Patent application number | Description | Published |
20090291885 | Conjugated toxin peptide therapeutic agents - Disclosed is a composition of matter comprising an OSK1 peptide analog, and in some embodiments, a pharmaceutically acceptable salt thereof. A pharmaceutical composition comprises the composition and a pharmaceutically acceptable carrier. Also disclosed are DNAs encoding the inventive composition of matter, an expression vector comprising the DNA, and host cells comprising the expression vector. Methods of treating an autoimmune disorder and of preventing or mitigating a relapse of a symptom of multiple sclerosis are also disclosed. | 11-26-2009 |
20090297520 | Methods of using conjugated toxin peptide therapeutic agents - Disclosed is a composition of matter comprising an OSK1 peptide analog, and in some embodiments, a pharmaceutically acceptable salt thereof. A pharmaceutical composition comprises the composition and a pharmaceutically acceptable carrier. Also disclosed are DNAs encoding the inventive composition of matter, an expression vector comprising the DNA, and host cells comprising the expression vector. Methods of treating an autoimmune disorder and of preventing or mitigating a relapse of a symptom of multiple sclerosis are also disclosed. | 12-03-2009 |
20090299044 | DNA encoding chimeric toxin peptide fusion proteins and vectors and mammalian cells for recombinant expression - Disclosed is a composition of matter comprising an OSK1 peptide analog, and in some embodiments, a pharmaceutically acceptable salt thereof. A pharmaceutical composition comprises the composition and a pharmaceutically acceptable carrier. Also disclosed are DNAs encoding the inventive composition of matter, an expression vector comprising the DNA, and host cells comprising the expression vector. Methods of treating an autoimmune disorder and of preventing or mitigating a relapse of a symptom of multiple sclerosis are also disclosed. | 12-03-2009 |
Patent application number | Description | Published |
20090228779 | USE OF REMOTE SERVICES BY A LOCAL WIRELESS ELECTRONIC DEVICE - The present disclosure generally relates to enabling web applications to use application programming interfaces (APIs) to display content on a mobile computing device. In some embodiments, the APIs can include services to enable web applications to simulate a native application that runs natively on the mobile computing device. In some embodiments, the APIs can include services to annotate a map with an overlay on the display of the mobile computing device. In some embodiments, a caching module is provided for caching resources associated with a web application on the mobile computing device. | 09-10-2009 |
20100095219 | SELECTIVE HISTORY DATA STRUCTURES - Methods and apparatuses which create and use selective history data structures are disclosed. In one embodiment, a method includes monitoring presentations accessed by a user, automatically selecting some of the presentations accessed by the user according to, at least in part, the user's access patterns, and displaying representations of the some of the presentations in a pattern of an n×n array, wherein n is greater than 1. Other methods are disclosed, and various apparatuses and machine readable media are also disclosed. | 04-15-2010 |
20100107145 | Software Performance Analysis Using Data Mining - A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree. | 04-29-2010 |
20110304631 | METHODS AND APPARATUSES FOR PROVIDING A HARDWARE ACCELERATED WEB ENGINE - Methods of expressing animation in a data stream are disclosed. In one embodiment, a method of expressing animation in a data stream includes defining animation states in the data stream with each state having at least one property such that properties are animated as a group. The animation states that are defined in the data stream may be expressed as an extension of a styling sheet language. The data stream may include web content and the defined animation states. | 12-15-2011 |
Patent application number | Description | Published |
20100083158 | FEED FOR ENHANCED WEB BROWSING - User input is received to create a bookmark in a web browser for a non-feed Uniform Resource Locator (URL). A web feed associated with the non-feed URL is determined. A subscription to the web feed is automatically created. An indication of new web content is received from the web feed. The bookmark for the non-feed URL is decorated to provide a visual indication of the new web content. | 04-01-2010 |
20100083383 | PHISHING SHIELD - A mechanism for notifying a user of an internet browser that a requested web page is undesirable, and for protecting the user from the web page by disabling it. An internet browser detects a load request for a web page and retrieves the Uniform Resource Locator (URL) for the webpage. The internet browser displays the webpage associated with the URL and, upon determination that the URL matches a URL from a list of undesirable URLs, alters the appearance of the webpage and disables the web page from receiving input or taking action. | 04-01-2010 |
20120304286 | METHODS AND APPARATUS FOR BLOCKING USAGE TRACKING - Methods and apparatuses that maintain one or more data stores capable of storing local data in a device for loading a resource of a domain are described. The resource may be loaded to cause one or more data access operations on the data stores. Access to usage tracking data of the device from the domain may depend on at least one of the data access operations. The data access operations may be configured to block the usage tracking data of the device from the domain. The data access operations may be performed on the data stores for the loading of the resource. A web page may be presented to a user when the resource is successfully loaded. | 11-29-2012 |
20120311429 | TECHNIQUES FOR USE OF SNAPSHOTS WITH BROWSING TRANSITIONS - A snapshot of a page is stored in response to navigation away from the page. When the user navigates back to the page, the snapshot is displayed while the page is loaded. When the page is sufficiently loaded, the snapshot is replaced by the (fully or partially) loaded page. Determining whether the page is sufficiently loaded is based on monitoring of pre-selected criteria. | 12-06-2012 |
20120311491 | METHOD FOR PRESENTING DOCUMENTS USING A READING LIST PANEL - A reading list panel is displayed as a sidebar window with respect to a main window of a content viewing application. In response to a first input, a first article representation of a first article associated with a presentation page displayed in the main window is listed in the reading list panel, where the first article representation includes information identifying the first article. In response to a selection of a second article representation from the reading list panel, content of a second article represented by the second article representation is presented in a reader mode within the main window. | 12-06-2012 |
20140123000 | TECHNIQUES FOR USE OF SNAPSHOTS WITH BROWSING TRANSITIONS - A snapshot of a page is stored in response to navigation away from the page. When the user navigates back to the page, the snapshot is displayed while the page is loaded. When the page is sufficiently loaded, the snapshot is replaced by the (fully or partially) loaded page. Determining whether the page is sufficiently loaded is based on monitoring of pre-selected criteria. | 05-01-2014 |
