Patent application number | Description | Published |
20120079248 | Aliased Parameter Passing Between Microcode Callers and Microcode Subroutines - An apparatus of an aspect includes a plurality of microcode alias locations and a microcode storage. A microinstruction of a microcode subroutine is stored in the microcode storage. The microinstruction has an indication of a microcode alias location. A microcode caller of the microcode subroutine is also stored in the microcode storage. The microcode caller is operable to specify a location of a parameter in the microcode alias location that is indicated by the microinstruction of the microcode subroutine. The apparatus also includes parameter location determination logic that is coupled with the microcode alias locations. The parameter location determination logic is operable, responsive to the microinstruction of the microcode subroutine, to receive the indication of the microcode alias location from the microinstruction and determine the location of the parameter specified in the microcode alias location indicated by the microinstruction. | 03-29-2012 |
20120204042 | User Level Control Of Power Management Policies - In one embodiment, the present invention includes a processor having a core and a power controller to control power management features of the processor. The power controller can receive an energy performance bias (EPB) value from the core and access a power-performance tuning table based on the value. Using information from the table, at least one setting of a power management feature can be updated. Other embodiments are described and claimed. | 08-09-2012 |
20130179706 | User Level Control Of Power Management Policies - In one embodiment, the present invention includes a processor having a core and a power controller to control power management features of the processor. The power controller can receive an energy performance bias (EPB) value from the core and access a power-performance tuning table based on the value. Using information from the table, at least one setting of a power management feature can be updated. Other embodiments are described and claimed. | 07-11-2013 |
20140019733 | REAL TIME INSTRUCTION TRACING COMPRESSION OF RET INSTRUCTIONS - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for implementing Real Time Instruction Tracing compression of RET instructions For example, in one embodiment, such means may include an integrated circuit having means for initiating instruction tracing for instructions of a traced application, mode, or code region, as the instructions are executed by the integrated circuit; means for generating a plurality of packets describing the instruction tracing; and means for compressing a multi-bit RET instruction (RETurn instruction) to a single bit RET instruction. | 01-16-2014 |
20150095617 | USING SOFTWARE HAVING CONTROL TRANSFER TERMINATION INSTRUCTIONS WITH SOFTWARE NOT HAVING CONTROL TRANSFER TERMINATION INSTRUCTIONS - In an embodiment, the present invention includes a processor having a decode unit, an execution unit, and a retirement unit. The decode unit is to decode control transfer instructions and the execution unit is to execute control transfer instructions. The retirement unit is to retire a first control transfer instruction, and to raise a fault if a next instruction to be retired after the first control transfer instruction is not a second control transfer instruction and a target instruction of the first control transfer instruction is in code using the control transfer instructions. | 04-02-2015 |
20150135195 | COMPACTED CONTEXT STATE MANAGEMENT - Embodiments of an invention related to compacted context state management are disclosed. In one embodiment, a processor includes instruction hardware and state management logic. The instruction hardware is to receive a first save instruction and a second save instruction. The state management logic is to, in response to the first save instruction, save context state in an un-compacted format in a first save area. The state management logic is also to, in response to the second save instruction, save a compaction mask and context state in a compacted format in a second save area and set a compacted-save indicator in the second save area. The state management logic is also to, in response to a single restore instruction, determine, based on the compacted-save indicator, whether to restore context from the un-compacted format in the first save area or from the compacted format in the second save area. | 05-14-2015 |
20160004291 | User Level Control Of Power Management Policies - In one embodiment, the present invention includes a processor having a core and a power controller to control power management features of the processor. The power controller can receive an energy performance bias (EPB) value from the core and access a power-performance tuning table based on the value. Using information from the table, at least one setting of a power management feature can be updated. Other embodiments are described and claimed. | 01-07-2016 |
Patent application number | Description | Published |
20090193222 | Maintaining Processor Resources During Architectural Events - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 07-30-2009 |
20090248951 | Maintaining Processor Resources During Architectural Events - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 10-01-2009 |
20110125952 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 05-26-2011 |
20110153983 | Gathering and Scattering Multiple Data Elements - According to a first aspect, efficient data transfer operations can be achieved by: decoding by a processor device, a single instruction specifying a transfer operation for a plurality of data elements between a first storage location and a second storage location; issuing the single instruction for execution by an execution unit in the processor; detecting an occurrence of an exception during execution of the single instruction; and in response to the exception, delivering pending traps or interrupts to an exception handler prior to delivering the exception. | 06-23-2011 |
20110153990 | SYSTEM, APPARATUS, AND METHOD FOR SUPPORTING CONDITION CODES - An apparatus is described having decode circuitry to decode a first instruction, wherein the first instruction indicates that a copy of a plurality of condition codes bits is to be copied from a first register to a second register. The apparatus also has first execution circuitry to copy a plurality of condition code bits from a first register to a second register. | 06-23-2011 |
