Patent application number | Description | Published |
20100017704 | DYNAMIC CONTENT LAYOUT - Metrics for evaluating content layout performance are provided which enable the dynamic generation of content layouts optimized for particular target audiences, types of content, and/or delivery channels. | 01-21-2010 |
20100115392 | Method and System for Building Data Objects for Online Display Advertising - A method and system are provided for building data objects for online display advertising. In one example, the method includes providing two or more forms configured for receiving data objects for an ad campaign, wherein the two or more forms sufficiently compartmentalize the ad campaign in order to facilitate entry of the data objects, providing a navigation interface configured for facilitating navigation among the two or more forms, receiving the data objects into the two or more forms, and receiving at least one request into the navigation interface. | 05-06-2010 |
20110173063 | ADVERTISER VALUE-BASED BID MANAGEMENT IN ONLINE ADVERTISING - The present invention provides methods and systems for use in online advertising campaign management, including bid management in an online advertising auction. Techniques are provided in which a benchmark set of previously served advertisements is identified, and associated performance information is obtained. During an online auction, when an advertisement impression opportunity becomes available, information obtained using a machine learning technique may be utilized in forecasting an advertiser value-based metric associated with the opportunity, using the benchmark set of advertisements and the associated performance. The forecasted advertiser value-based metric can be used in determining bidding and pricing associated with the opportunity. | 07-14-2011 |
20120022937 | ADVERTISEMENT BRAND ENGAGEMENT VALUE - The present invention provides techniques associated with online advertisement brand engagement value, which can be of critical importance to brand advertisers. Techniques are also included involving use of brand engagement value across various online and offline advertising media and venues. Techniques are provided in which experiments are conducted, such as eyeball-tracking experiments, which include measurements to determine brand engagement value of particular online advertisement impressions. Information from the experiments is utilized in making determinations of brand engagement value, or anticipated brand engagement value, of online advertisement impressions for which brand engagement value has not been measured. | 01-26-2012 |
Patent application number | Description | Published |
20080279349 | MEDIA WITH EMBEDDED NETWORK SERVICES - A system and method for providing network services to a user of a computer capable of displaying Internet based media, such as sequential media, played by a media player in a display. The method includes the steps of providing a media object, wherein the media object contains sequential media and network services information encapsulated within the media object. Encapsulating the sequential media and network services information within the media object prevents rogue users from simply stripping away the sequential media from the network services information. | 11-13-2008 |
20080281685 | MEDIA WITH EMBEDDED ADVERTISING - A system and method for providing advertising to a user of a computer capable of displaying Internet based media, such as sequential media, played by a media player in a display. The method includes the steps of providing a media object, wherein the media object contains sequential media and advertising information encapsulated within the media object. Encapsulating the sequential media and advertising information within the media object prevents rogue users from simply stripping away the sequential media from the advertising information. | 11-13-2008 |
20090029720 | SYSTEM AND METHOD FOR PROVIDING ELECTRONIC ADVERTISEMENTS - A system for displaying electronic advertisements on a display device includes a processor having a set of instructions, a display device in communication with the processor and a network interface in communication with the processor. The processor is configured by the set of instructions to receive an initial advertisement from a central server via the network interface, display an initial advertisement and a first navigational element on the display device, receive a subsequent advertisement from the central server based on a user's interaction with the initial advertisement, and display the subsequent advertisement on the display device when the first navigational element is selected by the user. | 01-29-2009 |