20140337991 | METHODS AND APPARATUS FOR BLOCKING USAGE TRACKING - Methods and apparatuses that maintain one or more data stores capable of storing local data in a device for loading a resource of a domain are described. The resource may be loaded to cause one or more data access operations on the data stores. Access to usage tracking data of the device from the domain may depend on at least one of the data access operations. The data access operations may be configured to block the usage tracking data of the device from the domain. The data access operations may be performed on the data stores for the loading of the resource. A web page may be presented to a user when the resource is successfully loaded. | 11-13-2014 |
20140365852 | Displaying Socially Sourced Content - A social media link panel is displayed as a part of a content application such as a web browser application. The social media link panel displays a list of one or more social items. In response to a selection of a social item from the list, a main window of the web browser application displays web content associated with the social item. | 12-11-2014 |
Patent application number | Description | Published |
20100325100 | IMMEDIATE SEARCH FEEDBACK - Providing immediate search feedback is disclosed. Search input is received within a search field of a web browser application. Based on characteristics of the search input, a determination is made whether to automatically submit a query to a search engine. In one aspect, the query is automatically submitted to the search engine. The query is based on the received first search input. Results are displayed within the web browser application, the results web page returned from the query submitted to the search engine. | 12-23-2010 |
20120272338 | UNIFIED TRACKING DATA MANAGEMENT - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 10-25-2012 |
20140330962 | UNIFIED TRACKING DATA MANAGEMENT - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 11-06-2014 |
20140365855 | CONTENT LIST MANAGEMENT - A content application includes one or more content list panels. The content application provides mechanisms that allow the user to easily manage article representations included in the content lists such as adding article representations a content list and editing the items directly in menus associated with the content lists. | 12-11-2014 |
Patent application number | Description | Published |
20080237487 | MULTIPLE DIRECTIONAL SCANS OF TEST STRUCTURES ON SEMICONDUCTOR INTEGRATED CIRCUITS - Disclosed is a method of inspecting a sample. The sample is scanned in a first direction with at least one particle beam. The sample is scanned in a second direction with at least one particle beam. The second direction is at an angle to the first direction. The number of defects per an area of the sample are found as a result of the first scan, and the position of one or more of the found defects is determined from the second scan. In a specific embodiment, the sample includes a test structure having a plurality of test elements thereon. A first portion of the test elements is exposed to the beam during the first scan to identify test elements having defects, and a second portion of the test elements is exposed during the second scan to isolate and characterize the defect. | 10-02-2008 |
20080246030 | TEST STRUCTURES AND METHODS FOR INSPECTION OF SEMICONDUCTOR INTEGRATED CIRCUITS - Disclosed is a semiconductor die having a scanning area. The semiconductor die includes a first plurality of test structures wherein each of the test structures in the first plurality of test structures is located entirely within the scanning area. The semiconductor die further includes a second plurality of test structures wherein each of the test structures in the first plurality of test structures is located only partially within the scanning area. The test structures are arranged so that a scan of the scanning area results in detection of defects outside of the scanning area. | 10-09-2008 |
20100314540 | Electron microscope with an emitter operating in medium vacuum - An electron microscope is described. This electron microscope includes an electron emitter that has an evaporation or sublimation rate that is significantly less than that of tungsten at the reduced pressures around the electron emitter during operation of the electron microscope. As a consequence, the electron microscope may be able to operate at reduced pressures that are much larger than those in existing electron microscopes. For example, at least during the operation the reduced pressure in the electron microscope may be greater than or equal to a medium vacuum. This capability may allow the electron microscope to use a roughing pump to provide the reduced pressure, thereby reducing the cost and complexity of the electron microscope, and improving its reliability. In addition, the size of the electron microscope may be reduced, which may enable a hand-held or portable version of the electron microscope. | 12-16-2010 |
20120269323 | X-ray source with an immersion lens - An x-ray source is described. During operation of the x-ray source, an electron source emits a beam of electrons. This beam of electrons is focused to a spot on a target by a magnetic focusing lens. In particular, the magnetic focusing lens includes an immersion lens in which a peak in a magnitude of an associated magnetic field occurs proximate to a plane of the target. Moreover, in response to receiving the beam of focused electrons, the target provides a transmission source of x-rays. | 10-25-2012 |
20120269324 | X-ray source with selective beam repositioning - During operation of an x-ray source, an electron source emits a beam of electrons. Moreover, a repositioning mechanism selectively repositions the beam of electrons on a surface of a target based on a feedback parameter, where a location of the beam of electrons on the surface of the target defines a spot size of x-rays output by the x-ray source. In response to receiving the beam of electrons, the target provides a transmission source of the x-rays. Furthermore, a beam-parameter detector provides the feedback parameter based on a physical characteristic associated with the beam of electrons and/or the x-rays output by the x-ray source. This physical characteristic may include: at least a portion of an optical spectrum emitted by the target, secondary electrons emitted by the target based on a cross-sectional shape of the beam of electrons; an intensity of the x-rays output by the target; and/or a current from the target. | 10-25-2012 |
20120269325 | X-ray source with increased operating life - An x-ray source is described. During operation of the x-ray source, an electron source emits a beam of electrons. This beam of electrons is focused to a spot on a target by a magnetic focusing lens. In response to receiving the beam of focused electrons, the target provides a transmission source of x-rays. Moreover, a repositioning mechanism selectively repositions the beam of focused electrons to different locations on a surface of the target based on a feedback parameter associated with operation of the x-ray source. This feedback parameter may be based on: an intensity of the x-rays output by the x-ray source; a position of the x-rays output by the x-ray source; an elapsed time during operation of the x-ray source; a cross-sectional shape of the x-rays output by the x-ray source; and/or a spot size of the x-rays output by the x-ray source. | 10-25-2012 |
20120269326 | X-ray source with high-temperature electron emitter - An x-ray source is described. This x-ray source includes an electron source with a refractory binary compound having a melting temperature greater than that of tungsten. For example, the refractory binary compound may include: hafnium carbide, zirconium carbide, tantalum carbide, lanthanum hexaboride and/or compounds that include two or more of these elements. | 10-25-2012 |
