Patent application number | Description | Published |
20080246526 | PROGRAMMABLE I/O CELL CAPABLE OF HOLDING ITS STATE IN POWER-DOWN MODE - The present invention comprises a microcontroller unit including a processor for generating a power down signal. Control logic generates a hold signal responsive to the power down signal. A voltage regulator provides a regulated voltage responsive to an input voltage and powers down responsive to the power down signal. At least one digital device powered by the regulated voltage enters a powered down mode responsive to the voltage regulator entering the powered down state. The at least one digital device provides at least one digital output signal that is provided to an input/output cell. The input/output cell also is connected to receive a hold signal. The input/output cell maintains a last state of the digital output signal responsive to the hold signal when the at least one digital device enters the powered down state. | 10-09-2008 |
20090187773 | MCU WITH POWER SAVING MODE - A microcontroller unit includes a processor for generating a first control signal to start a comatose mode of operation for the microcontroller unit. Control logic responsive to the first control signal generates an enable signal at a first level and the control logic is further responsive to a second control signal for generating the enable signal at a second level. A voltage regulator generates regulated voltage from an input voltage. The voltage regulator shuts down to provide a zero volt regulated voltage responsive to the enable signal at the first level and powers up to provide a regulated voltage at an operating level responsive to the enable signal at the second level. | 07-23-2009 |
20100079439 | METHOD AND APPARATUS TO SUPPORT VARIOUS SPEEDS OF LCD DRIVER - Charge pump circuitry comprises a voltage for generating a first regulated voltage. A low drop out regulator generates a second regulated voltage responsive to the first regulated voltage. A charge pump voltage generation circuit generates a voltage. First and second resistor strings are responsive to the generated voltage. The first resistor string provides a first plurality of bias voltages to an LCD responsive to the voltage in a first mode of operation and the second resistor string provides faster charging and discharging of the connected LCD elements responsive to a second mode of operation. | 04-01-2010 |
20120218012 | ON-CHIP POWER-UP CONTROL CIRCUIT - A power-up control circuit utilizes on-chip circuits, multiple voltages, a ring oscillator and counter, and edge and level detection circuits to guarantee reset during power-up conditions and continues the reset state with a variable length counter to guarantee a predictable reset. In addition, a clean start-up after a logical power-down condition is provided. | 08-30-2012 |
20120257650 | ON-CHIP TEMPERATURE SENSOR - A method and apparatus for determining a temperature of a semiconductor device is provided herein. One aspect of the disclosed subject matter is seen in a temperature sensing device. The temperature sensing device comprises a diode and a circuit. The diode is adapted to be reverse biased by a charging voltage applied thereto. The circuit determines a temperature of the diode based on a rate that the voltage on the diode discharges in response to the charging voltage being uncoupled from the diode. | 10-11-2012 |
20140016669 | ON-CHIP TEMPERATURE SENSOR - A method and apparatus for determining a temperature of a semiconductor device is provided herein. One aspect of the disclosed subject matter is seen in a temperature sensing device. The temperature sensing device comprises a diode and a circuit. The diode is adapted to be reverse biased by a charging voltage applied thereto. The circuit determines a temperature of the diode based on a rate that the voltage on the diode discharges in response to the charging voltage being uncoupled from the diode. | 01-16-2014 |
Patent application number | Description | Published |
20090172785 | PROVIDING MOBILITY MANAGEMENT USING EMULATION - A system and method are disclosed for providing mobility management among mobile nodes in a communication network. Emulation can be provided to allow a mobile node that uses mobile IP (MIP) to access and use a communication network that is based on proxy mobile IP (PMIP). A gateway can be used to terminate the MIP based protocol access from the mobile node and communicate with the PMIP based core network. Emulation can be provided on a gateway to provide communication from a internet protocol version 4 (IPv4) mobile node and a core network running internet protocol version 6 (IPv6). This allows the network operator to provide access to the deployed base of MIP or IPv4 mobile nodes. | 07-02-2009 |
20110286334 | Admission Control and Policing in Wireless Packet Data Communication System - A call flow is provided in a wireless communication system ( | 11-24-2011 |
20120131644 | Mobile IPv6 authentication and authorization baseline - The invention consists of an authentication protocol for the Home Agent to authenticate and authorize the Mobile Node's Binding Update message. Two new mobility options compatible with RADIUS AAA are used to exchange a shared secret between the Home Agent and the Mobile Node so the Mobile Node can be authenticated.