20110314480 | Apparatus, System, And Method For Persistent User-Level Thread - Embodiments of the invention provide a method of creating, based on an operating-system-scheduled thread running on an operating-system-visible sequencer and using an instruction set extension, a persistent user-level thread to run on an operating-system-sequestered sequencer independently of context switch activities on the operating-system-scheduled thread. The operating-system-scheduled thread and the persistent user-level thread may share a common virtual address space. Embodiments of the invention may also provide a method of causing a service thread running on an additional operating-system-visible sequencer to provide operating system services to the persistent user-level thread. Embodiments of the invention may further provide apparatus, system, and machine-readable medium thereof. | 12-22-2011 |
20130097360 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 04-18-2013 |
20130117743 | Instruction-Set Support for Invocation of VMM-Configured Services without VMM Intervention - A processing core comprising instruction execution logic circuitry and register space. The register space to be loaded from a VMCS, commensurate with a VM entry, with information indicating whether a service provided by the processing core on behalf of the VMM is enabled. The instruction execution logic to, in response to guest software invoking an instruction: refer to the register space to confirm that the service has been enabled, and, refer to second register space or memory space to fetch input parameters for said service written by said guest software. | 05-09-2013 |
20130212314 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 08-15-2013 |
20130232316 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 09-05-2013 |
20130263093 | OPTIONAL LOGGING OF DEBUG ACTIVITIES IN A REAL TIME INSTRUCTION TRACING LOG - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for implementing optional logging of debug activities in a real time instruction tracing log. For example, in one embodiment, such means may include an integrated circuit having means for initiating instruction tracing for instructions of a traced application, mode, or code region, as the instructions are executed by the integrated circuit; means for generating a plurality of packets to a debug log describing the instruction tracing; means for initiating an alternative mode of execution within the integrated circuit; and means for suppressing indication of entering the alternative mode of execution. Additional and alternative means may be implemented for selectively causing an integrated circuit to operate in accordance with an invisible trace mode or a visible trace mode upon transition to the alternative mode of execution. | 10-03-2013 |
20130275723 | CONDITIONAL EXECUTION SUPPORT FOR ISA INSTRUCTIONS USING PREFIXES - In one embodiment, a processor includes an instruction decoder to receive a first instruction having a prefix and an opcode and to generate, by an instruction decoder of the processor, a second instruction executable based on a condition determined based on the prefix, and an execution unit to conditionally execute the second instruction based on the condition determined based on the prefix. | 10-17-2013 |
20130275735 | Apparatus, System, And Method For Persistent User-Level Thread - Embodiments of the invention provide a method of creating, based on an operating-system-scheduled thread running on an operating-system-visible sequencer and using an instruction set extension, a persistent user-level thread to run on an operating-system-sequestered sequencer independently of context switch activities on the operating-system-scheduled thread. The operating-system-scheduled thread and the persistent user-level thread may share a common virtual address space. Embodiments of the invention may also provide a method of causing a service thread running on an additional operating-system-visible sequencer to provide operating system services to the persistent user-level thread. Embodiments of the invention may further provide apparatus, system, and machine-readable medium thereof. | 10-17-2013 |
20130297915 | FLAG NON-MODIFICATION EXTENSION FOR ISA INSTRUCTIONS USING PREFIXES - In one embodiment, a processor includes an instruction decoder to receive and decode an instruction having a prefix and an opcode, an execution unit to execute the instruction based on the opcode, and flag modification override logic to prevent the execution unit from modifying a flag register of the processor based on the prefix of the instruction. | 11-07-2013 |
20130297917 | SYSTEM AND METHOD FOR REAL TIME INSTRUCTION TRACING - An apparatus and method are described for real time instruction tracing. For example, a method according to one embodiment comprises: recording user specified address ranges for which tracing is required; monitoring a next linear instruction pointer (NLIP) values and/or branch linear instruction pointer (BLIP) values to determine if address range has been entered; when the range is entered, compressing the NLIP and/or BLIP values and constructing fixed length packets containing the tracing data; and transferring the fixed length packets to a memory execution cluster. | 11-07-2013 |
20140013326 | Instruction-Set Support for Invocation of VMM-Configured Services without VMM Intervention - A processing core comprising instruction execution logic circuitry and register space. The register space to be loaded from a VMCS, commensurate with a VM entry, with information indicating whether a service provided by the processing core on behalf of the VMM is enabled. The instruction execution logic to, in response to guest software invoking an instruction: refer to the register space to confirm that the service has been enabled, and, refer to second register space or memory space to fetch input parameters for said service written by said guest software. | 01-09-2014 |
20140156972 | Control Transfer Termination Instructions Of An Instruction Set Architecture (ISA) - In an embodiment, the present invention includes a processor having an execution logic to execute instructions and a control transfer termination (CTT) logic coupled to the execution logic. This logic is to cause a CTT fault to be raised if a target instruction of a control transfer instruction is not a CTT instruction. Other embodiments are described and claimed. | 06-05-2014 |
20140157002 | SYSTEMS AND METHODS FOR PROTECTING SYMMETRIC ENCRYPTION KEYS - Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key. | 06-05-2014 |
20140189314 | Real Time Instruction Trace Processors, Methods, and Systems - A method of an aspect includes generating real time instruction trace (RTIT) packets for a first logical processor of a processor. The RTIT packets indicate a flow of software executed by the first logical processor. The RTIT packets are stored in an RTIT queue corresponding to the first logical processor. The RTIT packets are transferred from the RTIT queue to memory predominantly with firmware of the processor. Other methods, apparatus, and systems are also disclosed. | 07-03-2014 |