20140037052 | X-ray photoemission microscope for integrated devices - An apparatus is disclosed for the examination and inspection of integrated devices such as integrated circuits. X-rays are transmitted through the integrated device, and are incident on a photoemissive structure that absorbs x-rays and emits electrons. The electrons emitted by the photoemissive structure are shaped by an electron optical system to form a magnified image of the emitted electrons on a detector. This magnified image is then recorded and processed. | 02-06-2014 |
Patent application number | Description | Published |
20100030745 | Record Based Code Structure - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. | 02-04-2010 |
20100042585 | Command Interpretation - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. In another example, database queries are based on a command line or universal resource locator. These queries may be used to select functionality of a computer program in response to the command line or universal resource locator. | 02-18-2010 |
20100070516 | Instance Management of Code in a Database - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. In another example, database queries are based on a command line or universal resource locator. These queries may be used to select functionality of a computer program in response to the command line or universal resource locator. | 03-18-2010 |
20110196843 | Instance Management of Code in a Database - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. In another example, database queries are based on a command line or universal resource locator. These queries may be used to select functionality of a computer program in response to the command line or universal resource locator. | 08-11-2011 |
20120173575 | Record Based Code Structure - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. | 07-05-2012 |
20140201236 | Instance Management of Code in a Database - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. In another example, database queries are based on a command line or universal resource locator. These queries may be used to select functionality of a computer program in response to the command line or universal resource locator. | 07-17-2014 |
Patent application number | Description | Published |
20110069152 | 2D to 3D video conversion - A method for real-time 2D to 3D video conversion includes receiving a decoded 2D video frame having an original resolution, downscaling the decoded 2D video frame into an associated 2D video frame having a lower resolution, and segmenting objects present in the downscaled 2D video frame into background objects and foreground objects. The method also includes generating a background depth map and a foreground depth map for the downscaled 2D video frame based on the segmented background and foreground objects, and deriving a frame depth map in the original resolution based on the background depth map and the foreground depth map. The method further includes providing a 3D video frame for display at a real-time playback rate. The 3D video frame is generated in the original resolution based on the frame depth map. | 03-24-2011 |
20110167443 | Method and device for updating regional rating table - A method performed by a digital television receiver associated with a television includes storing in a memory a first rating configuration, including a region identification of the first rating configuration and a version identification of the first rating configuration, for rating a television program in accordance with a rating scheme, and storing in the memory an identification of a first television channel as a default channel for the rating scheme. The method further includes receiving a subset of a group of transport packets via a receiving channel, comparing the region identification and the version identification of the first and the second rating configurations, and if the region identifications are the same, and the version identifications of the first and the second rating configurations indicate that the second configuration is not newer than the first rating configuration, not storing the second configuration. | 07-07-2011 |
20120287233 | PERSONALIZING 3DTV VIEWING EXPERIENCE - A method for personalized video depth adjustment includes receiving a video frame, obtaining a frame depth map based on the video frame, and determining content genre of the video frame by classifying content of the video frame into one or more categories. The method also includes identifying a user viewing the video frame, retrieving depth preference information for the user from a user database, and deriving depth adjustment parameters based on the content genre and the depth preference information for the user. The method further includes adjusting the frame depth map based on the depth adjustment parameters, and providing a 3D video frame for display at a real-time playback rate on a user device of the user. The 3D video frame is generated based on the adjusted frame depth map. | 11-15-2012 |
Patent application number | Description | Published |
20090129545 | FRAMELESS RADIOSURGERY TREATMENT SYSTEM AND METHOD - A method and apparatus for selectively and accurately localizing and treating a target within a patient are provided. A three dimensional mapping of a region surrounding the target is coupled to a surgical intervention. Two or more diagnostic beams at a known non-zero angle to one another may pass through the mapping region to produce images of projections within the mapping region in order to accurately localize and treat the target wherein the images are captured using one or more image recorders. | 05-21-2009 |
20120078090 | FRAMELESS RADIOSURGERY TREATMENT SYSTEM AND METHOD - A method of compensating for breathing and other motions of a patient during treatment includes periodically generating internal positional data about an internal target region. The method further includes continuously generating external positional data about external motion of the patient's body using an external sensor and generating a correlation model between the position of the internal target region and the external sensor using the external positional data of the external sensor and the internal positional data of the internal target region. The method further includes predicting the position of the internal target region at some later time based on the correlation model. | 03-29-2012 |
20130281758 | Treatment of refractory neuropsychiatric disorders using targeted radiation - Provided herein are methods for treating neuropsychiatric disorders by delivering radiation to an area in the subgenual anterior cingulate cortex, particularly to the cingulate area 25. Those methods are also beneficial to treat refractory neuropsychiatric disorders. | 10-24-2013 |
20130281999 | METHOD OF PERFORMING MICROBEAM RADIOSURGERY - A method of performing microbeam radiosurgery on a patient whereby target tissue within a patient is irradiated with high energy electromagnetic radiation from an inverse Compton scattering radiation source via microbeam envelopes. | 10-24-2013 |
