Patent application number | Description | Published |
20090082111 | SYSTEM AND METHOD FOR CONNECTING USERS BASED ON COMMON INTERESTS, SUCH AS SHARED INTERESTS OF REPRESENTATIONS OF PROFESSIONAL ATHLETES - A system and method for connecting users based on common participation, ownership, or interest in a commodity or market, such as common ownership of a player associated with fantasy sports, is described. In some cases, the system presents a page associated with the commonly-interesting player to a user. In some cases, the provided content includes comments provided by other users or content provided by sources other than a source hosting a fantasy sports league associated with the player. | 03-26-2009 |
20110025842 | Automatically capturing information, such as capturing information using a document-aware device - A system and method for automatically changing the operation of a mobile device in response to a presence of information is described. In some examples, the system determines an information capture device is proximate to text, automatically changes operation of the capture device to a certain mode, captures the text, and performs an action associated with the captured text. | 02-03-2011 |
20110029443 | PERFORMING ACTIONS BASED ON CAPTURING INFORMATION FROM RENDERED DOCUMENTS, SUCH AS DOCUMENTS UNDER COPYRIGHT - A hardware, firmware, and/or software facility (“facility”) for providing information relevant to rendered documents is described. In some embodiments, the facility identifies multiple versions of an electronic document corresponding to a rendered document captured by a capture device. The facility may then provide a person utilizing the capture device with various ways to interact with one or more versions of the electronic document. In some embodiments, the facility determines that use of a rendered document is restricted, such as by copyright, to some degree. The facility may then offer the person the option to obtain unrestricted use of the rendered document. If the person accepts, the person obtains the right to store captures of the rendered document. If the person declines, the facility automatically discards captures of the rendered document. In some embodiments, the facility may automatically purchase rights to restricted-use rendered documents based upon the person's pre-defined criteria. | 02-03-2011 |
20110035656 | Identifying a document by performing spectral analysis on the contents of the document - A system and method for identifying a document based on a spectral analysis of the text of the document is described. In some examples, the system generates a document identifier for a rendered document based on assigning values to words in the rendered document, such as values associated with the frequency of use of the word by the rendered document, the absolute or relative position of the word in the rendered document, and so on. The system may use the document identifier to generate a group of documents having similar document identifiers, and choose a likely match from the group of documents based on predictive analysis. | 02-10-2011 |
20110035662 | Interacting with rendered documents using a multi-function mobile device, such as a mobile phone - A system and method for facilitating interactions between multi-function devices and rendered documents is described. In some examples, the systems overlays an image of a rendered document with display elements associated with actions to perform for the rendered document. In some examples, the system presents a virtual real-time image in place of a real-time of a document or other display of information. | 02-10-2011 |
20110043652 | AUTOMATICALLY PROVIDING CONTENT ASSOCIATED WITH CAPTURED INFORMATION, SUCH AS INFORMATION CAPTURED IN REAL-TIME - A system and method for automatically providing content associated with captured information is described. In some examples, the system receives input by a user, and automatically provides content or links to content associated with the input. In some examples, the system receives input via text entry or by capturing text from a rendered document, such as a printed document, an object, an audio stream, and so on. | 02-24-2011 |
20110096174 | ACCESSING RESOURCES BASED ON CAPTURING INFORMATION FROM A RENDERED DOCUMENT - A system and method for authorizing access to computing resources, access to services, software and so on, based on capturing information associated with a request is described. | 04-28-2011 |
20110153653 | IMAGE SEARCH USING TEXT-BASED ELEMENTS WITHIN THE CONTENTS OF IMAGES - A mobile device searches for electronic content. The mobile device captures an image from a rendered document, and searches for an electronic version of the image using characteristics of the image and using text within the contents of the image. The mobile device receives a result for the search based upon the image characteristics and the text within the context of the image. | 06-23-2011 |
20120214463 | DETECTING USE OF A MOBILE DEVICE BY A DRIVER OF A VEHICLE, SUCH AS AN AUTOMOBILE - A system and method for detecting that a driver of a vehicle is using a mobile device is described. In some examples, the system uses information identifying a rate of speed of a vehicle and information identifying a location of a mobile device, such as information extracted from images taken of the vehicle and/or distance measurements performed within the vehicle, to determine whether a driver is using a mobile device. | 08-23-2012 |