| 05-24-2012 |
20120151212 | Securing home agent to mobile node communication with HA-MN key - The invention is a new protocol for securing the communication link between the Home Agent and the Mobile Node. A cipher key and an integrity key are generated at a home AAA server and are also generated independently at the Mobile Node. The two keys generated at the home AAA server are transmitted to the Home Agent to secure information packets transmitted between the Mobile Node and the Home Agent. The cipher key and integrity key are used to establish a security association used for information packet transmissions. The cipher key is used to encrypt the information packets, and the integrity key is used to ensure that the contents of the encrypted message are not altered. | 06-14-2012 |
20130019097 | Method and Apparatus for Securing Communication Between a Mobile Node and a Network - In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop IP router. A session key is encoded using asymmetric encryption. The encrypted session key is then communicated to the first hop IP router for later use. In accordance with another teaching of the present invention, the session key is then used by the mobile node and a first hop IP router to authenticate a message. Lastly, in accordance with the third teaching of the present invention, a standardized protocol is used to securely negotiate the session key between the mobile node and the first hop IP router. | 01-17-2013 |
20130024691 | Method and Apparatus for Securing Communication Between a Mobile Node and a Network - In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop IP router. A session key is encoded using asymmetric encryption. The encrypted session key is then communicated to the first hop IP router for later use. In accordance with another teaching of the present invention, the session key is then used by the mobile node and a first hop IP router to authenticate a message. Lastly, in accordance with the third teaching of the present invention, a standardized protocol is used to securely negotiate the session key between the mobile node and the first hop IP router. | 01-24-2013 |
20130333001 | Mobile IPv6 Authentication and Authorization Baseline - Various embodiments describe an authentication protocol for the Home Agent to authenticate and authorize the Mobile Node's Binding Update message. Two new mobility options compatible with RADIUS AAA are used to exchange a shared secret between the Home Agent and the Mobile Node so the Mobile Node can be authenticated. A Mobile Node-AAA authenticator option is added to the Binding Update message. The Home Agent generates the Mobile Node-AAA authenticator as a shared secret that it communicates as authentication data to the RADIUS AAA server on the home network. The RADIUS AAA server authenticates the communication and generates an Access-Accept message with a Mobile Node-Home Agent authenticator option. After receipt at the Home Agent, a Binding Update message with the Mobile Node-Home Agent authenticator option is transmitted from the Home Agent to the Mobile Node to use as an authenticator. | 12-12-2013 |
Patent application number | Description | Published |
20100146469 | SYSTEM AND METHOD FOR SELECTING GATES IN A LOGIC BLOCK - For each of a plurality of interconnected gates forming one or more non-critical timing paths through a logic block, a gate size may be selected based on (i) a gate delay, (ii) a change in gate delay and gate power associated with downsizing the gate to a next available gate size, and (iii) signal arrival times at one or more inputs and outputs of the gate to minimize power consumed by the logic block while maintaining a specified cycle time. | 06-10-2010 |
20100287516 | METHODS AND SYSTEM FOR SELECTING GATE SIZES, REPEATER LOCATIONS, AND REPEATER SIZES OF AN INTEGRATED CIRCUIT - A method for selecting gate sizes for a logic network of an integrated circuit, wherein the logic network is defined by a plurality of logic paths that includes nodes, gates and interconnect, includes assigning, at one or more computers, gate sizes to gates adjacent to timing path end nodes of the logic network, determining an n-tuple of performance/loading parameters for each of the assigned gate sizes based on gate and interconnect delay models, and determining whether two or more logic paths share a descendant gate. Two or more logic paths that share a descendent gate are coupled. The method also includes grouping the n-tuples of parameters of coupled logic paths into bins based on gate sizes of the shared descendent gate, recursively propagating, node by node, the bins of n-tuples of parameters along the coupled logic paths, detecting whether any of the bins of n-tuples of parameters are suboptimal for all of the coupled logic paths based on a comparison of the n-tuples of parameters in bin-pairs, and eliminating all n-tuples of parameters of the suboptimal bins along the coupled logic paths to prune gate sizes associated with the suboptimal bins. | 11-11-2010 |
20120066658 | System And Method For Integrated Circuit Power And Timing Optimization - A system for selecting gates for an integrated circuit design may include at least one processing device configured to identify gates of the integrated circuit design having a slack value less than a predefined slack threshold. The at least one processing device may be further configured to, for each of the identified gates, determine (i) a number of nodes of the integrated circuit design that experience a timing slack improvement if the gate is swapped with an alternative implementation having a reduced delay or (ii) a sum of timing slack improvements experienced by nodes of the integrated circuit design if the gate is swapped with the alternative implementation having a reduced delay. The at least one processing device may still be further configured to swap the gate with the alternative implementation having the reduced delay if the determined number or sum is greater than a corresponding predetermined threshold. | 03-15-2012 |
Patent application number | Description | Published |
20080263453 | METHOD AND APPARATUS FOR PROCESS CONFIGURATION - A computer implemented method, apparatus, and computer-usable program product for process configuration are provided in the illustrative embodiments. A process that is to be configured is identified. A list of tasks associated with the identified process is displayed. A set of the tasks displayed in the task list are selected. The selected tasks are configured according to one or more task parameters. If the process that is being configured is already running, the process is suspended before the selected tasks are configured. If the process is suspended, the process is resumed after the selected tasks have been configured. The process is identified, the list of task is displayed, and the one or more tasks are selected and configured using a graphical user interface. | 10-23-2008 |
20090094417 | System and Method for Dynamically Inserting Prefetch Tags by the Web Server - A method and system for embedding prefetch tags in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request. | 04-09-2009 |
20140317404 | DYNAMIC ENCRYPTION OF A UNIVERSAL RESOURCE LOCATOR - A system including a computer and a computer readable hardware storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to information transmitted over a computing network. A resource request for a resource to be located is received. The resource request contains a universal resource locator (URL). The URL is evaluated to determine whether encryption of none, part, or all of the URL is required. It is determined that the requested resource is available and in response, the requested resource contained in the resource request is located. It is determined whether encryption is required for none, part, or all of a return URL of the requested resource that is to be returned to a location of the resource request. | 10-23-2014 |
20150281192 | DYNAMIC ENCRYPTION OF A UNIVERSAL RESOURCE LOCATOR - A method and system for restricting access to information transmitted over a computing network. A computer receives a resource request for a resource to be located. The resource request contains a universal resource locator (URL). The computer determines that the requested resource is available and in response, the computer locates the requested resource contained in the resource request. The computer determines whether encryption of the contained URL is required. The computer may determine whether encryption is required for a return URL of the requested resource that is to be returned to a location of the resource request. After the computer determines that the requested resource is available, the computer may: determine that encryption of the requested resource is required and in response, determine an encrypted value of the requested resource. | 10-01-2015 |