20140107477 | FRAMELESS RADIOSURGERY TREATMENT SYSTEM AND METHOD - A method of compensating for breathing and other motions of a patient during treatment includes periodically generating internal positional data about an internal target region. The method further includes generating external positional data about external motion of the patient's body using an external sensor and generating a correlation between one or more positions of the internal target region and one or more positions of an external region using the external positional data of the external sensor and the internal positional data of the internal target region. The method further includes predicting the position of the internal target region at some later time based on the correlation model. | 04-17-2014 |
20140171725 | RADIATION SYSTEMS WITH MINIMAL OR NO SHIELDING REQUIREMENT ON BUILDING - A radiation system includes: a first support; a first structure rotatably coupled to the first support so that the first structure is rotatable about a first axis relative to the first support; a second structure rotatably coupled to the first structure so that the second structure is rotatable about a second axis that forms a non-zero angle relative to the first structure; and a first radiation source connected to the second structure; wherein the first structure and the second structure are parts of a capsule for accommodating at least a portion of a patient. | 06-19-2014 |
Patent application number | Description | Published |
20080249293 | Nucleic acids encoding a G-protein coupled receptor involved in sensory transduction - The invention provides isolated nucleic acid and amino acid sequences of sensory cell specific G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of sensory cell specific G-protein coupled receptors. | 10-09-2008 |
20090104703 | Nucleic Acids Encoding Proteins Involved in Sensory Transduction - The invention provides isolated nucleic acid and amino acid sequences of sensory cell specific polypeptides, antibodies to such polypeptides, methods of detecting such nucleic acids and polypeptides, and methods of screening for modulators of sensory cell specific polypeptides. | 04-23-2009 |
20090148948 | NUCLEIC ACIDS ENCODING A G-PROTEIN COUPLED RECEPTOR INVOLVED IN TASTE TRANSDUCTION - The invention provides isolated nucleic acid and amino acid sequences of sensory cell specific G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of sensory cell specific G-protein coupled receptors. | 06-11-2009 |
20110105741 | NUCLEIC ACIDS ENCODING A G-PROTEIN COUPLED RECEPTOR INVOLVED IN SENSORY TRANSDUCTION - The invention provides isolated nucleic acid and amino acid sequences of sensory cell specific G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of sensory cell specific G-protein coupled receptors. | 05-05-2011 |
20120142029 | NUCLEIC ACIDS ENCODING A G-PROTEIN COUPLED RECEPTOR INVOLVED IN SENSORY TRANSDUCTION - The invention provides isolated nucleic acid and amino acid sequences of sensory cell specific G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of sensory cell specific G-protein coupled receptors. | 06-07-2012 |
Patent application number | Description | Published |
20090280506 | SF, A NOVEL FAMILY OF TASTE RECEPTORS - The invention provides isolated nucleic acid and amino acid sequences of taste cell specific G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of taste cell specific G-protein coupled receptors. | 11-12-2009 |
20100062456 | T2R, A NOVEL FAMILY OF TASTE RECEPTORS - The invention provides nucleic acid and amino acid sequences for a novel family of taste transduction G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of taste transduction G-protein coupled receptors. | 03-11-2010 |
20120009598 | T2R, A NOVEL FAMILY OF TASTE RECEPTORS - The invention provides nucleic acid and amino acid sequences for a novel family of taste transduction G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of taste transduction G-protein coupled receptors. | 01-12-2012 |
20130189712 | T2R, A NOVEL FAMILY OF TASTE RECEPTORS - The invention provides nucleic acid and amino acid sequences for a novel family of taste transduction G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of taste transduction G-protein coupled receptors. | 07-25-2013 |
20140120553 | T2R, A NOVEL FAMILY OF TASTE RECEPTORS - The invention provides nucleic acid and amino acid sequences for a novel family of taste transduction G-protein coupled receptors, antibodies to such receptors, methods of detecting such nucleic acids and receptors, and methods of screening for modulators of taste transduction G-protein coupled receptors. | 05-01-2014 |
Patent application number | Description | Published |
20090177783 | Pairing and storage access scheme between a handheld device and a computing system - A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service. | 07-09-2009 |
20120151106 | PAIRING AND STORAGE ACCESS SCHEME BETWEEN A HANDHELD DEVICE AND A COMPUTING SYSTEM - A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service. | 06-14-2012 |
20120246301 | APPARATUS AND METHOD FOR MANAGING PEER-TO-PEER CONNECTIONS BETWEEN DIFFERENT SERVICE PROVIDERS - In one embodiment of the invention, service providers generate bloom filters with the user ID codes of registered users and exchange the bloom filters with one another. In response to a request to locate a first user, a first service provider will query its own registration database to determine if the first user is registered with the first service provider. If the first user is not registered with the first service provider, then the first service provider will query its bloom filters to identify other service providers with which the first user may be registered. A positive response from a bloom filter indicates that the first user may or may not be registered with the service provider associated with that bloom filter, and a negative response indicates with certainty that the first user is not registered with the service provider associated with that bloom filter. | 09-27-2012 |
Patent application number | Description | Published |
20130227631 | Cable with Fade and Hot Plug Features - In an embodiment, a host computing device includes an internal display and also includes a connector to connect to an external display. A cable is provided to connect to the connector and to connect to the external display. The cable includes video processing capabilities. For example, the cable may include a memory configured to store a frame buffer. The frame buffer may store a frame of video data for further processing by the video processing device in the cable. The video processing device may manipulate the frame in a variety of ways, e.g. scaling, rotating, gamma correction, dither correction, etc. | 08-29-2013 |
20140086406 | Key Management Using Security Enclave Processor - An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. | 03-27-2014 |
20140089650 | Security Enclave Processor Boot Control - An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. | 03-27-2014 |
Patent application number | Description | Published |
20090006640 | INCREMENTAL SECURE BACKUP AND RESTORE OF USER SETTINGS AND DATA - Methods and apparatuses for performing secure incremental backup and restore operations are disclosed. | 01-01-2009 |
20090215398 | Methods and Systems for Establishing Communications Between Devices - At least certain embodiments of the disclosures relate to establishing communications between devices with a first connection. A second connection is established between the devices to transfer data between the devices and/or alter configurations of the devices. In one embodiment, a method includes establishing a first connection between a first device and a second device with a first networking standard and associated first network. The method further includes establishing a second connection between the first device and the second device with a second networking standard and associated second network based on the first connection providing information to at least one of the first and second devices regarding the second network. The method further includes transferring data between the first and second devices using the second networking standard. In one embodiment, the first networking standard is a Bluetooth networking standard and the second networking standard is a WiFi networking standard. | 08-27-2009 |