20140223141 | SHARING TLB MAPPINGS BETWEEN CONTEXTS - In some implementations, a processor may include a data structure, such as a translation lookaside buffer, that includes an entry containing first mapping information having a virtual address and a first context associated with a first thread. Control logic may receive a request for second mapping information having the virtual address and a second context associated with a second thread. The control logic may determine whether the second mapping information associated with the second context is equivalent to the first mapping information in the entry of the data structure. If the second mapping information is equivalent to the first mapping information, the control logic may associate the second thread with the first mapping information contained in the entry of the data structure to share the entry between the first thread and the second thread. | 08-07-2014 |
20140281380 | EXECUTION CONTEXT SWAP BETWEEN HETEROGENOUS FUNCTIONAL HARDWARE UNITS - Remapping technologies for execution context swap between heterogeneous functional hardware units are described. A computing system includes multiple registers configured to store remote contexts of functional units. A mapping table maps the remote context to the functional units. An execution unit is configured to execute a remapping tool that intercepts an operation to access a remote context of a first functional unit of the plurality of functional units that is taken offline. The remapping tool determines that the first functional unit is remapped to a second functional unit using the mapping table. The operation is performed to access the remote context that is remapped to the second functional unit. The first functional unit and the second functional unit may be heterogeneous functional units. | 09-18-2014 |
20140281457 | METHOD FOR BOOTING A HETEROGENEOUS SYSTEM AND PRESENTING A SYMMETRIC CORE VIEW - A heterogeneous processor architecture and a method of booting a heterogeneous processor is described. A processor according to one embodiment comprises: a set of large physical processor cores; a set of small physical processor cores having relatively lower performance processing capabilities and relatively lower power usage relative to the large physical processor cores; and a package unit, to enable a bootstrap processor. The bootstrap processor initializes the homogeneous physical processor cores, while the heterogeneous processor presents the appearance of a homogeneous processor to a system firmware interface. | 09-18-2014 |
20140344552 | PROVIDING STATUS OF A PROCESSING DEVICE WITH PERIODIC SYNCHRONIZATION POINT IN INSTRUCTION TRACING SYSTEM - In accordance with embodiments disclosed herein, there is provided systems and methods for providing status of a processing device with a periodic synchronization point in an instruction tracing system. For example, the method may include generating a boundary packet based on a unique byte pattern in a packet log. The boundary packet provides a starting point for packet decode. The method may also include generating a plurality of state packets based on status information of the processor. The plurality of state packets follows the boundary packet when outputted into the packet log. | 11-20-2014 |
20140344553 | Gathering and Scattering Multiple Data Elements - According to a first aspect, efficient data transfer operations can be achieved by: decoding by a processor device, a single instruction specifying a transfer operation for a plurality of data elements between a first storage location and a second storage location; issuing the single instruction for execution by an execution unit in the processor; detecting an occurrence of an exception during execution of the single instruction; and in response to the exception, delivering pending traps or interrupts to an exception handler prior to delivering the exception. | 11-20-2014 |
20140365742 | SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED STACK PIVOTING - An example processing system may comprise: a lower stack bound register configured to store a first memory address, the first memory address identifying a lower bound of a memory addressable via a stack segment; an upper stack bound register configured to store a second memory address, the second memory address identifying an upper bound of the memory addressable via the stack segment; and a stack bounds checking logic configured to detect unauthorized stack pivoting, by comparing a memory address being accessed via the stack segment with at least one of the first memory address and the second memory address. | 12-11-2014 |
20140372987 | Processor That Records Tracing Data In Non Contiguous System Memory Slices - A method is described that involves referring to first information from a directory table in system memory. The first information includes location information and size information of a first slice of system memory where first tracing data is to be stored. The method also includes tracking the amount of tracing data stored in the first slice of system memory and comparing the amount against the size information. The method also includes, before the first slice of system memory is filled, referring to second information from the directory table in system memory, where, the second information includes location information and size information of a second slice of system memory where second tracing data is to be stored. The first slice is not contiguous with the second slice of system memory. | 12-18-2014 |
20140380027 | ELAPSED CYCLE TIMER IN LAST BRANCH RECORDS - A processing device implementing an elapsed cycle timer in last branch records (LBRs) is disclosed. A processing device of the disclosure includes a last branch record (LBR) counter to iterate with each cycle of the processing device and an LBR structure communicably coupled to the LBR counter. The LBR structure comprises a plurality of LBR entries. Furthermore, an LBR entry of the plurality of LBR entries comprises an address instruction pointer (IP) of a branch instruction executed by the processing device, an address IP of a target of the branch instruction, and an elapsed time field that stores a value of the LBR counter when the LBR entry is created. | 12-25-2014 |
20150055778 | METHOD AND APPARATUS FOR A NON-DETERMINISTIC RANDOM BIT GENERATOR (NRBG) - A hardware-based digital random number generator is provided. In one embodiment, a processor includes a digital random number generator (DRNG) to condition entropy data provided by an entropy source, to generate a plurality of deterministic random bit (DRB) strings, and to generate a plurality of nondeterministic random bit (NRB) strings, and an execution unit coupled to the DRNG, in response to a first instruction to read a seed value, to retrieve one of the NRB strings from the DRNG and to store the NRB string in a destination register specified by the first instruction. | 02-26-2015 |