20090132633 | DYNAMIC CONTENT PIPELINE - A system for providing information via a dynamic content pipeline includes a processor having instructions and a network interface in communication with the processor. The instructions configure the processor to display a media element on a display device of a computer, display a dispatcher link on the display device of the computer and display a dispatcher window on the display device of the computer when the dispatcher link is selected. The dispatcher window has a destination input area configured to receive a destination identifier which provides the location of a destination device. Finally, the instructions configure the processor to provide the media element to the dynamic content pipeline for additional processing and deliver the media element to the destination device. | 05-21-2009 |
20090157500 | ADVANCED ADVERTISEMENTS - A system and method for configuring a media player to display advertising to a user includes a computer having a processor and a memory unit containing instructions, a display in communication with the processor of the computer for displaying a media asset via the media player, and a network interface in communication with the processor. The instructions configure the processor to suspend the displaying of a media asset by the media player during certain periods and display a pre roll advertisement or a rich media advertisement in at least a portion of the display utilized by the media player. | 06-18-2009 |
Patent application number | Description | Published |
20100091982 | DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING - Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack. | 04-15-2010 |
20110138192 | Verifiable, Leak-Resistant Encryption and Decryption - This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described. | 06-09-2011 |
20110255690 | REPROGRAMMABLE SECURITY FOR CONTROLLING PIRACY AND ENABLING INTERACTIVE CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities. | 10-20-2011 |
20110264923 | SELF-PROTECTING DIGITAL CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities. | 10-27-2011 |
20130173928 | CRYPTOGRAPHIC DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. | 07-04-2013 |
20140247944 | CRYPTOGRAPHIC DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. | 09-04-2014 |
20140281573 | ASYMMETRICALLY MASKED MULTIPLICATION - Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation. | 09-18-2014 |
20150052368 | DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING - Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack. | 02-19-2015 |
20150280907 | DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A device includes storage hardware to store a secret value and processing hardware coupled to the storage hardware. The processing hardware is to receive an encrypted data segment with a validator and derive a decryption key using the secret value and a plurality of entropy distribution operations. The processing hardware is further to verify, using the received validator, that the encrypted data segment has not been modified. The processing hardware is further to decrypt the encrypted data segment using the decryption key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 10-01-2015 |
20150288524 | METHODS AND SYSTEMS FOR GLITCH-RESISTANT CRYPTOGRAPHIC SIGNING - Methods and devices disclosed herein use techniques to resist glitch attacks when computing discrete-log based signatures. The methods and systems described herein replace the random nonce in conventional signature systems with a pseudorandom nonce derived in a deterministic way from some internal state information, such as a secret key or a counter, such that the nonce is not repeated. The methods and systems described herein may also use tests to verify that a glitch has not occurred or been introduced. | 10-08-2015 |
20160026826 | BITSTREAM CONFIRMATION FOR CONFIGURATION OF A PROGRAMMABLE LOGIC DEVICE - A bitstream for configuration of a programmable logic device is received, the bitstream comprising a data segment and authentication data associated with the data segment. The programmable logic device computes a hash of the data segment. The programmable logic device compares the computed hash of the data segment with the authentication data. Configuration of the programmable logic device halts responsive to a determination that the computed hash of the data segment does not match the authentication data. Configuration of the programmable logic device using the data segment continues responsive to a determination that the computed hash of the data segment matches the authentication data. | 01-28-2016 |
20160048684 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 02-18-2016 |
Patent application number | Description | Published |
20090018649 | REINFORCEMENT DEVICE FOR A BIOLOGICAL VALVE AND REINFORCED BIOLOGICAL VALVE - A reinforcement device for a biological valve includes an arrangement of supports configured to establish a double-trigone geometry in the valve and coupled to a base upon which the valve may be mounted. A plurality of commissural supports establish the geometry of a commissural trigone, and a plurality of intercommissural supports establish the geometry of an intercommissural trigone. A method for reinforcing a biological valve includes using commissural supports in conjunction with intercommissural supports, both sets of supports coupled to a base upon which the valve is mounted. | 01-15-2009 |