20100309815 | NETWORK ASSOCIATION IN AN ENVIRONMENT WITH HIDDEN NETWORKS - Embodiments of the invention perform a preliminary scan for information automatically transmitted by available wireless access points. The information transmitted by access points (e.g., identity information) and information derived from the transmission (e.g., signal strength) is used to prioritize the available wireless access points before direct scanning takes place. | 12-09-2010 |
20120233361 | HOST DEVICE SUSPENDING COMMUNICATION LINK TO CLIENT DEVICE BASED ON CLIENT DEVICE NOTIFICATION - A communication link between a host device and a client device can be suspended based on a suspend request or notification provided by the client device. The suspend request can be transmitted by a client device to a host device if the client device determines that suspension is appropriate, and can be sent in response to receiving a polling request from the host device. After receiving a suspend request, the host device can initiate an operation to suspend the communication link between the devices. | 09-13-2012 |
20120260099 | INCREMENTAL SECURE BACKUP AND RESTORE OF USER SETTINGS AND DATA - Methods and apparatuses for performing secure incremental backup and restore operations are disclosed. | 10-11-2012 |
20130035065 | SECURE DEVICE CONFIGURATION PROFILES - A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating. | 02-07-2013 |
20140093084 | Secure Escrow Service - A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key. | 04-03-2014 |
20140208404 | CONFLICT RESOLUTION FOR KEYCHAIN SYNCING - Some embodiments provide a program that synchronizes a keychain stored on a device with a set of other devices. The keychain includes a set of keychain items. The program receives (1) a list of keychain items for updating the keychain stored on the device and (2) data representing the keychain items specified in the list of keychain items. For each keychain item in the list of keychain items, the program updates the keychain stored on the device with the data that represents the keychain item. | 07-24-2014 |
20140208434 | DATA PROTECTION FOR KEYCHAIN SYNCING - Some embodiments provide a program that provides data protection for a device when synchronizing a set of keychains stored on the device with a set of other devices. The program receives keychain data for synchronizing the set of keychains stored on the device with the set of other devices. The keychain data is specified as belonging to a protection domain. The program determines whether a set of conditions defined for the protection domain is satisfied. When the set of conditions is determined as satisfied, the program allows access to the keychain data in order to process the keychain data and synchronize the set of keychains stored on the device with the set of other devices. | 07-24-2014 |
20140281540 | KEYCHAIN SYNCING - Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels. | 09-18-2014 |
20150058191 | SECURE PROVISIONING OF CREDENTIALS ON AN ELECTRONIC DEVICE - Systems, methods, and computer-readable media for provisioning credentials on an electronic device are provided. In one example embodiment, a secure platform system may be in communication with an electronic device and a financial institution subsystem. The secure platform system may be configured to, inter alia, receive user account information from the electronic device, authenticate a user account with a commercial entity using the received user account information, detect a commerce credential associated with the authenticated user account, run a commercial entity fraud check on the detected commerce credential, commission the financial institution subsystem to run a financial entity fraud check on the detected commerce credential based on the results of the commercial entity fraud check, and facilitate provisioning of the detected commerce credential on the electronic device based on the results of the financial entity fraud check. Additional embodiments are also provided. | 02-26-2015 |
Patent application number | Description | Published |
20110252234 | SYSTEM AND METHOD FOR FILE-LEVEL DATA PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Also disclosed is a method of verifying a password by decrypting a key bag, retrieving data from an encrypted file using an encryption key from the decrypted key bag, and verifying the password by comparing retrieved data with expected data. | 10-13-2011 |
20110252243 | SYSTEM AND METHOD FOR CONTENT PROTECTION BASED ON A COMBINATION OF A USER PIN AND A DEVICE SPECIFIC IDENTIFIER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Additionally, a method of generating a cryptographic key based on a user-entered password and a device-specific identifier secret utilizing an encryption algorithm is disclosed. | 10-13-2011 |
20130034229 | SYSTEM AND METHOD FOR WIRELESS DATA PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change. | 02-07-2013 |
Patent application number | Description | Published |
20090208285 | Anti-ram system and method of installation - An anti-ram system and method of construction having a shallow mounted base pad from which extend a plurality of bollards. Very little or only a shallow excavation is required for the base of the bollard system, which can be partially or fully assembled prior to bringing it to the installation site. The shallow mounting pad or base of the bollard system of this invention may be formed or constructed in various ways and of various materials, and in various configurations. The shallow mounting pad or base is constructed so as to have considerable mass. | 08-20-2009 |
20100166498 | ANTI-RAM SYSTEM AND METHOD OF INSTALLATION - An anti-ram system and method of construction having a shallow mounted base pad from which extend a plurality of bollards. Very little or only a shallow excavation is required for the base of the bollard system, which can be partially or fully assembled prior to bringing it to the installation site. The shallow mounting pad or base of the bollard system of this invention may be formed or constructed in various ways and of various materials, and in various configurations. The shallow mounting pad or base is constructed so as to have considerable mass. | 07-01-2010 |
20110033232 | SURFACE MOUNT VEHICLE ANTI-RAM SECURITY SYSTEMS - Anti-ram systems according to embodiments of the invention comprise at least one bollard section comprising a base of limited height and a plurality of spaced bollards extending upwardly from the base. An anti-ram system according to embodiments of the invention may be erected or installed on a paved surface such as asphalt, concrete, paver stones, etc., or on an unpaved surface such as soil, and need not be partially of fully buried, and yet can qualify for Department of State crash ratings previously assigned to buried bollard systems. Disclosed anti-ram system also comprise a plurality of bollard sections and one or more connectors for interconnecting two or more of the bollard sections, and may also include an anchor or anchor system engaging at least each end of a bollard section not connected to another bollard section. The bollard sections may be filled with ballast and high friction structure may be attached to the bottom of the bollard sections to resist sliding after impact. | 02-10-2011 |
