At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Preserving image privacy when manipulated by cloud services
An apparatus and method for preserving image privacy when manipulated by cloud services includes middleware for receiving an original image, splitting the...
Determination of a noise and interference covariance measure
A method includes receiving a signal including a two-dimensional signal pattern in a time-frequency representation, the two-dimensional signal pattern including...
Maximum likelihood sequence detection in the phase domain
A wireless device, and corresponding method, having a receiver configured to receive a signal having in-phase and quadrature components; a non-linear filter...
Near field communications-triggering for wireless display/docking
Described herein are techniques related to devices with wireless docking capabilities and more particularly near field communications-based techniques for...
Rake receiver circuit and method for operating a rake receiver circuit
A method of operating a Rake receiver circuit includes determining a first property of a first signal received over a dedicated channel and over a first...
Antenna system with self-identifying antenna
According to one embodiment disclosed herein, there is provided an antenna module including a self-identification mechanism that may be used by one or more...
Soft dark bit masking with integrated load modulation and burn-in induced
destabilization for physically...
Embodiments of an invention for soft dark bit masking are disclosed. In one embodiment, an apparatus includes a basic physically unclonable function (PUF) cell,...
Low leakage state retention synchronizer
Described is an apparatus which comprises: a first memory unit having an input and an output, wherein the first memory unit operates on a first power supply...
Antenna tuner control system using state tables
An antenna tuner control system includes an RF path, a lookup table and a state table analysis component. The RF path is configured to generate an RF signal....
Semiconductor device having tipless epitaxial source/drain regions
A semiconductor device having tipless epitaxial source/drain regions and a method for its formation are described. In an embodiment, the semiconductor device...
Floating body memory cell having gates favoring different conductivity
A method for fabricating floating body memory cells (FBCs), and the resultant FBCs where gates favoring different conductivity type regions are used is...
Electronic package and method of connecting a first die to a second die to
form an electronic package
Some embodiments relate to an electronic package. The electronic package includes a substrate that includes a plurality of buildup layers. A first die is...
Bridge interconnect with air gap in package assembly
Embodiments of the present disclosure are directed towards techniques and configurations for a bridge interconnect assembly that can be embedded in a package...
Optical interconnect on bumpless build-up layer package
This disclosure relates generally to an electronic package that can include a die and a dielectric layer at least partially enveloping the die. Electrical...
Integrated circuit package with embedded bridge
Embodiments of the present disclosure are directed towards an integrated circuit (IC) package having first and second dies with first and second input/output...
Driving displays at cinematic frame rates
Described herein are technologies related to playing moving-images content and more particularly to playing such content on a display possessing a display...
Techniques to control frame display rate
Techniques to determine when to decrease a frame display rate based in part on the amount or degree of change between sequential frames. The amount or degree of...
Rendering transparent primitives
Representing a transparent object as a summation of substantially zero step functions of a visibility curve for the object. An array may be used to store nodes...
Fallback detection in motion estimation
Techniques related to managing the use of motion estimation in video processing are discussed. Such techniques may include determining dividing two video frames...
Linear address mapping protection
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier...
Inter-component communication including slave component initiated
Component apparatuses with inter-component communication capabilities, and system having such component apparatuses are disclosed herein. In embodiments, such a...
Apparatus, method, and system for instantaneous cache state recovery from
An apparatus and method is described herein for providing instantaneous, efficient cache state recover upon an end of speculative execution. Speculatively...
Phase change memory with switch (PCMS) write error detection
Methods and apparatus related to PCMS (Phase Change Memory with Switch) write error detection are described. In one embodiment, a first storage unit stores a...
Optimization for safe elimination of weak atomicity overhead
A method and apparatus for optimizing weak atomicity overhead is herein described. A state table is maintained either during static or dynamic compilation of...
Techniques for dynamic physical memory partitioning
Various embodiments are presented herein that reallocate partitions of a shared physical memory between processing units. An apparatus and a ...
Instruction and logic for scheduling instructions
A processor includes a front end and a scheduler. The front end includes logic to determine whether to apply an acyclical or cyclical thread assignment scheme...
