At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Adaptive delay base loss equalization
A method, system and apparatus to self-determine equalization parameters for a channel. An initiator sends an equalization insensitive signal (EIS) to a...
Method and system for securely computing a base point in direct anonymous
A method and system computes a basepoint for use in a signing operation of a direct anonymous attestation scheme. The method and system includes computing a...
Base station and method for configuring sub-frames for relay-node
A frame structure for support of large delay spread deployment scenarios (e.g., cellular system operation in large cell sizes or low frequency bands) is...
Device, system and method of communicating aggregate data units
Some demonstrative embodiments include devices, systems and/or methods of communicating aggregate data units. For example, a device may include a wireless...
Device, system and method of wireless communication via one or more
Some demonstrative embodiments include devices, systems and/or methods of wireless communication via multiple antenna assemblies. For example, a device may...
Hybrid common mode choke
A system, hybrid common mode choke, and method are described herein. The system includes a differential signal transmitter and a differential signal receiver. A...
Dual mode receiver with RF splitter using programmable passive components
One embodiment of the present invention relates to a dual mode receiver that includes an RF splitter configured to operate in two modes, wherein in a first mode...
DC/DC converter, method for providing an output voltage on the basis of an
input voltage and computer program
A DC/DC converter includes a switch mode converter for providing an output voltage based on an input voltage and a drive signal generator configured to provide...
Multi-threshold voltage devices and associated techniques and
Embodiments of the present disclosure describe multi-threshold voltage devices and associated techniques and configurations. In one embodiment, an apparatus...
Germanium-based quantum well devices
A quantum well transistor has a germanium quantum well channel region. A silicon-containing etch stop layer provides easy placement of a gate dielectric close...
Group III-N transistor on nanoscale template structures
A III-N semiconductor channel is formed on a III-N transition layer formed on a (111) or (110) surface of a silicon template structure, such as a fin sidewall....
Voice and/or facial recognition based service provision
Apparatuses, methods and storage medium associated with voice and/or facial recognition based service provision are disclosed herein. In embodiments, an...
Obtaining consumer electronic device state information
Apparatus, systems, and methods may operate to obtain an image of a consumer electronic device, the image comprising at least one visual indication of a first...
Reduced bitcount polygon rasterization
Techniques are disclosed for carrying out rasterization of a given graphics workload, wherein portions of the workload associated with relatively high bit count...
Multi-view rasterization using an analyticl visibility function
Multi-view rasterization may be performed by calculating visibility over a camera line. Edge equations may be evaluated iteratively along a scanline. The edge...
System and method for facilitating the execution of law enforcement duties
A system and method for facilitating the execution of law enforcement duties is disclosed. More particularly, according to one aspect of the invention, an...
Periodic training for unmatched signal receiver
I/O parameters are adjusted based on a number of errors detected in a received training signal. A controller device sends the training signal while a memory...
Light ID error detection and correction for light receiver position
A light receiver records images of light beams originating from a neighborhood of lights, and demodulates identifiers (IDs) from them at determined image...
Using a trusted platform module for boot policy and secure firmware
Embodiments of apparatuses and methods for using a trusted platform module for boot policy and secure firmware are disclosed. In one embodiment, a trusted...
Random access channel enhancements for LTE devices
Described herein is a technique for aggregating background traffic packets by the background users instead of performing a random access procedure to request an...
Techniques for assisted network acquisition
Techniques for assisted network acquisition are described. An apparatus may comprise a wireless transceiver, a processor circuit communicatively coupled to the...
Random access techniques for fixed devices in mobile broadband networks
Briefly, in accordance with one or more embodiments, a fixed device performs a cell search to search for one or more cells on a network and determines a...
Buffer-aware radio resource management
Generally discussed herein are systems and apparatuses that are configured for scheduling device access to a cellular network resource. Also discussed herein...
Method and apparatus for optimized indoor position estimation
The disclosure relates to a method, apparatus and system for optimized indoor position estimation. Specifically, the disclosure relates to indoor position...
