Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: intel





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,583,210 Fuse-based integrity protection
Various systems and methods for implementing fuse-based integrity protection are described herein. A system for validating a read-only memory (ROM), the system...
US-9,583,187 Multistage set procedure for phase change memory
Phase change material can be set with a multistage set process. Set control logic can heat a phase change semiconductor material (PM) to a first temperature for...
US-9,583,185 Phase change memory devices and systems having reduced voltage threshold drift and associated methods
Phase change memory devices, systems, and associated methods are provided and described. Such devices, systems, and methods manage and reduce voltage threshold...
US-9,583,182 Multi-level memory management
A multi-level memory management circuit can remap data between near and far memory. In one embodiment, a register array stores near memory addresses and far...
US-9,583,176 Variable weak leaker values during read operations
Systems, apparatuses and methods may provide for determining a status of an enable signal and selecting a leaker resistance from a plurality of leaker...
US-9,582,983 Low power voice trigger for finding mobile devices
Systems and methods may provide for monitoring an input audio signal from an onboard microphone of a mobile device while a host processor of the mobile device...
US-9,582,977 Systems and methods for monitoring consumption
A method monitors the consumption of materials, including determining the presence of materials in a smart receptacle using a sensor located in the smart...
US-9,582,924 Facilitating dynamic real-time volumetric rendering in graphics images on computing devices
A mechanism is described for facilitating dynamic real-time volumetric rendering of graphics images on computing devices. A method of embodiments, as described...
US-9,582,881 Machine vision image sensor calibration
A system, apparatus, method, and computer readable media for calibration of one or more extrinsic image sensor parameters. A system may calibrate a multi-camera...
US-9,582,858 Energy-efficient anti-aliasing
Anti-aliasing methods and systems may include logic to conduct a vertical blending weight determination based on horizontal pixel data associated with an image,...
US-9,582,853 Method and system of demosaicing bayer-type image data for image processing
Techniques related to demosaicing Bayer-type image data for image processing.
US-9,582,847 Color buffer compression
In accordance with some embodiments, a mask or table may be maintained to record information about whether or not each pixel within a tile is cleared. As used...
US-9,582,663 Detection of return oriented programming attacks
In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine...
US-9,582,572 Personalized search library based on continual concept correlation
A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a...
US-9,582,464 Systems, apparatuses, and methods for performing a double blocked sum of absolute differences
Embodiments of systems, apparatuses, and methods for performing in a computer processor vector double block packed sum of absolute differences (SAD) in response...
US-9,582,463 Heterogeneous input/output (I/O) using remote direct memory access (RDMA) and active message
Methods and apparatus to provide heterogeneous I/O (Input/Output) using RDMA (Remote Direct Memory Access) and/or Active Message are described. In an...
US-9,582,454 Reconfigurable transmitter
Described is a reconfigurable transmitter which includes: a first pad; a second pad; a first single-ended driver coupled to the first pad; a second single-ended...
US-9,582,434 Enhanced security for accessing virtual memory
A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory...
US-9,582,432 Instruction and logic for support of code modification in translation lookaside buffers
A processor includes a core with logic to execute a translated instruction. The translated instruction is translated from an instruction stored in a memory...
US-9,582,430 Asymmetric set combined cache
Embodiments are generally directed to an asymmetric set combined cache including a direct-mapped cache portion and a multi-way cache portion. A processor may...
US-9,582,422 Hardware prefetcher for indirect access patterns
Two techniques address bottlenecking in processors. The first is indirect prefetching. The technique can be especially useful for graph analytics and sparse...
US-9,582,357 Method and apparatus for treatment of state confidence data retrieved from a non-volatile memory array
Various embodiments are generally directed to an apparatus, method and other techniques to retrieve data from a non-volatile memory, and to read a memory cell...
US-9,582,339 Operation of software modules in parallel
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media (transitory and non-transitory) are described herein for...
US-9,582,332 Enabling a cloud to effectively assign workloads to servers
In accordance with some embodiments, a public infrastructure as a service (IaaS) user can provide a file, to a cloud service provider, with information about...
US-9,582,287 Processor having multiple cores, shared core extension logic, and shared core extension utilization instructions
An apparatus of an aspect includes a plurality of cores and shared core extension logic coupled with each of the plurality of cores. The shared core extension...
