Patent application number | Description | Published |
20080244168 | METHOD AND APPARATUS FOR A PRIMARY OPERATING SYSTEM AND AN APPLIANCE OPERATING SYSTEM - One embodiment includes a personal computer device comprising at least one machine to execute a primary user operating system, a first physical memory to be used by the primary user operating system, at least one appliance operating system that is independent from the primary user operating system, a second physical memory to be sequestered from the primary user operating system and an access violation monitor to restrict access from the at least one appliance operating system to the second physical memory, wherein the access violation monitor is to run only when the at least one appliance operating system is invoked and at least one appliance operating system is to be invoked only after the primary user operating system has been suspended to a standby state. | 10-02-2008 |
20080313489 | FLASH MEMORY-HOSTED LOCAL AND REMOTE OUT-OF-SERVICE PLATFORM MANAGEABILITY - A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present. | 12-18-2008 |
20090006848 | Secure credential management - Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store authentication data and an authentication supplicant (AS) logic to provide a response to an authentication communication (ACM) received from an authentication process. An authentication management (AM) logic may receive the ACM from a connection management (CM) logic associated with a host operating system (HOS), provide the ACM to the AS logic, and provide the response back to the CM logic. The apparatus may include a device management (DM) client logic to provide a secure connection to an operator DM server associated with the authentication process and to store authentication data provided by the operator DM server in the data store. The AS logic, AM logic, and DM logic may reside in firmware that is not accessible to the HOS. | 01-01-2009 |
20090089588 | METHOD AND APPARATUS FOR PROVIDING ANTI-THEFT SOLUTIONS TO A COMPUTING SYSTEM - A manageability engine (ME) may be used to authenticate a user for a computer system. A data collection module may be coupled to the ME to collect data (e.g., fingerprint image, facial images, speech, etc.) from a user. The ME processes the collected data to authenticate the user. If the authentication is successful, the system may boot, resume from a sleep state, or become re-accessible by the user; otherwise, the user is prevented from using the system or accessing data stored therein. | 04-02-2009 |
20110246698 | METHOD AND APPARATUS FOR A PRIMARY OPERATING SYSTEM AND AN APPLIANCE OPERATING SYSTEM - One embodiment includes a personal computer device comprising at least one machine configured to execute a primary user operating system and at least one appliance operating system independent from the primary user operating system. The personal computer device also including a system memory including a first portion of the system memory configured to be used by the primary user operating system; and a second portion of the system memory configured to be sequestered from the primary user operating system. The personal computer device further including an access violation monitor configured to restrict access from the at least one appliance operating system to the second portion of the system memory | 10-06-2011 |
20140201568 | Flash Memory-Hosted Local and Remote Out-of-Service Platform Manageability - A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present. | 07-17-2014 |
Patent application number | Description | Published |
20140171018 | RADIO SPECTRUM TRADING - Radio spectrum trading involves determining available radio spectrum and requestors desiring to lease portions of the available radio spectrum, and for allocating the available spectrum to the requestors. A pricing curve may be set based on historical information and/or requests to lease spectrum. A determination may then be made as to whether an amount of available spectrum is less than or greater than an amount spectrum being requested. If it is determined that the amount of available spectrum is less than the amount of spectrum being requested, then an auction may be conducted for the available spectrum with the initial bid being set based on the pricing curve. If the amount of available spectrum is greater than the amount of spectrum being requested, then the requests may be sorted based on predicted revenue generation and the available spectrum may be allocated in order from highest to lowest revenue generated. | 06-19-2014 |
20140171136 | CLOUD SPECTRUM MANAGEMENT SYSTEM - This disclosure is directed to a cloud spectrum management system. In general, an example cloud spectrum management system may match requests from spectrum requestors seeking available radio spectrum with spectrum owners desiring to lease available radio spectrum to determine radio spectrum trade transactions. An example system may include a market communication module to communicate with a market place for trading a spectrum of radio frequencies for use in wireless communication, a core service s module to determine radio spectrum trade transactions based at least on the communications between the market communication module and the market, and a management utilities module configured to manage the radio spectrum trade transactions determined by the core services module. | 06-19-2014 |
20140203909 | METHODS AND APPARATUS FOR PROVIDING ASSISTANCE SERVICES FOR LARGE CROWDS - In one example embodiment, a mobile computing device provides assistance services for visitors at events which involve large crowds and long distances. The mobile computing device may be used to read a unique identifier for a visitor from an identification token for the visitor. The mobile computing device may then send visitor location data for the current location of the visitor to a remote command center. The mobile computing device may then receive leader location data from the remote command center. The leader location data may identify a last known location for a leader of a group of visitors that includes the visitor. After receiving the leader location data, the mobile computing device may compute directions from the current location of the visitor to the last known location of the leader, and the mobile computing device may display those directions on a map. Other embodiments are described and claimed. | 07-24-2014 |
20140315567 | SYSTEMS AND METHODS FOR INTERFERENCE MITIGATION IN HETEROGENEOUS NETWORKS - Disclosed systems and methods mitigate interference in heterogeneous networks. Embodiments include adaptive or selective inter-cell interference coordination, adaptive multi-user zero forcing, adaptive power, and/or combinations of the foregoing. Techniques may be used to favor one group of users (e.g., femto users or macro users) over another. Certain embodiments focus quality of service (QoS) improvements on a first group of users, while using constraint processes to provide a threshold QoS for a second group of users. | 10-23-2014 |
20150281303 | ADAPTIVE MEDIA STREAMING - Technology for performing dynamic adaptive streaming over hypertext transfer protocol (DASH) is described. A planned route may be selected for a mobile device. Wireless channel information may be received for the planned route from a channel information database (CID). Geographical locations along the planned route where wireless network channel conditions are below a defined threshold may be determined based on the wireless channel information. Additional segments of a media file may be requested from a media server prior to entering the determined locations along the planned route. | 10-01-2015 |
20150282227 | WEARABLE COMPUTING SYSTEM - Technology for implementing one or more wearable usage scenario applications is disclosed. One or more types of input data may be received from a wearable wireless input node at a wearable wireless processing node. The one or more wearable usage scenario applications may be executed at the wearable wireless processing node using the input data received from the wearable wireless input node. One or more types of physical output may be provided from the wearable wireless processing node to a wearable wireless output node based on the one or more wearable usage scenario applications executed at the wearable wireless processing node using the one or more types of input data. | 10-01-2015 |
20150304852 | SPECTRUM RECLAIMING IN A LEASED SPECTRUM SYSTEM - This disclosure is directed to spectrum reclaiming in a leased spectrum system. A spectrum exchange coordinator (SEC) may be interposed between a spectrum owner and at least one operator to facilitate the leasing and reclaiming of spectrum. Upon occurrence of a trigger, the SEC may then determine a procedure for allowing the spectrum owner to reclaim the leased spectrum. The spectrum owner may be allowed to reclaim the leased spectrum in full based on an agreement. If not previously agreed to, the spectrum owner may be allowed to reclaim at least part of the spectrum. These operations may include a dual risk evaluation to determine how reclaiming the leased spectrum will affect quality of service (QoS). Partial or gradual reclaiming may then allow the leased spectrum to be reclaimed while minimizing impact. Examples of gradual reclaiming may be based on a time domain, frequency domain, or cellular basis. | 10-22-2015 |