20120308302 | ANTI-RAM SYSTEM AND METHOD OF INSTALLATION - An anti-ram system and method of construction having a shallow mounted base pad from which extend a plurality of bollards. Very little or only a shallow excavation is required for the base of the bollard system, which can be partially or fully assembled prior to bringing it to the installation site. The shallow mounting pad or base of the bollard system of this invention may be formed or constructed in various ways and of various materials, and in various configurations. The shallow mounting pad or base is constructed so as to have considerable mass. | 12-06-2012 |
20130034387 | SURFACE MOUNT VEHICLE ANTI-RAM SECURITY SYSTEMS - Disclosed anti-ram systems comprise at least one bollard section comprising a base of limited height and a plurality of spaced bollards extending upwardly from the base, which may be erected or installed on a paved surface such as asphalt, concrete, paver stones, etc., or on an unpaved surface such as soil, and need not be partially of fully buried, and yet can qualify for Department of State crash ratings previously assigned to buried bollard systems. Disclosed anti-ram systems also comprise a plurality of bollard sections and one or more connectors for interconnecting two or more of the bollard sections, and may also include an anchor or anchor system engaging at least each end of a bollard section not connected to another bollard section. The bollard sections may be filled with ballast and high friction structure may be attached to the bottom of the bollard sections to resist sliding after impact. | 02-07-2013 |
Patent application number | Description | Published |
20130083794 | Aggregating Completion Messages In A Sideband Interface - In one embodiment, the present invention includes a method for receiving a request in a router from a first endpoint coupled to the router, where the request is for an aggregated completion. In turn, the router can forward the request to multiple target agents, receive a response from each of the target agents, and consolidate the responses into an aggregated completion. Then, the router can send the aggregated completion to the first endpoint. Other embodiments are described and claimed. | 04-04-2013 |
20130083798 | Sending Packets With Expanded Headers - In one embodiment, the present invention is directed to method for receiving a packet in a first agent, where the packet includes a first packet header with an expanded header indicator. Based on this indicator, the agent can determine if the packet includes one or more additional packet headers. If so, the agent can next determining if it supports information in the additional packet header based on a header identifier of the additional header. Other embodiments are described and claimed. | 04-04-2013 |
20130086139 | Common Idle State, Active State And Credit Management For An Interface - In one embodiment, the present invention includes method for entering a credit initialization state of an agent state machine of an agent coupled to a fabric to initialize credits in a transaction credit tracker of the fabric. This tracker tracks credits for transaction queues of a first channel of the agent for a given transaction type. The agent may then assert a credit initialization signal to cause credits to be stored in the transaction credit tracker corresponding to the number of the transaction queues of the first channel of the agent for the first transaction type. Other embodiments are described and claimed. | 04-04-2013 |
20130086296 | Providing Multiple Decode Options For A System-On-Chip (SoC) Fabric - In one embodiment, a system-on-chip (SoC) can be configured to receive a request from a master agent in a fabric coupled to the master agent, send a show command grant to the master agent responsive to selection of the request by the fabric, receive a command portion of a transaction corresponding to the request in the fabric and determine a target agent to receive the transaction based on the command portion, and thereafter send a transaction grant to the master agent for the transaction. Other embodiments are described and claimed. | 04-04-2013 |
20130086586 | Issuing Requests To A Fabric - In one embodiment, a method includes determining whether producer-consumer ordering rules have been met for a first transaction to be sent from a source agent to a target agent via a fabric, and if so a first request for the first transaction is sent from the source agent to the fabric in a first clock cycle. Then a second request can be sent from the source agent to the fabric for a second transaction in a pipelined manner. Other embodiments are described and claimed. | 04-04-2013 |
20130138858 | Providing A Sideband Message Interface For System On A Chip (SoC) - According to one embodiment, a system on a chip includes multiple agents each corresponding to an intellectual property (IP) logic and a fabric to couple the agents. The fabric can include a primary message interface and a sideband message interface. The fabric further includes one or more routers to provide out-of-band communications between the agents via this sideband message interface. To effect such communication, the router can perform a subset of ordering rules of a personal computer (PC)-based specification for sideband messages. Other embodiments are described and claimed. | 05-30-2013 |
20140258492 | AGGREGATING COMPLETION MESSAGES IN A SIDEBAND INTERFACE - In one embodiment, the present invention includes a method for receiving a request in a router from a first endpoint coupled to the router, where the request is for an aggregated completion. In turn, the router can forward the request to multiple target agents, receive a response from each of the target agents, and consolidate the responses into an aggregated completion. Then, the router can send the aggregated completion to the first endpoint. Other embodiments are described and claimed. | 09-11-2014 |
20140258583 | Providing Multiple Decode Options For A System-On-Chip (SoC) Fabric - In one embodiment, a system-on-chip (SoC) can be configured to receive a request from a master agent in a fabric coupled to the master agent, send a show command grant to the master agent responsive to selection of the request by the fabric, receive a command portion of a transaction corresponding to the request in the fabric and determine a target agent to receive the transaction based on the command portion, and thereafter send a transaction grant to the master agent for the transaction. Other embodiments are described and claimed. | 09-11-2014 |
20140289435 | Issuing Requests To A Fabric - In one embodiment, a method includes determining whether producer-consumer ordering rules have been met for a first transaction to be sent from a source agent to a target agent via a fabric, and if so a first request for the first transaction is sent from the source agent to the fabric in a first clock cycle. Then a second request can be sent from the source agent to the fabric for a second transaction in a pipelined manner. Other embodiments are described and claimed. | 09-25-2014 |