20150095614 | APPARATUS AND METHOD FOR EFFICIENT MIGRATION OF ARCHITECTURAL STATE BETWEEN PROCESSOR CORES - An apparatus and method are described for the efficient migration of architectural state between processor cores. For example, a processor according to one embodiment comprises: a first processing core having a first instruction execution pipeline including first register set for storing a first architectural state of a first thread being executed thereon; a second processing core having a second instruction execution pipeline including a second register set for storing a second architectural state of a second thread being executed thereon; and architectural state migration logic to perform a direct, simultaneous swap of the first architectural state from the first register set with the second architectural state from the second register set responsive to detecting that the execution of the first thread is to be migrated from the first core to the second core. | 04-02-2015 |
20150113199 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 04-23-2015 |
20150113200 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 04-23-2015 |
20150161408 | Protecting Information Processing System Secrets From Debug Attacks - Embodiments of an invention for protecting information processing system secrets from debug attacks are disclosed. In one embodiment, a processor includes storage, a debug unit, and a test access port. The debug unit is to receive a policy from a debug aggregator. The policy is based on a value of a first fuse and has a production mode corresponding to a production value of the first fuse and a debug mode corresponding to a debug value of the fuse. The test access port is to provide access to the storage using a debug command in the debug mode and to prevent access to the storage using the debug command in the production mode. | 06-11-2015 |
20150199198 | SUPERVISOR MODE EXECUTION PROTECTION - Apparatuses and methods for supervisor mode execution protection are disclosed. In one embodiment, a processor includes an interface to access a memory, execution hardware, and control logic. A region in the memory is user memory. The execution hardware is to execute an instruction. The control logic is to prevent the execution hardware from executing the instruction when the instruction is stored in user memory and the processor is in supervisor mode. | 07-16-2015 |
20150227470 | MAINTAINING PROCESSOR RESOURCES DURING ARCHITECTURAL EVENTS - In one embodiment of the present invention, a method includes switching between a first address space and a second address space, determining if the second address space exists in a list of address spaces; and maintaining entries of the first address space in a translation buffer after the switching. In such manner, overhead associated with such a context switch may be reduced. | 08-13-2015 |
20150347267 | Monitoring Performance of a Processing Device to Manage Non-Precise Events - In accordance with embodiments disclosed herein, there is provided systems and methods for monitoring performance of a processing device to manage non-precise events. A processing device includes a performance counter to increment upon occurrence of a non-precise event in the processing device. The processing device also includes a precise event based sampling (PEBS) enable control communicably coupled to the performance counter. The processing device also includes a PEBS handler to generate and store a PEBS record including an architectural metadata defining a state of the processing device at a time of generation of the PEBS record. The processing device further includes a non-precise event based sampling (NPEBS) module communicably coupled to the PEBS control and the PEBS handler. The NPEBS module causes the PEBS handler to generate the PEBS record for the non-precise event upon overflow of the performance counter. | 12-03-2015 |
20150381358 | SYSTEMS AND METHODS FOR PROTECTING SYMMETRIC ENCRYPTION KEYS - Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key. | 12-31-2015 |
20160110542 | Attack Protection For Valid Gadget Control Transfers - In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a second bound value for the stack; a checker logic to determine, prior to an exit point at a conclusion of a function to be executed on the processor, whether a value of a stack pointer is within a range between the first bound value and the second bound value; and a logic to prevent a return to a caller of the function if the stack pointer value is not within the range. Other embodiments are described and claimed. | 04-21-2016 |
Patent application number | Description | Published |
20080261514 | SYSTEM AND APPARATUS FOR SUPPLYING MEDIA CONTENT TO PORTABLE COMMUNICATION DEVICES - A system and apparatus for supplying media content to portable communication devices is disclosed. An apparatus that incorporates teachings of the present disclosure can include, for example, a Set-Top Box (STB) having a cellular transceiver and a controller element to direct the cellular transceiver to transmit a media guide for the STB to a terminal device for presentation on a display unit of the terminal device. Additional embodiments are disclosed. | 10-23-2008 |
20090089856 | AURAL INDICATION OF REMOTE CONTROL COMMANDS - A disclosed set top box or other multimedia receiver suitable for use in a multimedia distribution network includes a remote control interface operable to receive a signal from a remote control device and extract a remote control command from the signal, a processor coupled to the remote control interface and operable to detect the remote control command, and a machine readable storage resource containing computer executable instructions operable to: invoke an aural indication application that returns an audio stream suitable for processing by an audio output device, wherein the audio stream, when processed by the audio output device, causes the audio output device to produce an audibly detectable signal indicative of a function corresponding to the remote control command. The application may generate the audio stream by invoking a speech synthesis module or by retrieving an audio file. The application may retrieve electronic programming guide (EPG) data associated with a remote control command and incorporate at least some of the EPG data in the audibly detectable output. | 04-02-2009 |
20090222868 | SERVICE FOR PROVIDING SHARED MULTIMEDIA CONTENT - A multimedia content delivery resource suitable for supporting a video on demand service to a plurality of users substantially simultaneously. The multimedia content delivery resource includes a reception interface for receiving a video content item selection signal associated with a primary subscriber; and a subscriber selection signal indicative of a secondary subscriber associated with the primary subscriber; a shared video module operable to identify a selected video content item associated with the video content item selection signal and define recipients of the identified video content item based at least in part on the subscriber selection signal; and a transmission interface operable to transmit the identified video content item substantially simultaneously to the defined recipients. | 09-03-2009 |
