Patent application number | Description | Published |
20090315914 | EMBEDDING LARGE IMAGES WITHIN ONE ANOTHER - An image processing system embeds at least one image inside a second image. The images are displayed together as a composite image. The first and second images are each tiled and have image pyramids comprising representations at different resolutions formed for them. The image processing system allows a user to zoom into and out of the embedded image, to a desired depth, using its image pyramid. | 12-24-2009 |
20090317020 | Variable Resolution Images - In accordance with one or more aspects, a variable resolution image is displayed at an initial resolution. The variable resolution image has multiple portions, at least two of which have different resolutions. A request to display one of the multiple portions of the variable resolution image at a higher resolution is received, and a check is made as to whether a higher resolution version of the one portion is available. The higher resolution version of the one portion is displayed if available, otherwise the one portion at the initial resolution is displayed. | 12-24-2009 |
20120039547 | VARIABLE RESOLUTION IMAGES - In accordance with one or more aspects, a variable resolution image is displayed at an initial resolution. The variable resolution image has multiple portions, at least two of which have different resolutions. A request to display one of the multiple portions of the variable resolution image at a higher resolution is received, and a check is made as to whether a higher resolution version of the one portion is available. The higher resolution version of the one portion is displayed if available, otherwise the one portion at the initial resolution is displayed. | 02-16-2012 |
Patent application number | Description | Published |
20080294868 | SYSTEM AND METHOD FOR IDENTIFYING TLB ENTRIES ASSOCIATED WITH A PHYSICAL ADDRESS OF A SPECIFIED RANGE - A system and method for identifying a TLB entry having a physical address that is within a specified range are disclosed. The method includes obtaining a tentative TLB entry from a page table entry and accessing a physical address associated with the tentative TLB entry. The method further includes comparing the physical address of the tentative TLB entry with a predetermined range of addresses. If the physical address is within the finite range of addresses, an exception is invoked. In response to the exception, the physical address and/or an attribute of the tentative TLB entry can be modified. The tentative TLB entry can then be stored in a TLB. | 11-27-2008 |
20090307546 | PROVIDING TRUSTED ACCESS TO A JTAG SCAN INTERFACE IN A MICROPROCESSOR - A method for securing a scan chain architecture by performing an authentication operation through a trusted software layer to authorize use of a protected scan chain. | 12-10-2009 |
20100122013 | DATA STRUCTURE FOR ENFORCING CONSISTENT PER-PHYSICAL PAGE CACHEABILITY ATTRIBUTES - A data structure for enforcing consistent per-physical page cacheability attributes is disclosed. The data structure is used with a method for enforcing consistent per-physical page cacheability attributes, which maintains memory coherency within a processor addressing memory, such as by comparing a desired cacheability attribute of a physical page address in a PTE against an authoritative table that indicates the current cacheability status. This comparison can be made at the time the PTE is inserted into a TLB. When the comparison detects a mismatch between the desired cacheability attribute of the page and the page's current cacheability status, corrective action can be taken to transition the page into the desired cacheability state. | 05-13-2010 |
20100138615 | HANDLING DIRECT MEMORY ACCESSES - Methods and systems for efficiently processing direct memory access requests coherently. An external agent requests data from the memory system of a computer system at a target address. A snoop cache determines if the target address is within an address range known to be safe for external access. If the snoop cache determines that the target address is safe, the external agent proceeds with the direct memory access. If the snoop cache does not determine if the target address is safe, then the snoop cache forwards the request on to the processor. After the processor resolves any coherency problems between itself and the memory system, the processor signals the external agent to proceed with the direct memory access. The snoop cache can determine safe address ranges from such processor activity. The snoop cache invalidates its safe address ranges by observing traffic between the processor and the memory system. | 06-03-2010 |
20110216780 | Input/Output Request Packet Handling Techniques by a Device Specific Kernel Mode Driver - The input/output request packet (IRP) handling technique includes determining if a received input/output request packet should receive a given handling. If the input/output request packet should receive the given handling, the input/output request packet is dispatched to a device specific dispatch input/output request packet handler. Otherwise, the input/output request packet is redirected to an operating system dispatch input/output request packet handler. | 09-08-2011 |