20090105810 | BIOLOGICAL VALVE FOR VENOUS VALVE INSUFFICIENCY - A bioprosthetic valve for repairing a deep venous insufficiency in a subject includes a single leaflet from a xenogeneic heart valve attached at natural margins of attachment to a patch of valve wall tissue. The patch may extend axially above and below the leaflet and circumferentially on either side of the leaflet to provide a region for attaching the patch to a fenestration in a host vein. A bioprosthetic valve may be manufactured by excising a portion of a xenogeneic heart valve including a single leaflet and contiguous wall tissue, and may further comprise shaving off excess leaflet tissue from adjacent leaflets. A method of replacing a malfunctioning venous valve in a subject includes providing a bioprosthetic valve as described above and inserting it to the host vein. | 04-23-2009 |
20090105813 | IMPLANTABLE VALVE DEVICE - Valve devices, methods of making valve devices, and methods of treating various venous-related conditions, disorders and/or diseases are described. In one embodiment, a valve device includes an expandable support frame and a bioprosthetic valve attached to the support frame. The bioprosthetic valve comprises a leaflet and a contiguous wall portion harvested from a multi-leaflet xenogeneic valve. The contiguous wall portion includes the attachment region where the leaflets attaches to the vessel wall and, in some embodiments, includes the natural margins of attachment between the leaflet and vessel wall. | 04-23-2009 |
20100234939 | BIOLOGICAL VALVE FOR VENOUS VALVE INSUFFICIENCY - A bioprosthetic valve for repairing a deep venous insufficiency in a subject includes a single leaflet from a xenogeneic heart valve attached at natural margins of attachment to a patch of valve wall tissue. The patch may extend axially above and below the leaflet and circumferentially on either side of the leaflet to provide a region for attaching the patch to a fenestration in a host vein. A bioprosthetic valve may be manufactured by excising a portion of a xenogeneic heart valve including a single leaflet and contiguous wall tissue, and may further comprise shaving off excess leaflet tissue from adjacent leaflets. A method of replacing a malfunctioning venous valve in a subject includes providing a bioprosthetic valve as described above and inserting it to the host vein. | 09-16-2010 |
20110022167 | INTRAPARIETAL AORTIC VALVE REINFORCEMENT DEVICE AND A REINFORCED BIOLOGICAL AORTIC VALVE - A reinforcement device for a biological valve includes an arrangement of supports configured to establish a double-trigone geometry in the valve and coupled to a base upon which the valve may be mounted. A plurality of commissural supports establish the geometry of a commissural trigone, and a plurality of intercommissural supports establish the geometry of an intercommissural trigone. A method for reinforcing a biological valve includes using commissural supports in conjunction with intercommissural supports, both sets of supports coupled to a base upon which the valve is mounted. | 01-27-2011 |
Patent application number | Description | Published |
20080215652 | Constellation-Multiplexed Transmitter and Receiver - A device of dynamic communication of information allows, on the average, non-integer bits per symbol transmission, using a compact code set or a partial response decoding receiver. A stream of selectable predetermined integer bits, e.g., k or k+1 data bits, is grouped into a selectable integer number of bit vectors which then are mapped onto corresponding signal constellations forming transmission symbols. Two or more symbols can be grouped and further encoded, so that a symbol is spread across the two or more symbols being communicated. Sequence estimation using, for example, maximum likelihood techniques, as informed by noise estimates relative to the received signal. Each branch metric in computing the path metric of a considered sequence at the receiver is weighted by the inverse of the noise power. It is desirable that the constellation selection, sequence estimation and noise estimation be performed continuously and dynamically. | 09-04-2008 |
20090051821 | SYSTEM AND METHOD FOR TERRESTRIAL HIGH-DEFINITION TELEVISION RECEPTION - An adaptive receiver is disclosed for optimally receiving and processing signals. The receiver utilizes one or more memory blocks to store groups of incoming symbols. The groups of symbols are processed by a channel estimation subsystem to determine channel characteristics. The receiver determines the appropriate demodulation and decoding strategy to implement based on the determined channel characteristics. The receiver includes a plurality of demodulation and decoding schemes, one of which is selected based on the results of a channel estimation analysis. | 02-26-2009 |