20100015999 | SYSTEM AND METHOD FOR SHARING LOCATION INFORMATION - A system that incorporates teachings of the present disclosure may include, for example, a portable communication device having a controller to request location information from one or more non-portable wireless access points, receive one or more location coordinates from the one or more non-portable wireless access points, determine which of the one or more non-portable wireless access points is closest to the portable communication device according to one or more wireless signals generated by the one or more non-portable wireless access points, and record the location coordinate supplied by the closest non-portable wireless access point. Each of the one or more non-portable wireless access points can determine its location coordinate with a location receiver. Other embodiments are disclosed. | 01-21-2010 |
20100090964 | AUGMENTED I/O FOR LIMITED FORM FACTOR USER-INTERFACES - The claimed subject matter relates to an architecture that can enhance and/or simplify tactile-based I/O transactions in connection with a user-interface (UI) of limited form factor. In particular, the architecture can monitor a position of a selector object such as an operator's finger relative to a UI display as the selector object hovers or moves above the UI display. Based upon this position, an analogous coordinate in the UI display can be determined, and a portion of the UI display substantially centered at the coordinate can be modified. As one example, the UI display can be modified to increase the magnification scale (e.g., a virtual magnifying glass) of the portion of the display indicated by the selector object. | 04-15-2010 |
20100103139 | TRACKING APPROACHING OR HOVERING OBJECTS FOR USER-INTERFACES - The claimed subject matter relates to an architecture that can utilize photo-sensors embedded in a substantially transparent layer of a UI display for tracking objects that approach or hover over the UI display. The photo-sensors can be configured to detect light of certain wavelengths (e.g., visible light, infrared light) that are propagated toward the UI display, while ignoring light emanating from the UI display when displaying content. Accordingly, by examining various characteristics of the incoming light such as intensity, the architecture can identify a location of a shadow incident upon the display caused by an approaching or hovering selector object blocking portions of incoming light. Additionally or alternatively, the architecture can identify a location of higher intensity for light emanating from the selector object. | 04-29-2010 |
20100106769 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT DELIVERY FOR MULTIPLE COMMUNICATION DEVICES - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to monitor for a first adjustment made by a first communication device associated with a user where the first communication device is capable of presenting media content and where the first adjustment is associated with the presentation of the media content, determine a second adjustment to be made to a second communication device associated with the user where the determination is based at least in part on the monitored first adjustment where the second adjustment is associated with the presentation of the media content, and wirelessly communicate adjustment information to the second communication device that is representative of the second adjustment, where the adjustment information is adapted for allowing the second communication device to perform the second adjustment. Other embodiments are disclosed. | 04-29-2010 |
20120268409 | AUGMENTED I/O FOR LIMITED FORM FACTOR USER-INTERFACES - The claimed subject matter relates to an architecture that can enhance and/or simplify tactile-based I/O transactions in connection with a user-interface (UI) of limited form factor. In particular, the architecture can monitor a position of a selector object such as an operator's finger relative to a UI display as the selector object hovers or moves above the UI display. Based upon this position, an analogous coordinate in the UI display can be determined, and a portion of the UI display substantially centered at the coordinate can be modified. As one example, the UI display can be modified to increase the magnification scale (e.g., a virtual magnifying glass) of the portion of the display indicated by the selector object. | 10-25-2012 |
20120287086 | TRACKING APPROACHING OR HOVERING OBJECTS FOR USER INTERFACES - The claimed subject matter relates to an architecture that can utilize photo-sensors embedded in a substantially transparent layer of a UI display for tracking objects that approach or hover over the UI display. The photo-sensors can be configured to detect light of certain wavelengths (e.g., visible light, infrared light) that are propagated toward the UI display, while ignoring light emanating from the UI display when displaying content. Accordingly, by examining various characteristics of the incoming light such as intensity, the architecture can identify a location of a shadow incident upon the display caused by an approaching or hovering selector object blocking portions of incoming light. Additionally or alternatively, the architecture can identify a location of higher intensity for light emanating from the selector object. | 11-15-2012 |
20130263204 | AURAL INDICATION OF REMOTE CONTROL COMMANDS - A disclosed set top box or other multimedia receiver suitable for use in a multimedia distribution network includes a remote control interface operable to receive a signal from a remote control device and extract a remote control command from the signal, a processor coupled to the remote control interface and operable to detect the remote control command, and a machine readable storage resource containing computer executable instructions operable to: invoke an aural indication application that returns an audio stream suitable for processing by an audio output device, wherein the audio stream, when processed by the audio output device, causes the audio output device to produce an audibly detectable signal indicative of a function corresponding to the remote control command. The application may generate the audio stream by invoking a speech synthesis module or by retrieving an audio file. The application may retrieve electronic programming guide (EPG) data associated with a remote control command and incorporate at least some of the EPG data in the audibly detectable output. | 10-03-2013 |
