted in a hardware trusted platform...
Direct macroblock mode techniques for high performance hardware motion
Direct macroblock mode techniques for high performance hardware motion compensation are described. An embodiment includes a hardware motion compensation...
In-situ jitter tolerance testing for serial input output
According to some embodiments, a method and apparatus are provided to generate a sine wave via a jitter modulator to modulate a control voltage of a clock...
Methods for pushing address translations mappings to PCI express endpoints
A method and system for improving throughput and speed of an interconnect system such as peripheral component interconnect express (PCIe). The method and system...
Adapting TXOP requests for multi-radio platforms
A first radio in a wireless network may request a transmit opportunity (TXOP) of a certain duration, with the duration being based a likelihood that a TXOP of...
Methods and apparatuses for delay-locked loops and phase-locked loops
A low power delay-locked loop (DLL) is presented. In one embodiment, the DLL includes a phase detector which includes a reference input and a feedback input to...
Blank including a composite panel with semiconductor chips and plastic
package molding compound and method and...
A blank and a semiconductor device are include a composite panel with semiconductor chips embedded in a plastic package molding compound. The blank includes a...
Device, system, and method of executing a call to a routine within a
Device, system, and method of executing a call to a routine within a transaction. In some embodiments an apparatus may include a memory having stored thereon...
Extended dynamic optimization of connection establishment and message
progress processing in a multi-fabric...
In one embodiment, the present invention includes a system that can optimize message passing by, at least in part, automatically determining a minimum number of...
Performing multi-bit error correction on a cache line
A processor may comprise a cache, which may be divided into a first and second section while the processor operates in a low-power mode. A cache line of the...
Method for optimizing voltage-frequency setup in multi-core processor
A method for dynamically operating a multi-core processor system is provided. The method involves ascertaining currently active processor cores, identifying a...
Method for firmware control invocation from power management
A method for usurping control of a computer system from an operating system using a mechanism otherwise used to enable the entry of the computer system into a...
Method, program and system to update files in a computer system
Provided is a method, program and system to update files in a computer system. A patch is received for an installed program in a computer and message from a...
Store performance in strongly ordered microprocessor architecture
Apparatus and methods relating to store operations are disclosed. In one embodiment, a first storage unit is to store data. A second storage unit is to store...
Shared cache performance
A method and apparatus for improving shared cache performance. In one embodiment, the present invention includes a cache having multiple ways. A locality tester...
Cache write integrity logging
An apparatus, as well as systems, methods, and articles can operate to record the address of write operations to a memory cached by a non-volatile cache prior...
Method and apparatus to facilitate system to system protocol exchange in
back to back non-transparent bridges
A dual host system and method with back to back non-transparent bridges and a proxy packet generating mechanism. The proxy packet generating mechanism enables...
Efficient handling of interrupts in a computing environment
A method for efficiently handling interrupts in a virtual technology environment with integrity services is provided. The method comprises assigning an...
Payment management on mobile devices
Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a...
Preventing self-induced interference in dual-radio device
In a wireless device that includes two different radio transceivers that communicate in two different wireless networks, wireless transmissions from one radio...
Distributed micro instructions set processor architecture for
high-efficiency signal processing
A wireless communication system hosts a plurality of processes in accordance with a communication protocol. The system includes application specific instruction...
Methods and apparatus for scalable video bitstreams
In some embodiments, a method includes generating a first image data frame, a first error image data frame and a second error image data frame based at least in...
Data definition apparatus, systems, and methods
An apparatus and a system, as well as a method and article, may operate to send a selected data type without self-definition information to a receiver if a...
Wireless communication system, associated methods and data structures
A wireless communication device, and a wireless communication system and a method of beamforming is presented. The wireless communication system and/or device...
Data transmission in a telecommunication conference
A communication terminal into which communication data can be input and which can receive a message signalling that at least one further communication terminal...
Bandwidth allocation base station and method for allocating uplink
bandwidth using SDMA
Embodiments of a base station and methods for allocating uplink bandwidth using SDMA are generally described herein. In some embodiments, uplink bandwidth...
Scheduler and method for allocating time and frequency dimensions of
downlink bursts in broadband wireless...
Embodiments of a scheduler and a method for assigning frequency and time dimensions of downlink bursts in broadband wireless access networks are generally...
Spatial reuse techniques with wireless network relays
In various embodiments of the invention, a relay station in a wireless communications network may communicate with one or more subscriber stations at the same...
Combined device and service discovery technique in stations supporting
tunneled direct link setup (TDLS)
A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including...
Distributing intelligence across networks
Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided...
Dynamic allocation of cyclic extension in orthogonal frequency division
Briefly, in accordance with one embodiment of the invention, an orthogonal frequency division multiplexing system may provide a dynamically calculated cyclic...