20120072697 | SYSTEM AND METHOD FOR IDENTIFYING TLB ENTRIES ASSOCIATED WITH A PHYSICAL ADDRESS OF A SPECIFIED RANGE - A system and method for identifying a TLB entry having a physical address that is within a specified range are disclosed. The method includes obtaining a tentative TLB entry from a page table entry and accessing a physical address associated with the tentative TLB entry. The method further includes comparing the physical address of the tentative TLB entry with a predetermined range of addresses. If the physical address is within the finite range of addresses, an exception is invoked. In response to the exception, the physical address and/or an attribute of the tentative TLB entry can be modified. The tentative TLB entry can then be stored in a TLB. | 03-22-2012 |
20120131307 | DATA STRUCTURE FOR ENFORCING CONSISTENT PER-PHYSICAL PAGE CACHEABILITY ATTRIBUTES - A data structure for enforcing consistent per-physical page cacheability attributes is disclosed. The data structure is used with a method for enforcing consistent per-physical page cacheability attributes, which maintains memory coherency within a processor addressing memory, such as by comparing a desired cacheability attribute of a physical page address in a PTE against an authoritative table that indicates the current cacheability status. This comparison can be made at the time the PTE is inserted into a TLB. When the comparison detects a mismatch between the desired cacheability attribute of the page and the page's current cacheability status, corrective action can be taken to transition the page into the desired cacheability state. | 05-24-2012 |
20120254584 | SYSTEM AND METHOD FOR IDENTIFYING TLB ENTRIES ASSOCIATED WITH A PHYSICAL ADDRESS OF A SPECIFIED RANGE - A system and method for identifying a TLB entry having a physical address that is within a specified range are disclosed. The method includes obtaining a tentative TLB entry from a page table entry and accessing a physical address associated with the tentative TLB entry. The method further includes comparing the physical address of the tentative TLB entry with a predetermined range of addresses. If the physical address is within the finite range of addresses, an exception is invoked. In response to the exception, the physical address and/or an attribute of the tentative TLB entry can be modified. The tentative TLB entry can then be stored in a TLB. | 10-04-2012 |
20130246709 | TRANSLATION ADDRESS CACHE FOR A MICROPROCESSOR - Embodiments related to fetching instructions and alternate versions achieving the same functionality as the instructions from an instruction cache included in a microprocessor are provided. In one example, a method is provided, comprising, at an example microprocessor, fetching an instruction from an instruction cache. The example method also includes hashing an address for the instruction to determine whether an alternate version of the instruction which achieves the same functionality as the instruction exists. The example method further includes, if hashing results in a determination that such an alternate version exists, aborting fetching of the instruction and retrieving and executing the alternate version. | 09-19-2013 |
20130311752 | INSTRUCTION-OPTIMIZING PROCESSOR WITH BRANCH-COUNT TABLE IN HARDWARE - A processing system comprising a microprocessor core and a translator. Within the microprocessor core is arranged a hardware decoder configured to selectively decode instructions for execution in the microprocessor core, and, a logic structure configured to track usage of the hardware decoder. The translator is operatively coupled to the logic structure and configured to selectively translate the instructions for execution in the microprocessor core, based on the usage of the hardware decoder as determined by the logic structure. | 11-21-2013 |
20140189310 | FAULT DETECTION IN INSTRUCTION TRANSLATIONS - In one embodiment, a method for identifying and replacing code translations that generate spurious fault events includes detecting, while executing a first native translation of target instruction set architecture (ISA) instructions, occurrence of a fault event, executing the target ISA instructions or a functionally equivalent version thereof, determining whether occurrence of the fault event is replicated while executing the target ISA instructions or the functionally equivalent version thereof, and in response to determining that the fault event is not replicated, determining whether to allow future execution of the first native translation or to prevent such future execution in favor of forming and executing one or more alternate native translations. | 07-03-2014 |