20140049517 | TRACKING APPROACHING OR HOVERING OBJECTS FOR USER-INTERFACES - An architecture is described that can utilize photo-sensors embedded in a substantially transparent layer of a UI display for tracking objects that approach or hover over the UI display. The photo-sensors can be configured to detect light of certain wavelengths (e.g., visible light, infrared light) that are propagated toward the UI display, while ignoring light emanating from the UI display when displaying content. Accordingly, by examining various characteristics of the incoming light such as intensity, the architecture can identify a location of a shadow incident upon the display caused by an approaching or hovering selector object blocking portions of incoming light. Additionally or alternatively, the architecture can identify a location of higher intensity for light emanating from the selector object. | 02-20-2014 |
20140080516 | System and Method for Sharing Location Information - In a particular embodiment, a method includes requesting, at a first communication device, location information from multiple communication devices. The method also includes recording, at the first communication device, a particular location coordinate received from a closest communication device of the multiple communication devices. The method further includes adjusting the particular location coordinate based on triangulation data associated with the closest communication device. | 03-20-2014 |
20140189556 | AUGMENTED I/O FOR LIMITED FORM FACTOR USER-INTERFACES - The claimed subject matter relates to an architecture that can enhance and/or simplify tactile-based I/O transactions in connection with a user-interface (UI) of limited form factor. In particular, the architecture can monitor a position of a selector object such as an operator's finger relative to a UI display as the selector object hovers or moves above the UI display. Based upon this position, an analogous coordinate in the UI display can be determined, and a portion of the UI display substantially centered at the coordinate can be modified. As one example, the UI display can be modified to increase the magnification scale (e.g., a virtual magnifying glass) of the portion of the display indicated by the selector object. | 07-03-2014 |
20150160753 | TRACKING APPROACHING OR HOVERING OBJECTS FOR USER-INTERFACES - An architecture is described that can utilize photo-sensors embedded in a substantially transparent layer of a UI display for tracking objects that approach or hover over the UI display. The photo-sensors can be configured to detect light of certain wavelengths (e.g., visible light, infrared light) that are propagated toward the UI display, while ignoring light emanating from the UI display when displaying content. Accordingly, by examining various characteristics of the incoming light such as intensity, the architecture can identify a location of a shadow incident upon the display caused by an approaching or hovering selector object blocking portions of incoming light. Additionally or alternatively, the architecture can identify a location of higher intensity for light emanating from the selector object. | 06-11-2015 |
20150309708 | AUGMENTED I/O FOR LIMITED FORM FACTOR USER-INTERFACES - An architecture is described that can enhance and/or simplify tactile-based I/O transactions in connection with a user-interface (UI) of limited form factor. In particular, the architecture can monitor a position of a selector object such as an operator's finger relative to a UI display as the selector object hovers or moves above the UI display. Based upon this position, an analogous coordinate in the UI display can be determined, and a portion of the UI display substantially centered at the coordinate can be modified. As one example, the UI display can be modified to increase the magnification scale (e.g., a virtual magnifying glass) of the portion of the display indicated by the selector object. | 10-29-2015 |
20160050538 | SYSTEM AND METHOD FOR SHARING LOCATION INFORMATION - A method includes receiving, at a first communication device, signals from communication devices. Each signal of the signals includes information associated with a particular communication device of the communication devices. The information includes location coordinates of a corresponding communication device of the communication devices. The method includes determining, at the first communication device, a characteristic associated with each signal of the signals. The method also includes determining, at the first communication device, estimated location coordinates of the first communication device based on the location coordinates and based on characteristics associated with the signals. | 02-18-2016 |
Patent application number | Description | Published |
20090044233 | System and Methods for Digital Video Recorder Backup and Recovery - A method of backing up a video data file, comprising receiving a user input identifying a video signal. The method further includes recording the video signal to the video data file and sending an instruction to a backup server. The instruction causes the backup server to concurrently record the video signal to a second video data file. | 02-12-2009 |
20100080373 | Voice Over IP Method Of Determining Caller Identification - Before completing a call initiated at a calling telephony device for a called telephony device; caller identification information for the calling telephony device is obtained for the call. If standard caller identification information is not available, the caller is prompted to provide spoken caller identification information. The caller identification information is communicated to the called telephony device via a connectionless protocol such as VoIP where a continuing connection does not exist between communicating end points. The called party is given call disposition options. The process which controls this operation may be located anywhere in the network, including at switching equipment and at the called telephony device. | 04-01-2010 |
20100266109 | METHODS AND APPARATUS TO PROVIDE A TELEPHONE SYSTEM CONFIGURATION INTERFACE - Methods and apparatus for a telephone customer to configure telephone service for multiple users at a single location associated with the customer. The location has at least two telephones, at least two phone numbers and a voice mail box. The telephone customer is visually provided an option to assign one of the phone numbers to one of the telephones. The telephone customer is visually provided an option to assign each of the multiple users exclusive access to at least one of the telephone numbers via their account identifier. The telephone customer is visually provided the option to, for each of the multiple users, allow access or deny access via their account identifier to the voicemail box. | 10-21-2010 |
20110274255 | System and Method of Audible Caller Identification Via a Multimedia Device - A method is disclosed that receives an incoming call at an electronic device, where the incoming call includes caller identification information. Further, the method determines whether a personal address book stored remotely from the electronic device includes an entry associated with the caller identification information. Additionally, an audio alert associated with the entry is inserted into a multimedia data stream, where the audio alert is determined based at least in part on the entry. | 11-10-2011 |