20150012681 | Common Idle State, Active State And Credit Management For An Interface - In one embodiment, the present invention includes method for entering a credit initialization state of an agent state machine of an agent coupled to a fabric to initialize credits in a transaction credit tracker of the fabric. This tracker tracks credits for transaction queues of a first channel of the agent for a given transaction type. The agent may then assert a credit initialization signal to cause credits to be stored in the transaction credit tracker corresponding to the number of the transaction queues of the first channel of the agent for the first transaction type. Other embodiments are described and claimed. | 01-08-2015 |
20150019788 | Providing A Sideband Message Interface For System On A Chip (SoC) - According to one embodiment, a system on a chip includes multiple agents each corresponding to an intellectual property (IP) logic and a fabric to couple the agents. The fabric can include a primary message interface and a sideband message interface. The fabric further includes one or more routers to provide out-of-band communications between the agents via this sideband message interface. To effect such communication, the router can perform a subset of ordering rules of a personal computer (PC)-based specification for sideband messages. Other embodiments are described and claimed. | 01-15-2015 |
Patent application number | Description | Published |
20100173340 | USE OF HEMATOPOIETIC GROWTH FACTOR INDUCIBLE NEUROKININ-1 (HGFIN) AS A NOVEL BIOMARKER - The invention provides, in certain embodiments, a method of detecting an indicator of renal injury or renal disease. The method entails assaying a urine sample for hematopoietic growth factor inducible neurokinin-1 (HGFIN), wherein the presence of HGFIN at an elevated level indicates the presence and/or degree of renal injury or renal disease, and/or the rate of loss of renal function. In other embodiments, the invention provides a method of detecting an indicator of systemic inflammation. This method entails assaying a biological sample for HGFIN, wherein the presence of HGFIN at an elevated level indicates the presence and/or degree of systemic inflammation. Also provided, are methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 07-08-2010 |
20110177613 | Use of periostin as a novel biomarker - The invention provides, in certain embodiments, a method of detecting an indicator of renal injury or renal disease. The method entails assaying a urine sample for periostin, wherein the presence of periostin at an elevated level indicates the presence and/or degree of renal injury or renal disease. Also provided, are methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 07-21-2011 |
20120329886 | USE OF PERIOSTIN AS A NOVEL BIOMARKER - The invention provides, in certain embodiments, a method of detecting an indicator of renal injury or renal disease. The method entails assaying a urine sample for periostin, wherein the presence of periostin at an elevated level indicates the presence and/or degree of renal injury or renal disease. Also provided, are methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 12-27-2012 |
20130303563 | TREATMENT OF PERITONEAL INJURY USING JAK INHIBITORS - The invention provides, in certain embodiments, a method of preventing and/or treating peritoneal injury and/or diminished function by administering an effective amount of one or more inhibitors of JAK. The invention also provides a pharmaceutical composition including a JAK inhibitor for the treatment of peritoneal injury and/or diminished function. In another aspect, the invention provides a method of detecting an indicator of peritoneal injury. The method entails assaying a biological sample for periostin, wherein the presence of periostin at an elevated level indicates the presence and/or degree of peritoneal injury. Also provided, are methods of identifying subject for treatment of peritoneal injury and/or diminished function, methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 11-14-2013 |
20130344511 | USE OF HEMATOPOIETIC GROWTH FACTOR INDUCIBLE NEUROKININ-1 (HGFIN) AS A NOVEL BIOMARKER - The invention provides, in certain embodiments, a method of detecting an indicator of renal injury or renal disease. The method entails assaying a urine sample for hematopoietic growth factor inducible neurokinin-1 (HGFIN), wherein the presence of HGFIN at an elevated level indicates the presence and/or degree of renal injury or renal disease, and/or the rate of loss of renal function. In other embodiments, the invention provides a method of detecting an indicator of systemic inflammation. This method entails assaying a biological sample for HGFIN, wherein the presence of HGFIN at an elevated level indicates the presence and/or degree of systemic inflammation. Also provided, are methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 12-26-2013 |
20140135227 | USE OF PERIOSTIN AS A NOVEL BIOMARKER - The invention provides, in certain embodiments, a method of detecting an indicator of renal injury or renal disease. The method entails assaying a urine sample for periostin, wherein the presence of periostin at an elevated level indicates the presence and/or degree of renal injury or renal disease. Also provided, are methods of determining progression of these conditions, as well as methods of determining subjects' response to treatment. | 05-15-2014 |
Patent application number | Description | Published |
20130140654 | Low Frequency CMUT with Vent Holes - A capacitive micromachined ultrasonic transducer (CMUT), which has a conductive structure that can vibrate over a cavity, has a number of vent holes that are formed in the bottom surface of the cavity. The vent holes eliminate the deflection of the CMUT membrane due to atmospheric pressure which, in turn, allows the CMUT to receive and transmit low frequency ultrasonic waves. | 06-06-2013 |
20130140704 | Low Frequency CMUT with Thick Oxide - A capacitive micromachined ultrasonic transducer (CMUT), which has a conductive structure that can vibrate over a cavity, utilizes a thick oxide layer to substantially increase the volume of the cavity which, in turn, allows the CMUT to receive and transmit low frequency ultrasonic waves. In addition, the CMUT can include a back side bond pad structure that eliminates the need for and cost of one patterned photoresist layer. | 06-06-2013 |
20130200474 | Low Frequency CMUT with Vent Holes - A capacitive micromachined ultrasonic transducer (CMUT), which has a conductive structure that can vibrate over a cavity, has a number of vent holes that are formed in the bottom surface of the cavity. The vent holes eliminate the deflection of the CMUT membrane due to atmospheric pressure which, in turn, allows the CMUT to receive and transmit low frequency ultrasonic waves. | 08-08-2013 |
20130249023 | High Frequency CMUT - A high-frequency capacitive micromachined ultrasonic transducer (CMUT) has a silicon membrane and an overlying metal silicide layer that together form a conductive structure which can vibrate over a cavity. The CMUT also has a metal structure that touches a group of conductive structures. The metal structure has an opening that extends completely through the metal structure to expose the conductive structure. | 09-26-2013 |
Patent application number | Description | Published |
20120187508 | INTEGRATION OF STRUCTURALLY-STABLE ISOLATED CAPACITIVE MICROMACHINED ULTRASONIC TRANSDUCER (CMUT) ARRAY CELLS AND ARRAY ELEMENTS - A method for forming a capacitive micromachined ultrasonic transducer (CMUT) includes forming multiple CMUT elements in a first semiconductor-on-insulator (SOI) structure. Each CMUT element includes multiple CMUT cells. The first SOI structure includes a first handle wafer, a first buried layer, and a first active layer. The method also includes forming a membrane over the CMUT elements and forming electrical contacts through the first handle wafer and the first buried layer. The electrical contacts are in electrical connection with the CMUT elements. The membrane could be formed by bonding a second SOI structure to the first SOI structure, where the second SOI structure includes a second handle wafer, a second buried layer, and a second active layer. The second handle wafer and the second buried layer can be removed, and the membrane includes the second active layer. | 07-26-2012 |