20140189313 | QUEUED INSTRUCTION RE-DISPATCH AFTER RUNAHEAD - Various embodiments of microprocessors and methods of operating a microprocessor during runahead operation are disclosed herein. One example method of operating a microprocessor includes identifying a runahead-triggering event associated with a runahead-triggering instruction and, responsive to identification of the runahead-triggering event, entering runahead operation and inserting the runahead-triggering instruction along with one or more additional instructions in a queue. The example method also includes resuming non-runahead operation of the microprocessor in response to resolution of the runahead-triggering event and re-dispatching the runahead-triggering instruction along with the one or more additional instructions from the queue to the execution logic. | 07-03-2014 |
20140281392 | PROFILING CODE PORTIONS TO GENERATE TRANSLATIONS - The disclosure provides a micro-processing system operable in a hardware decoder mode and in a translation mode. In the hardware decoder mode, the hardware decoder receives and decodes non-native ISA instructions into native instructions for execution in a processing pipeline. In the translation mode, native translations of non-native ISA instructions are executed in the processing pipeline without using the hardware decoder. The system includes a code portion profile stored in hardware that changes dynamically in response to use of the hardware decoder to execute portions of non-native ISA code. The code portion profile is then used to dynamically form new native translations executable in the translation mode. | 09-18-2014 |
Patent application number | Description | Published |
20100059900 | Translucent, Flame Resistant Composite Materials - A translucent composite material that can be used in various airplane interior applications that allows sufficient light transmissivity while preferably meeting Federal Aviation Administration (FAA) flammability requirements for overhead materials in the cabin of a commercial aircraft. The material also meets FAA standards regarding vertical burn, smoke emissions tests, and toxic fume emissions tests. The composite material is formed by laminating long glass fibers and (PPSU) into a composite sheet under controlled heat and pressure. The composite sheet is then cut, bent or thermoformed to form the desired part. The parts formed are available for a wide variety of uses within the passenger cabin of a commercial aircraft. The long glass fibers may be unidirectional or weaved into a glass cloth like material. While preferably formed for airplane interior applications, these components may also be used in other aerospace or non-aerospace applications. | 03-11-2010 |
20120156440 | Translucent, Flame Resistant Composite Materials - A translucent composite material comprises a substrate and a plurality of glass fibers embedded within the substrate. The substrate may comprise a substantially continuous nonwoven, non-fabric, translucent thermoplastic polyphenylsulfone substrate. The plurality of glass fibers may substantially span across a length of the substrate and may have an orientation, a fiber thickness, and a fiber area density selected to provide the translucent composite material with a strength, a flame-resistance, and a light transmissivity. | 06-21-2012 |
Patent application number | Description | Published |
20130151612 | Metadata Prediction of Objects in a Social Networking System Using Crowd Sourcing - A social networking system leverages user's social information to evaluate content submitted for inclusion in objects. If the evaluated submission is accepted, the submission is added to the content of an object. Accepted submissions are also used to predict associations between metadata and objects. Metadata is used to predict which objects will match user searches for information. The social networking system also provides a user interface configured to prompt users to submit information to objects. When a user completes a submission to an object, the user is provided with other options for groups of objects to contribute to. The objects offered are chosen to increase the likelihood that the user will choose to provide submissions to one of the provided objects. | 06-13-2013 |
20140025666 | IDENTIFYING RELEVANT DATA FOR PAGES IN A SOCIAL NETWORKING SYSTEM - Embodiments of the invention improve the ability of a social networking system to determine which types of data—hereinafter referred to as “fields”—are relevant to which types of user pages. Specifically, a social networking system assigns page types to different user pages, and likewise stores information on different types of fields. By analyzing the relationships of different pages and fields, the social networking system determines which types of fields are particularly well-suited for inclusion on different types of pages. Using the learned information about page types and field types, the social networking system can better aid page administrators in specifying data to add to their pages. For example, the social networking system can recommend to administrators the addition of certain types of fields or automatically add the fields. Further, the social networking system can specialize a search for social networking system data to field types. | 01-23-2014 |