20120011554 | SYSTEM AND METHOD OF PROVIDING VOICE COMMUNICATION - A method includes receiving, at a device, a request to initiate a call with respect to a contact and a communication device associated with a caller. In a particular embodiment, the method may further include initiating presentation, at a display device, of a selectable call placement indicator to initiate the request. In another particular embodiment, the method may further include sending display data to the display device, where the display data indicates that the call has been placed to the contact. | 01-12-2012 |
20120072963 | SYSTEM AND METHOD OF MESSAGE NOTIFICATION AND ACCESS VIA A VIDEO DISTRIBUTION NETWORK - A method includes receiving, via an internet protocol television network, a broadcast signal comprising video content at a device. The device is associated with a person. The method includes receiving, via the internet protocol television network, a message notification directed to a communication address associated with the person. The message notification includes a visual indication based at least in part on the communication address. The method also includes sending a display signal to a display device. The display signal includes the broadcast signal and the visual indication. | 03-22-2012 |
20130010944 | INCOMING AND OUTGOING CALL CONTROL CUSTOMIZATION - Customer communications can be controlled in accordance with customized rules. An entry menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule. | 01-10-2013 |
20130074116 | System and Method of Message Notification and Access via a Video Distribution Network - A method includes receiving video content via an access network of a video distribution network at a set-top box device associated with a subscriber. One or more communication devices are associated with the subscriber. The method includes sending the video content to a display device coupled to the set-top box device. The method includes receiving a notification of a message directed to a particular communication device of the one or more communication devices at the set-top box via the access network. The method includes selecting a message indicator based on configuration settings associated with the subscriber. The method also includes sending the message indicator to the display device to overlay a portion of the video content. | 03-21-2013 |
20130155908 | METHODS AND APPARATUS TO PROVIDE A TELEPHONE SYSTEM CONFIGURATION INTERFACE - Methods and apparatus for a telephone customer to configure telephone service for multiple users at a single location associated with the customer. The location has at least two telephones, at least two phone numbers and a voice mail box. The telephone customer is visually provided an option to assign one of the phone numbers to one of the telephones. The telephone customer is visually provided an option to assign each of the multiple users exclusive access to at least one of the telephone numbers via their account identifier. The telephone customer is visually provided the option to, for each of the multiple users, allow access or deny access via their account identifier to the voicemail box. | 06-20-2013 |
20130188788 | INCOMING AND OUTGOING CALL CONTROL CUSTOMIZATION - Customer communications can be controlled in accordance with customized rules. An initial menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule. | 07-25-2013 |
20130215883 | System and Method of Presenting Caller Identification Information at a Voice Over Internet Protocol Communication Device - A method includes receiving a call from communication device associated with a caller. The call is directed to a second communication device associated with a callee. The method includes determining whether a caller profile associated with the caller is available. The method includes searching at least two networks in response to determining that the caller profile is not available. The method includes creating the caller profile based on the search of the at least two networks and populating a caller identification portal with at least one of a plurality identification characteristics included in the caller profile. | 08-22-2013 |
20140380383 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT DELIVERY FOR MULTIPLE COMMUNICATION DEVICES - A system incorporating teachings of the present disclosure may include, for example, a server having a controller to monitor for a first adjustment made by a first communication device associated with a user where the first communication device is capable of presenting media content and where the first adjustment is associated with the presentation of the media content, determine a second adjustment to be made to a second communication device associated with the user where the determination is based at least in part on the monitored first adjustment where the second adjustment is associated with the presentation of the media content and where the second communication device is a battery-operated mobile device, and wirelessly communicate adjustment information to the second communication device that is representative of the second adjustment, where the adjustment information is adapted for allowing the second communication device to perform the second adjustment. Other embodiments are disclosed. | 12-25-2014 |
Patent application number | Description | Published |
20080228736 | SYSTEM AND METHOD FOR CREATING AND ACCESSING OUTGOING TELEPHONE CALL LOG - Access is provided to network connection data for a user terminal. A query based on a request from a communications device to access the network connection data is received over a first network. The network connection data corresponding to the request is retrieved from a database based on the query. The database is populated with the network connection data and interfaces with a second network over which network connections are established with the user terminal. The network connection data retrieved from the database is forwarded for display at the communications device. | 09-18-2008 |
20090073321 | SYSTEM AND METHOD OF DISPLAYING A VIDEO STREAM - The present disclosure is generally directed to a video stream processing system and to a system and method of displaying a video stream. In a particular embodiment, the method includes receiving a video stream to be displayed on a display device. During a first time period, a low resolution version of the video stream is displayed while a full resolution version of the video stream is being recovered. The method further includes synchronizing the low resolution version of the video stream with the full resolution version of the video stream, and, during a second time period after the first time period, switching between display of the low resolution version of the video stream to display of the full resolution version of the video stream. | 03-19-2009 |