20120211826 | Trench DMOS Transistor with Reduced Gate-to-Drain Capacitance - A trench DMOS transistor with a very low on-state drain-to-source resistance and a high gate-to-drain charge includes one or more floating islands that lie between the gate and drain to reduce the charge coupling between the gate and drain, and effectively lower the gate-to-drain capacitance. | 08-23-2012 |
20130001647 | INTEGRATION OF VERTICAL BJT OR HBT INTO SOI TECHNOLOGY - In an embodiment, a bipolar transistor structure is formed on a silicon-on-insulator (SOI) structure that includes a semiconductor substrate, a buried oxide layer formed on the semiconductor substrate and a top silicon layer formed on the buried oxide layer. The bipolar transistor structure includes: an opening formed in the top silicon layer; an opening in the buried oxide layer beneath the opening in the top silicon layer, the opening in the buried oxide layer including a region that undercuts the opening in the top silicon layer at a side of the opening in the top silicon layer; conductive material having a first conductivity type formed in the opening in the buried oxide layer such that the conductive material includes a region that undercuts the top silicon layer at the side of the opening in the top silicon layer; isolation dielectric material formed in the top silicon layer over the region of conductive material that undercuts the top silicon layer to define a bipolar transistor collector region having the first conductivity type, the collector region being in contact with the region of conductive material; a bipolar transistor base region formed in contact with an upper surface of the collector region, the base region having a second conductivity type that is opposite the first conductivity type; and an emitter region formed in contact with the base region, the emitter region having the first conductivity type. | 01-03-2013 |
Patent application number | Description | Published |
20080228429 | Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device - Systems and methods for location, motion, and contact detection and tracking in a portable networked device are disclosed. A portable device may include a motion detection unit including an accelerometer for detecting accelerations in one or more axes. Signals associated with the detected motion are processed to generate estimates of device acceleration, velocity, and relative and absolute locations. Additional processing may be performed to detect user gestures or other user input relevant to portable device control. Particular motion or vibrational characteristics may be also be detected and used by other processes in the portable device. | 09-18-2008 |
20090002333 | SYSTEMS AND METHODS FOR DEVICE REGISTRATION - Systems and methods for facilitating registration of a device, such as a portable device, are described. A user may be provided with a reference pattern, which may then be entered onto a corresponding grid on the device. The user entered grid pattern is then stored as data, encoded, and transmitted to a registration server where it is compared to the reference pattern. If the user entered grid pattern sufficiently matches the reference pattern, the device may then be registered with the registration server and any associated server systems, where it may then be used to provide user personalized content or other functionality. | 01-01-2009 |
20090024943 | SYSTEMS AND METHODS FOR ALARM TONE SELECTION, DISTRIBUTION, AND PLAYBACK IN A NETWORKED AUDIOVISUAL DEVICE - Systems and methods for alarm tone selection and distribution are disclosed. A first device may be configured to allow user selection of a content item for rendering in conjunction with a predefined alarm tone event such as an alarm, meeting time, or other event. The content item may then be associated with an application configured to render content upon occurrence of the event, and the user may be enabled to purchase non-owned content. The user may be further enabled to send content or a reference to content to a second device associated with a second user, where the second user may then be enabled to purchase and use the content for alarm tone functionality on the second device. | 01-22-2009 |
20110060994 | SYSTEMS AND METHODS FOR WIDGET RENDERING AND SHARING ON A PERSONAL ELECTRONIC DEVICE - Systems and methods for providing, sharing, storing and playing widgets and associated media content on a personal audiovisual device, such as a digital photo frame, are described. In one implementation, widgets may be selected by a user for rendering based on capabilities of a user's device, with the widgets then provided to the device for playback. Digital content such as audio files, images, and/or video may be rendered in conjunction with playback of the widget. Widgets may be shared between users so as to facilitate sharing of media content. | 03-10-2011 |
20110093227 | SYSTEMS AND METHODS FOR LOCATION, MOTION, AND CONTACT DETECTION AND TRACKING IN A NETWORKED AUDIOVISUAL DEVICE - Systems and methods for location, motion, and contact detection and tracking in a portable networked device are disclosed. A portable device may include a motion detection unit including an accelerometer for detecting accelerations in one or more axes. Signals associated with the detected motion are processed to generate estimates of device acceleration, velocity, and relative and absolute locations. Additional processing may be performed to detect user gestures or other user input relevant to portable device control. Particular motion or vibrational characteristics may be also be detected and used by other processes in the portable device. | 04-21-2011 |
20140082506 | SYSTEMS AND METHODS FOR WIDGET RENDERING AND SHARING ON A PERSONAL ELECTRONIC DEVICE - Systems and methods for providing, sharing, storing and playing widgets and associated media content on a personal audiovisual device, such as a digital photo frame, are described. In one implementation, widgets may be selected by a user for rendering based on capabilities of a user's device, with the widgets then provided to the device for playback. Digital content such as audio files, images, and/or video may be rendered in conjunction with playback of the widget. Widgets may be shared between users so as to facilitate sharing of media content. | 03-20-2014 |
20150040118 | SYSTEM AND METHOD FOR AUTOMATICALLY UPDATING THE SOFTWARE OF A NETWORKED PERSONAL AUDIOVISUAL DEVICE - A method for automatically updating software executed by an electronic device is disclosed herein. The method includes receiving, at the electronic device, an update indication from a server that updated software is available for the electronic device. The method further includes modifying, in response to the update indication, a boot state of the electronic device and initiating operation of the electronic device in an update mode. The updated software is received, at the electronic device, during operation in the update mode. The method further includes initiating, upon determining the updated software has been correctly received, operation of the electronic device in a normal mode. | 02-05-2015 |