US-9,582,275 Method and apparatus for obtaining a call stack to an event of interest and analyzing the same
In one embodiment, a processor includes a performance monitor including a last branch record (LBR) stack to store a call stack to an event of interest, where...
US-9,582,216 Method and device to distribute code and data stores between volatile memory and non-volatile memory
A method, device, and system to distribute code and data stores between volatile and non-volatile memory are described. In one embodiment, the method includes...
US-9,582,046 Locking hinge assembly for electronic device
In one embodiment an electronic device comprises a housing having a first section and a second section comprising a display coupled to the first section by a...
US-9,581,639 Organic space transformer attachment and assembly
Electronic device assemblies and methods including an organic substrate based space transformer are described. One assembly includes a space transformer...
US-9,580,776 Tungsten gates for non-planar transistors
The present description relates to the field of fabricating microelectronic devices having non-planar transistors. Embodiments of the present description relate...
US-9,579,067 Detection of a leading stroke risk indicator
Embodiments of a system and method for detecting a leading stroke risk indicator using low-cost, non-contact visual computing methods are generally described...
US-9,578,681 Methods and arrangements for a low power device in wireless networks
Some new low power architecture devices may, e.g., be associated with in a new device category in the IEEE 802.11ah Standard for devices with low power...
US-9,578,659 User equipment and method for contention-based communications over allocated PUSCH resources
Methods for contention-based transmission with contention-free feedback for reduced latency in LTE Advanced networks and an enhanced PUCCH are generally...
US-9,578,653 Network assisted parameter estimation in the presence of inter-cell interference
Embodiments provide improved interference classification and parameter estimation at a User Equipment (UE) that uses received scheduling information associated...
US-9,578,635 Method and apparatus for autonomous cluster head selection for machine-type-communications (MTC)
The present disclosure presents embodiments of a system and method for improved uplink transmission management in a network that includes one or more...
US-9,578,616 Forming carrier aggregation timing advance groups in a heterogeneous network
Technology for forming carrier aggregation timing advance groups in a heterogeneous network (HetNet) is disclosed. One method comprises assigning at least a...
US-9,578,588 Apparatus, method and system of tethering between a mobile device and a network
Some demonstrative embodiments include devices, systems and methods of tethering between a mobile device and a network. For example, a first cellular device may...
US-9,578,544 Radio resource control messaging for dual connectivity networks
A 3GPP LTE protocol enhancement may realize the full benefit of dual connectivity in Long Term Evolution (LTE) networks by providing a mechanism to carry Radio...
US-9,578,537 Methods and arrangements for channel access in wireless networks
Some embodiments provide a normal rate preamble detector to detect a signal transmitted in accordance with a first set of modulation and coding schemes and a...
US-9,578,504 Authentication and authorization in a wearable ensemble
Various systems and methods for authentication and authorization in a wearable ensemble are described herein. A system for authenticating a wearable device...
US-9,578,484 Apparatuses, systems, and methods for differentiation of payload size for D2D discovery
Wireless mobile devices or user equipments (UEs) may communicate directly with other UEs, e.g., using device-to-device ("D2D") direct discovery and ...
US-9,578,458 Identification of rogue access points
Technologies for identifying rogue access points having an actual location different from a registered location include a computing device to receive a unique...
US-9,578,281 Managing traffic flow on a network path
A network device determines the traffic specification values based on the session values that represent the application parameters of an application, which is...
US-9,578,037 Allowing varied device access based on different levels of unlocking mechanisms
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the...
US-9,578,008 Technologies for secure bootstrapping of virtual network functions
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
US-9,577,953 Determination of a suitable target for an initiator by a control plane processor
A first computational device receives a response generated by a second computational device for a third computational device. A target that is suitable for use...
US-9,577,799 Wireless device, method, and computer readable media for signaling a resource allocation in a high-efficiency...
Wireless device, computer readable medium, and methods for signaling a resource allocation in a high-efficiency (HE) signal field are disclosed. A HE wireless...
US-9,577,793 Soft buffer management
Soft buffer management circuitry is provided for use in a device of a wireless communication system. The soft buffer management circuitry has input circuitry...
US-9,577,791 Notification by network element of packet drops
Methods and apparatus for implementing notification by network elements of packet drops. In response to determining a packet is to be dropped, a network element...
US-9,577,784 System, device, and method for securing voice authentication and end-to-end speech interaction
A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.