20100002809 | PHY sub-channel processing - Physical layer (PHY) sub-channel processing. A soft symbol decision stream is arranged into a number of sub-channels to reduce substantially the processing performed within a communication receiver on data that is not intended for that communication receiver. In other embodiments, a predetermined approach is employed to arrange the soft symbol decision stream into one or more frames; each frame may have one or more soft symbol blocks; and each soft symbol block may have one or more symbols. Each of the soft symbol blocks, within a frame, may be assigned to a sub-channel. Only the soft symbol blocks that contain information destined for the communication receiver need be decoded. Only the sub-channel that includes these soft symbol blocks, destined for this communication receiver, need be decoded. The soft symbol blocks not within the sub-channel may be discarded thereby recovering some of the processing capabilities of the communication receiver. | 01-07-2010 |
20100074167 | Downstream Time Domain Based Adaptive Modulation for DOCSIS Based Applications - In a DOCSIS based satellite gateway data is transmitted over a single downstream channel, at different throughput rates. Data destined for each subscriber/receiver is assigned a throughput rate depending upon the downstream signal quality of that subscriber/receiver. To accomplish this, the downstream DOCSIS MAC data is parsed to extract DOCSIS packets. The DOCSIS packets are then loaded into packet queues based on an identifier within such packets such as the MAC destination address or SID. Each of the queues represents a bandwidth efficiency or throughput rate that can be currently tolerated by specific subscribers based on the current signal quality being experienced at the subscriber location. A PHY-MAP describing the downstream data structure to be transmitted and inserted into the downstream data. Data is extracted from the packet queues in queue blocks as defined by the PHY-MAP. The queue blocks are modulated with transmission parameters appropriate for each queue block and transmitted to the DOCSIS based satellite modems. The satellite modems extract the PHY-MAP from the downstream data and use the information contained in it to demodulate and decode the queue for which they have sufficient downstream signal quality. Satellite modems measure and transmit downstream signal quality to the satellite gateway to be used to assigned traffic to the appropriate queues. | 03-25-2010 |
20100267330 | Communications signal transcoder - Communications signal transcoder. A solution is provided to transcode a signal from a first signal type to a second signal type to ensure proper interfacing between devices that may operate using different signal types. For example, within a communication system, a first signal type (having a first modulation type, e.g., | 10-21-2010 |
20120275508 | Constellation-Multiplexed Transmitter and Receiver - A device of dynamic communication of information allows, on the average, non-integer bits per symbol transmission, using a compact code set or a partial response decoding receiver. A stream of selectable predetermined integer bits, e.g., k or k+1 data bits, is grouped into a selectable integer number of bit vectors which then are mapped onto corresponding signal constellations forming transmission symbols. Two or more symbols can be grouped and further encoded, so that a symbol is spread across the two or more symbols being communicated. Sequence estimation using, for example, maximum likelihood techniques, as informed by noise estimates relative to the received signal. Each branch metric in computing the path metric of a considered sequence at the receiver is weighted by the inverse of the noise power. It is desirable that the constellation selection, sequence estimation and noise estimation be performed continuously and dynamically. | 11-01-2012 |
20120314812 | PHY sub-channel processing - Physical layer (PHY) sub-channel processing. A soft symbol decision stream is arranged into a number of sub-channels to reduce substantially the processing performed within a communication receiver on data that is not intended for that communication receiver. In other embodiments, a predetermined approach is employed to arrange the soft symbol decision stream into one or more frames; each frame may have one or more soft symbol blocks; and each soft symbol block may have one or more symbols. Each of the soft symbol blocks, within a frame, may be assigned to a sub-channel. Only the soft symbol blocks that contain information destined for the communication receiver need be decoded. Only the sub-channel that includes these soft symbol blocks, destined for this communication receiver, need be decoded. The soft symbol blocks not within the sub-channel may be discarded thereby recovering some of the processing capabilities of the communication receiver. | 12-13-2012 |
20130265870 | DOWNSTREAM TIME DOMAIN BASED ADAPTIVE MODULATION FOR DOCSIS BASED APPLICATIONS - In a satellite gateway, data is transmitted over a downstream channel at different throughput rates. Data destined for each subscriber/receiver is assigned a throughput rate depending upon the downstream signal quality of that subscriber/receiver. The downstream data is parsed to extract data packets. The data packets are then loaded into packet queues based on an identifier within such packets. The queues represent a bandwidth efficiency or throughput rate that can be currently tolerated by specific subscribers that may also be based on the current signal quality at a subscriber location. The parsed data traffic is processed based on the profile of the plurality of profiles to produce processed data traffic, and transmitted from the packet queues over a downstream channel. | 10-10-2013 |