Mechanism to prevent load in 3GPP network due to MTC device triggers
Embodiments of methods and apparatus to manage MTC device trigger load in a wireless network are described herein. Other embodiments may be described and claimed.
Streaming with coordination of video orientation (CVO)
Technology to provide streaming with coordination of video orientation (CVO) is disclosed. In an example, a server can include computer circuitry configured to:...
Methods and apparatus to identify privacy relevant correlations between
Methods, apparatus, systems and articles of manufacture are disclosed to identify privacy relevant correlations between data values. An example disclosed...
Systems and methods for distributed trust computing and key management
Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device...
Multi-radio communication between wireless devices
In various embodiments, two wireless communication devices may communicate with each other using multiple protocols, by dividing the data to be communicated...
Link training in a communication port
Techniques for training a link are described herein. An example electronic device includes a port coupled to a link partner. The port and the link partner use...
Floating taps for decision feedback equalizer
Described are apparatuses and methods for generating floating taps for decision feedback equalizers. An apparatus may include a first delay cell including a...
Segmentation and reassembly of data frames
A system and method of transmitting data frames between a plurality of input ports to a plurality of output ports is described. The input ports segment portions...
LAN emulation over infiniband fabric apparatus, systems, and methods
A method and device for local area network (LAN) emulation over an Infiniband (IB) fabric. An IB LAN driver at a first node on an IB fabric receives the port...
Methods and apparatus for device authentication with one-time credentials
An automated method for authenticating a proving device to a verifying device involves an elliptic curve formula (ECF) for a predetermined elliptic curve...
Eye width measurement and margining in communication systems
Generally, this disclosure describes eye width measurement and margining in communication systems. An apparatus may be configured to: decouple a phase detector...
Device, system and method of communicating data over wireless
communication symbols with check code
Some demonstrative embodiments include devices, systems and/or methods of communicating data over wireless communication symbols with check-code. For example, a...
Methods and arrangements for communications in low power wireless networks
Embodiments may comprise an orthogonal frequency division multiplexing (OFDM) system operating in the 1 GHz and lower frequency bands. In many embodiments, the...
Phase-lock in all-digital phase-locked loops
This disclosure relates to an all digital phase-lock loop (ADPLL). The ADPLL determines an error generated by a digitally controlled oscillator (DCO) which is...
Overlapped and staggered antenna arrays
An antenna structure includes a dielectric material in which antenna array elements are placed on either side. Elements on either side of the dielectric...
Forming in-situ micro-feature structures with coreless packages
Methods of forming a microelectronic packaging structure and associated structures formed thereby are described. Those methods may include attaching a die to a...
Carbon nanotube-solder composite structures for interconnects, process of
making same, packages containing...
A carbon nanotube (CNT) array is patterned on a substrate. The substrate can be a microelectronic die, an interposer-type structure for a flip-chip, a mounting...
Decreased switching current in spin-transfer torque memory
Switching current in Spin-Transfer Torque Memory (STTM) can be decreased. A magnetic memory cell is driven with a first pulse on a write line of the memory cell...
Method and device for notification of facial recognition environment, and
computer-readable recording medium...
According to a method for providing a notification on a face recognition environment of the present disclosure, the method includes obtaining an input image...
Launching a secure kernel in a multiprocessor system
In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if...
Enhanced privacy for provision of computer vision
Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus...
Prevention of user input capture
Systems and methods may provide to prevent user input capture. In one example, the method may include measuring an attribute based on a user's interaction with...
Security data aggregation and business intelligence for web applications
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources...
Providing a sideband message interface for system on a chip (SoC)
According to one embodiment, a system on a chip includes multiple agents each corresponding to an intellectual property (IP) logic and a fabric to couple the...
Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in...
IP multimedia subsystem and method for MBMS file repair using HTTP servers
Disclosed in some examples is a method of media repair in an IMS based network, the method includes communicating with an IMS network using SIP to setup a...