20090180596 | System and method for broadcasting packetized voice messages - A system and method are disclosed for broadcasting Voice over Internet Protocol (VoIP) messages. A method incorporating teachings of the present disclosure may include receiving an indication that a message should be delivered to a plurality of recipients. In response, contact information for the plurality of recipients may be identified, and an outbound packetized call to each of the recipients may be launched. In practice, the packetized call may be in a VoIP form or some other appropriate packetized form. If a call is answered, the call may be connected to a multicast server capable of playing the to-be-delivered message. | 07-16-2009 |
20100020957 | System and Method for Facilitating a Custom Ring in Connection with a Call - A system and method are disclosed for facilitating a custom ring in connection with a call. A ring tone delivery system may include an interface operable to receive a calling signal that indicates a request to place a call from a calling party to a communication device of a called party. The system may also include a network node communicatively coupled to the interface. The network node may be operable to determine whether the calling party is able to use a calling party selected ring tone. The network node may also be operable to determine whether the communication device will accept the calling party selected ring tone. The network node sends the calling party selected ring tone to the communication device when the calling party is able to use the calling party selected ring tone and when the communication device will accept the calling party selected ring tone. | 01-28-2010 |
20120300918 | System and Method for Facilitating a Custom Ring in Connection with a Call - A system and method are disclosed for providing a custom ring tone in connection with a call. In a particular embodiment, a method includes receiving, at a communication system, an indication to provide a customized ring tone associated with a call to a callee device. The method further includes delivering at least a portion of the customized ring tone to the callee device from the communication system when the callee device is determined to be operable to output the customized ring tone. | 11-29-2012 |
20130028402 | System and Method for Broadcasting Packetized Voice Messages - A particular method includes initiating outbound calls associated with at least two recipients that are to receive a notification message. The outbound calls include a first call to a first telephone address associated with a first recipient of the at least two recipients. The method further includes, in response to a determination that the first call is unanswered, initiating a second call to a second telephone address associated with the first recipient and initiating generation of an email message to an electronic mail address associated with the first recipient. | 01-31-2013 |
20130148023 | System and Method of Displaying a Video Stream - A particular method includes receiving a video stream to be displayed on a display device. The method also includes, during a first time period, sending a low resolution version of the video stream to the display device while recovering a full resolution version of the video stream. The method further includes synchronizing the low resolution version of the video stream with the full resolution version of the video stream. The method also includes, during a second time period after the first time period, switching from sending the low resolution version of the video stream to the display device to sending the full resolution version of the video stream to the display device. | 06-13-2013 |
20130205351 | Device, System, and Method for Managing Television Tuners - A method at a first set top box includes transmitting to a second set top box a request to use a television tuner associated with the second set top box. The method further includes receiving a return recording option from the second set top box. The method also includes generating an indication of a rejection of the request from the second set top box based on the received return recording option. The indication includes a graphical message specifying the rejection of the request. | 08-08-2013 |
20130235996 | METHODS AND APPARATUS TO DETERMINE WHEN TO DEFLECT CALLERS TO WEBSITES - Methods and apparatus to determine when to deflect callers to websites are disclosed. Example methods disclosed herein to deflect a caller to a webpage include receiving a call from the caller, determining a performance metric associated with processing the call, and determining whether to offer the caller an option to terminate the call and access the webpage based on the performance metric. | 09-12-2013 |
20130236001 | METHODS AND APPARATUS TO PROVIDE INCENTIVES TO DEFLECT CALLERS TO WEBSITES - Methods and apparatus to provide incentives to deflect callers to websites are disclosed. Example methods disclosed herein to deflect a caller to a webpage include receiving a call from the caller, offering an incentive to the caller to terminate the call and access the webpage, and providing an address of the webpage to the caller after the caller consents to terminate the call. | 09-12-2013 |
20150017957 | DISTINCTIVE RING TONES PROMPTED BY CALL URGENCY AND CONTEXT - A method includes receiving, at an application server, information related to a call from a calling device to a called device. The method further includes determining, at the application server, a designation of the calling device. The method further includes sending a prompt to the calling device from the application server. The prompt is a request for information related to urgency of the call, where the prompt corresponds to a first prompt when the designation is a first designation and the prompt corresponds to a second prompt when the designation is a second designation. The method further includes receiving a response to the prompt at the application server and modifying a call setup message based on the response. | 01-15-2015 |
20160080564 | DISTINCTIVE RING TONES PROMPTED BY CALL URGENCY AND CONTEXT - A method includes receiving, at a destination communication device, information related to a communication from a source communication device. The method further includes determining, at the destination communication device, a designation of the source communication device based on the information. The method further includes selecting, based on the designation, a prompt from multiple prompts. The method further includes sending the prompt from the destination communication device to the source communication device. The prompt is a request for second information related to urgency of the call. | 03-17-2016 |