20140025671 | CONTEXT-BASED OBJECT RETRIEVAL IN A SOCIAL NETWORKING SYSTEM - Embodiments improve the ability of users of a social networking system to search for information that is likely to be relevant to them by learning and/or applying a search context associated with selector components used to search for objects of the social networking system. The search context is specific to the use of an individual selector and thus need not be as general as the context of an entire page or set of pages in which selectors can be embedded. The social networking system may learn the context of a selector by monitoring user selections from prior search results performed using the selector. | 01-23-2014 |
Patent application number | Description | Published |
20090313397 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 12-17-2009 |
20110138013 | USB DEVICES IN APPLICATION SERVER ENVIRONMENTS - One or more universal serial bus (USB) devices are connected at a client computer. The USB devices are recognized by the client computer and a determination is made as to whether an application server computer provides functionality for one or more of the USB devices. A specific communication path is provided from the USB device to the server computer if functionality is provided by the application server computer. | 06-09-2011 |
20130282934 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 10-24-2013 |
Patent application number | Description | Published |
20120030191 | ANALYSIS AND REPORTING OF COLLECTED SEARCH ACTIVITY DATA OVER MULTIPLE SEARCH ENGINES - A tracking system passively tracks and records searches conducted by actual search engine users. The recorded data for each search event preferably includes the search query submitted, the search engine used, the search result item (e.g., web page) selected, the position (e.g., page number) of this item, and the user's IP address. The collected data is aggregated and analyzed to generate data regarding the search queries used to locate and access particular destinations (e.g., web pages and sites). This data may be used for various purposes, such as (1) to generate reports showing, e.g., how users reach a particular destination from different search engines and geographic locations, (2) to select content to display on a destination page, such that the content is relevant to search queries commonly used to locate that page, and (3) to update the database of one search engine to reflect searches conducted on other search engines. | 02-02-2012 |
20120036117 | SELECTION OF ADVERTISEMENTS TO PRESENT ON A WEB PAGE OR OTHER DESTINATION BASED ON SEARCH ACTIVITIES OF USERS WHO SELECTED THE DESTINATION - A tracking system passively tracks and records searches conducted by actual search engine users. The recorded data for each search event preferably includes the search query submitted, the search engine used, the search result item (e.g., web page) selected, the position (e.g., page number) of this item, and the user's IP address. The collected data is aggregated and analyzed to generate data regarding the search queries used to locate and access particular destinations (e.g., web pages and sites). This data may be used for various purposes, such as (1) to generate reports showing, e.g., how users reach a particular destination from different search engines and geographic locations, (2) to select content to display on a destination page, such that the content is relevant to search queries commonly used to locate that page, and (3) to update the database of one search engine to reflect searches conducted on other search engines. | 02-09-2012 |
20120036119 | AUTO-REFINEMENT OF SEARCH RESULTS BASED ON MONITORED SEARCH ACTIVITIES OF USERS - A tracking system passively tracks and records searches conducted by actual search engine users. The recorded data for each search event preferably includes the search query submitted, the search engine used, the search result item (e.g., web page) selected, the position (e.g., page number) of this item, and the user's IP address. The collected data is aggregated and analyzed to generate data regarding the search queries used to locate and access particular destinations (e.g., web pages and sites). This data may be used for various purposes, such as (1) to generate reports showing, e.g., how users reach a particular destination from different search engines and geographic locations, (2) to select content to display on a destination page, such that the content is relevant to search queries commonly used to locate that page, and (3) to update the database of one search engine to reflect searches conducted on other search engines. | 02-09-2012 |
Patent application number | Description | Published |
20090133613 | Stable Maritime Platform - Systems and methods for a stable maritime helicopter platform are disclosed. In one embodiment, a ship that may be converted into a spar buoy includes a flipping mechanism to convert the ship to the spar buoy, a takeoff and landing platform for helicopters and other VTOL vehicles, and an actuation and balance system to deploy the platform. | 05-28-2009 |