20130314261 | Digital Correction Techniques for Data Converters - A method and apparatus is disclosed to compensate for impairments within a data converter such that its output is a more accurate representation of its input. The data converter includes a main data converter, a reference data converter, and a correction module. The main data converter may be characterized as having the impairments. As a result, the output of the main data converter is not the most accurate representation of its input. The reference data converter is designed such that the impairments are not present. The correction module estimates the impairments present within the main data converter using its output and the reference data converter to generate corrections coefficients. The correction module adjusts the output of the main data converter using the corrections coefficients to improve the performance of the data converter. | 11-28-2013 |
20140002284 | Compensation for Lane Imbalance in a Multi-Lane Analog-To-Digital Converter (ADC) | 01-02-2014 |
20150222005 | SATELLITE ALIGNMENT SYSTEM USING AUTOMATIC CONTROL OF OUTPUT POWER - Systems and methods for use in evaluating a position of a satellite dish are provided. One system includes an antenna configured to receive an input satellite signal at a current position of a satellite dish and automatic gain control circuitry configured to apply a variable gain to the input satellite signal to produce a modified signal at a desired level. The system further includes power control circuitry configured to generate an output signal using the modified signal. The power control circuitry is configured to adjust a power level of the output signal using the variable gain applied to the input satellite signal such that the output signal is proportional to the input signal. | 08-06-2015 |
Patent application number | Description | Published |
20090086808 | Equalization And Decision-Directed Loops With Trellis Demodulation In High Definition TV - Improved decision feedback equalizer and decision directed timing recovery systems and methods suitable for use in connection with a dual mode QAM/VSB receiver system are disclosed. A trellis decoder operates in conjunction with a decision feedback equalizer circuit on trellis coded 8-VSB modulated signals. The trellis decoder includes a 4-state traceback memory circuit outputting a maximum likelihood decision as well as a number of intermediate decisions based upon the maximum likelihood sequence path. Any number of decisions, along the sequence, may be provided as an input signal to timing recovery system loops, with the particular decision along the sequence chosen on the basis of its delay through the trellis decoder. Variable delay circuitry is coupled to the other input of the timing recovery system loops in order to ensure that both input signals bear the same timestamp. Final decisions are output from the trellis decoder to a DFE in order to enhance the DFE's ability to operate in low SNR environments. A decision sequence estimation error signal is also generated and used to drive the tap updates of both the DFE and an FFE portion of the equalizer. | 04-02-2009 |
20090122925 | Viterbi slicer for turbo codes - A method for synchronizing receivers that receive turbo encoded signals to a received signal. Turbo encoding may enable signals to be decoded at a much lower signal to noise ratio than previously practical. A traditional method of synchronizing a receiver to an incoming signal is to use a slicer to determine a received symbol and then to compare the determined symbol to the incoming waveform, in order to adjust the phase of the slicer with respect to the incoming signal. At signal low levels, at which turbo encoded signals may be decoded, this slicing method may be prone to errors that may disrupt the synchronization of the receiver to the incoming signal. By replacing the slicer by a Viterbi decoder with zero traceback (i.e., one which does not consider future values of the signal only past values) a prediction as to what the incoming signal is can be made. Because the Viterbi decoder can consider past signal values it can predict the present symbol being received with higher reliability than by using a slicer, which considers only the present value of the incoming signal. | 05-14-2009 |