Leading change anticipator logic
In one embodiment, a processor includes at least one floating point unit. The at least one floating point unit may include an adder, leading change anticipator...
Technique for preserving cached information during a low power mode
A technique to retain cached information during a low power mode, according to at least one embodiment. In one embodiment, information stored in a processor's...
Voltage regulator supplying power exclusively to a non-core region of a
processor having a supply capability...
Systems and methods may provide for monitoring a current provided from a voltage regulator to a non-core region of a processor, and asserting a throttle signal...
Initialization in multiple clock domains. A first die having a master initialization component generates initialization commands. A local initialization agent...
Low-impedance reference voltage generator
Described herein is an apparatus and system of a low-impedance reference voltage generator. The apparatus comprises: a voltage-control loop including a first...
Frequency detection circuits, radio frequency signal processing devices
and methods for calibrating inductance...
A frequency detection circuit includes a filter, a power detector and a voltage comparator. The filter receives and filters a converted signal to generate a...
Asynchronous programmable JTAG-based interface to debug any system-on-chip
states, power modes, resets, clocks,...
An asynchronous debug interface is disclosed that allows TAG agents, JTAG-based debuggers, firmware, and software to debug, access, and override any functional...
Three-dimensional data acquisition
A projector illuminates an object, within the field of view of a camera, with a sequence of code patterns. The camera captures the illuminated object and...
Printing information on electronic paper
A method and system for displaying information on an electronic paper (or "e-paper") is included herein. The method includes passing the e-paper through an...
Bidirectional iterative beam forming
Bidirectional iterative beam forming techniques are described. An apparatus may include a wireless device having an antenna control module operative to initiate...
RF chain usage in a dual network architecture
An apparatus and method for using a radio frequency (RF chain) in a dual-network architecture are disclosed herein. An evolved node B (eNodeB) receives RF chain...
Association biasing for a heterogeneous network (HetNet)
A method for association biasing at a mobile device in a heterogeneous network (HetNet) is disclosed. The method can include the mobile device receiving...
Energy-harvesting devices in wireless networks
Embodiments of the present disclosure describe communication techniques and configurations for energy-harvesting devices in a wireless communication network. An...
Access point and methods for distinguishing HEW physical layer packets
with backwards compatibility
Embodiments of a system and methods for distinguishing high-efficiency Wi-Fi (HEW) packets from legacy packets are generally described herein. In some...
Representative implementations of devices and techniques provide care-of-address handover. In one implementation, a message is sent to a server in a...
Communication device performing measurements using assigned time slots
A method for performing a measurement by a communication device including selecting at least one measurement type of a plurality of measurement types, wherein...
Audio control based on orientation
A device may be configured to sense its own orientation with respect to a coordinate system, and to also sense the orientation of a user's head with respect to...
Low power audio trigger via intermittent sampling
Systems and methods may provide for using an audio front end of a mobile device to sampled audio from an audio signal during a first portion of a periodic...
Filter for network intrusion and virus detection
Methods and apparatus to perform string matching for network packet inspection are disclosed. In some embodiments there is a set of string matching slice...
Activation and monetization of features built into storage subsystems
using a trusted connect service back end...
Embodiments of systems, apparatuses, and methods to enable a value-added storage service of a storage system coupled to a client are described. In some...
State-transition based network intrusion detection
A network intrusion detection unit (NIDU) identifies a protocol used to transmit a packet and the flow to which the packet belongs. The NIDU determines whether...
Aggregating completion messages in a sideband interface
In one embodiment, the present invention includes a method for receiving a request in a router from a first endpoint coupled to the router, where the request is...
Power mangement techniques for an input/output (I/O) subsystem
A method and system to improve the power management for an I/O subsystem. In one embodiment of the invention, the power management of an upstream port of the...
Instructions to perform JH cryptographic hashing in a 256 bit data path
A method is described. The method includes executing one or more JH_SBOX_L instructions to perform S-Box mappings and a linear (L) transformation on a JH state...