20100133383 | SYSTEMS AND METHODS FOR TRACING AIRCRAFT VORTICES - Systems and methods for tracing aircraft vortices. One method includes directing a tracer from a first aircraft into a vortical flow generated by the first aircraft. The method can further include detecting a characteristic corresponding to the presence of the tracer directed into the vortical flow. Based at least in part on the detected characteristic, the method can include directing the flight of the first aircraft, or a second aircraft following the first aircraft, or both. | 06-03-2010 |
20100133384 | SYSTEMS AND METHODS FOR TRACING AIRCRAFT VORTICES - Systems and methods for tracing aircraft vortices. One method includes directing a tracer from a first aircraft into a vortical flow generated by the first aircraft. The method can further include detecting a characteristic corresponding to the presence of the tracer directed into the vortical flow. Based at least in part on the detected characteristic, the method can include directing the flight of the first aircraft, or a second aircraft following the first aircraft, or both. | 06-03-2010 |
20100283655 | ACTIVE CHAFF - An active chaff may be released by an aircraft to assist the aircraft in evading at least one of radar detection and a missile. The active chaff may include a signal generator, a signal spreading device, a microprocessor, a power source, and a substantially high-drag aerodynamic envelope. The signal generator may emit a signal to assist the aircraft in evading radar detection and/or a missile. The signal spreading device may spread the generated signal. The microprocessor may control the signal generator and the signal spreading device. The power source may power the signal generator and the microprocessor. Each of the signal generator, signal spreading device, microprocessor, and power source may be located on or within the substantially high-drag aerodynamic envelope. | 11-11-2010 |
20120241562 | Space Debris Removal - A method comprises removing space debris having a relatively low ballistic coefficient by hastening orbital decay of the debris. A transient gaseous cloud is created at an altitude of at least 100 km above Earth. The cloud has a density sufficient to slow the debris so the debris falls into Earth's atmosphere. | 09-27-2012 |
20140232584 | ACTIVE CHAFF - An active chaff may be released by an aircraft to assist the aircraft in evading at least one of radar detection and a missile. The active chaff may include a signal generator, a signal spreading device, a microprocessor, a power source, and a substantially high-drag aerodynamic envelope. The signal generator may emit a signal to assist the aircraft in evading radar detection and/or a missile. The signal spreading device may spread the generated signal. The microprocessor may control the signal generator and the signal spreading device. The power source may power the signal generator and the microprocessor. Each of the signal generator, signal spreading device, microprocessor, and power source may be located on or within the substantially high drag aerodynamic envelope | 08-21-2014 |
Patent application number | Description | Published |
20090291630 | GEOGRAPHIC TARGETING OF ALERTS - A system and method is described for broadcasting, e.g. commercial mobile alert messages (CMAM) or other messages including various text-based messages to a target area without substantially broadcasting to an area outside the target area. Further details and features are described herein. | 11-26-2009 |
20100029244 | METHOD AND SYSTEM FOR ALLOWING INCOMING EMERGENCY COMMUNICATIONS ON A DISABLED DEVICE - A system and method to allow a disabled device to receive an incoming communication after the termination of an emergency communication session with a service provider. A disabled device is a device having a portion of its service plan that allows the device to send or receive communications either temporarily or permanently disabled. In some embodiments, the system allows the disabled device to receive all incoming communications during a defined period of time after the emergency communication session. In some embodiments, the system allows the disabled device to receive all incoming communications from numbers or URIs contained in a repository of allowed numbers. In some embodiments, the system allows the disabled device to receive all incoming communications if the service provider initiating the communication enters an authenticated routing key or passcode. | 02-04-2010 |
20100069099 | METHOD AND SYSTEM FOR ESTABLISHING MESSAGING COMMUNICATION WITH A SERVICE PROVIDER, SUCH AS A PSAP (PUBLIC SAFETY ANSWERING POINT) - Described in detail herein is a system and method for allowing a device, such as a cell phone, to establish a messaging dialogue with a service provider, such as SMS messaging with a 911 call center. Furthermore, the service provider can receive location data of the mobile device. Further details and features are described herein. | 03-18-2010 |