20090190656 | Television Functionality on a Chip - A television on a chip (TVOC) system that provides a cost effective approach for providing television functionality on a single integrated circuit chip is disclosed. A TVOC includes the functionality necessary to receive and display television signals in a variety of input and output formats. A TVOC can be used in set-top boxes for cable and satellite television, or directly within a television. All functionality provided can be provided on a single integrated circuit. TVOC includes a data transport module, an IF demodulator, a digital audio engine, an analog audio engine, a digital video engine, and an analog video engine. The TVOC also includes three sets of interfaces including output interfaces, control interfaces and ancillary interfaces. Further features and embodiments provide enhanced functionality and increased efficiencies. | 07-30-2009 |
20120147974 | Television Functionality on a Chip - A television on a chip (TVOC) system that provides a cost effective approach for providing television functionality on a single integrated circuit chip is disclosed. A TVOC includes the functionality necessary to receive and display television signals in a variety of input and output formats. A TVOC can be used in set-top boxes for cable and satellite television, or directly within a television. All functionality provided can be provided on a single integrated circuit. TVOC includes a data transport module, an IF demodulator, a digital audio engine, an analog audio engine, a digital video engine, and an analog video engine. The TVOC also includes three sets of interfaces including output interfaces, control interfaces and ancillary interfaces. Further features and embodiments provide enhanced functionality and increased efficiencies. | 06-14-2012 |
20120196551 | COMMUNICATION RECEIVER ENHANCEMENTS USING MULTI-SIGNAL CAPTURE - A method and apparatus is disclosed to determine communications receiver parameters from multiple channels of a received communications signal and to configure and/or adjust communications receiver parameters to acquire one or more channels from among the multiple channels of the received communications signal. A communications receiver observes a multi-channel communication signal as it passes through a communication channel. The communications receiver determines one or more communications receiver parameters from the multiple channels of the received communications signal. The communications receiver configures and/or adjusts communications receiver parameters to acquire the one or more channels from among the multiple channels of the received communications signal. | 08-02-2012 |
20120235841 | DIGITAL CORRECTION TECHNIQUES FOR DATA CONVERTERS - A method and apparatus is disclosed to compensate for impairments within a data converter such that its output is a more accurate representation of its input. The data converter includes a main data converter, a reference data converter, and a correction module. The main data converter may be characterized as having the impairments. As a result, the output of the main data converter is not the most accurate representation of its input. The reference data converter is designed such that the impairments are not present. The correction module estimates the impairments present within the main data converter using its output and the reference data converter to generate corrections coefficients. The correction module adjusts the output of the main data converter using the corrections coefficients to improve the performance of the data converter. | 09-20-2012 |
20130297991 | FEC (forward error correction) decoder with dynamic parameters - FEC (Forward Error Correction) decoder with dynamic parameters. A novel means by which FEC parameters may be encoded into, and subsequently extracted from, a signal stream to allow for adaptive changing of any 1 or more operational parameters that govern communications across a communication channel. FEC parameters are encoded directly into a data frame such that the data frame is treated identical to all other data frames within the signal stream. When the data frame actually includes FEC parameters, it is characterized as a CP (Control Packet) type. For example, when decoding an MPEG stream, an MPEG block that includes FEC parameters, that MPEG block is characterized as a CP MPEG block. The means by which FEC parameters are encoded and extracted from the signal stream allows for much easier adaptive modification of the manner by which signal are encoded, modulated, and processed within a communication system. | 11-07-2013 |
20150263772 | Communication Receiver Enhancements Using Multi-Signal Capture - A method and apparatus is disclosed to determine communications receiver parameters from multiple channels of a received communications signal and to configure and/or adjust communications receiver parameters to acquire one or more channels from among the multiple channels of the received communications signal. A communications receiver observes a multi-channel communication signal as it passes through a communication channel. The communications receiver determines one or more communications receiver parameters from the multiple channels of the received communications signal. The communications receiver configures and/or adjusts communications receiver parameters to acquire the one or more channels from among the multiple channels of the received communications signal. | 09-17-2015 |