20100273445 | MONITORING APPLICATION AND METHOD FOR ESTABLISHING EMERGENCY COMMUNICATION SESSIONS WITH DISABLED DEVICES BASED ON TRANSMITTED MESSAGES - A monitoring application and method in a disabled telecommunication device for monitoring communication sessions initiated by the device and detecting an emergency communication session that is initiated by the device. If an emergency communication session is detected, the monitoring application generates and transmits a message to a rating engine over a non-voice channel. The non-voice channel may be an unstructured supplementary service data (USSD) channel, a short message service (SMS) channel, or other like messaging channel. When the message is received via the non-voice channel, various callback techniques may be implemented to allow the disabled device to receive communications after the emergency communication session, even though such communications would normally be prevented as a result of a service lock. | 10-28-2010 |
20110026440 | SYSTEM AND METHOD FOR PROVIDING EMERGENCY SERVICE IN AN IP-BASED WIRELESS NETWORK - An E-CSCF receives a Session Initiation Protocol (“SIP”) invitation message initiating an emergency communication session from a calling device. The E-CSCF generates an information request message based on the received SIP message and sends the information request message to a location server. The location server determines a geographical location of the calling device and uses the geographical location to determine a destination emergency response center, such as a Public Safety Access Point (PSAP). The location server provides location information for the destination PSAP to the E-CSCF. The E-CSCF generates a modified SIP invitation message using the presence information and sends the modified SIP invitation message to an emergency services network where it is routed to the emergency response center. | 02-03-2011 |
20130035057 | METHOD AND SYSTEM FOR ALLOWING INCOMING EMERGENCY COMMUNICATIONS ON A DISABLED DEVICE - A system and method to allow a disabled device to receive an incoming communication after the termination of an emergency communication session with a service provider. A disabled device is a device having a portion of its service plan that allows the device to send or receive communications either temporarily or permanently disabled. In some embodiments, the system allows the disabled device to receive all incoming communications during a defined period of time after the emergency communication session. In some embodiments, the system allows the disabled device to receive all incoming communications from numbers or URIs contained in a repository of allowed numbers. In some embodiments, the system allows the disabled device to receive all incoming communications if the service provider initiating the communication enters an authenticated routing key or passcode. | 02-07-2013 |
20140086108 | SYSTEM AND METHOD FOR PROVIDING EMERGENCY SERVICE IN AN IP-BASED WIRELESS NETWORK - An E-CSCF receives a Session Initiation Protocol (“SIP”) invitation message initiating an emergency communication session from a calling device. The E-CSCF generates an information request message based on the received SIP message and sends the information request message to a location server. The location server determines a geographical location of the calling device and uses the geographical location to determine a destination emergency response center, such as a Public Safety Access Point (PSAP). The location server provides location information for the destination PSAP to the E-CSCF. The E-CSCF generates a modified SIP invitation message using the presence information and sends the modified SIP invitation message to an emergency services network where it is routed to the emergency response center. | 03-27-2014 |
20140273911 | LOCAL NETWORK ALERT SYSTEM FOR MOBILE DEVICES USING AN IMS SESSION AND WI-FI ACCESS POINT - A wireless emergency alert system (also known as a wireless emergency alert system, or “WEA,” and formerly known as a commercial mobile alert system, or “CMAS”) receives a geotargeted federal alert that is to be delivered to mobile devices within a defined geographic region. A database of locations of access points is utilized by the system to identify those access points that are likely present in the defined region. The system identifies mobile devices that have an ongoing connection (e.g. IP multimedia subsystem (IMS) session) with the identified access points, in part by maintaining and accessing a look-up table containing location information for the access point and connected mobile devices. In addition, the system tracks mobile devices that no longer have an ongoing session and deregisters the appropriate mobile devices in the look-up table. For mobile devices that have an ongoing session, the system delivers the received alert to the mobile devices in the targeted region via the identified access points. | 09-18-2014 |