20130275849 | Performing Actions Based on Capturing Information from Rendered Documents, Such as Documents under Copyright - A hardware, firmware, and/or software facility (“facility”) for providing information relevant to rendered documents is described. In some embodiments, the facility identifies multiple versions of an electronic document corresponding to a rendered document captured by a capture device. The facility may then provide a person utilizing the capture device with various ways to interact with one or more versions of the electronic document. In some embodiments, the facility determines that use of a rendered document is restricted, such as by copyright, to some degree. The facility may then offer the person the option to obtain unrestricted use of the rendered document. If the person accepts, the person obtains the right to store captures of the rendered document. If the person declines, the facility automatically discards captures of the rendered document. In some embodiments, the facility may automatically purchase rights to restricted-use rendered documents based upon the person's predefined criteria. | 10-17-2013 |
20140113828 | ELECTRICAL, MECHANICAL, COMPUTING/ AND/OR OTHER DEVICES FORMED OF EXTREMELY LOW RESISTANCE MATERIALS - Electrical, mechanical, computing, and/or other devices that include components formed of extremely low resistance (ELR) materials, including, but not limited to, modified ELR materials, layered ELR materials, and new ELR materials, are described. | 04-24-2014 |
20140232889 | AUTOMATICALLY CAPTURING INFORMATION SUCH AS CAPTURING INFORMATION USING A DOCUMENT-AWARE DEVICE - A system and method for automatically changing the operation of a mobile device in response to a presence of information is described. In some examples, the system determines an information capture device is proximate to text, automatically changes operation of the capture device to a certain mode, captures the text, and performs an action associated with the captured text. | 08-21-2014 |
Patent application number | Description | Published |
20110067399 | GEOTHERMAL POWER SYSTEM - A geothermal system in deep, hot, dry rock has closed loop circulation, in which the water and steam circulating in the system are protected from any direct contact with the base rock. The system has a single L-shaped bore with a casing that lines the wellbore and has a sealed bottom end. A tubing within the casing has an open bottom end. Water or other liquid or gas is injected under pressure into the casing in the space between the casing and the tubing and is heated by the deep hot rock strata, creating heated liquid or gas which flows into the tubing through its open bottom end and is returned to the surface for use for heating, or in a power plant, or other applications. In a reverse configuration, the working fluid is injected into the tubing and is returned via the space between the casing and the tubing. | 03-24-2011 |
20130234444 | HEAT ENERGY EXTRACTION SYSTEM FROM UNDERGROUND IN SITU COMBUSTION OF HYDROCARBON RESERVOIRS - A system and method to extract heat energy from underground heat sources, then transport that heat to the surface in the form of a high temperature liquid or gas, and deliver the contaminant-free heat energy to a surface user of heat. The heat captured in the working fluid of the system is gained by heat transfers and can be extracted from the in situ combustion of any oil sands, heavy oil, conventional or unconventional oil, bitumen, coal, conventional or unconventional natural gas, methane or oil shales, or from various other sources. The invention creates a closed circulation system, in which the working fluid and steam circulating in the system are protected from any direct contact with the hydrocarbon reservoir, and gases produced by the in situ combustion are sequestered in the reservoir by the overlying overburden. | 09-12-2013 |
Patent application number | Description | Published |
20090248910 | CENTRAL DMA WITH ARBITRARY PROCESSING FUNCTIONS - A method and system is disclosed for transforming of data by a DMA controller without first saving the transmitted data on an intermediate medium. The method includes the DMA controller accessing data for transfer between an origination location in the system and a destination location in the system. The accessed data is passed through the DMA controller before being sent to the destination location. While the data is being passed through the DMA controller, it is transformed into a modified state. This transformation may include encryption or decryption of the data. The transformation may also include adding error correction bits to the data through an encoding process or decoding previously encoded data. Upon completion of the transformation, the data is sent directly to a prescribed destination location, typically either a memory circuit or an I/O device. Also disclosed is a DMA controller capable of performing the data transformation. | 10-01-2009 |
20100229005 | DATA WHITENING FOR WRITING AND READING DATA TO AND FROM A NON-VOLATILE MEMORY - Systems, apparatuses, and methods are provided for whitening and managing data for storage in non-volatile memories, such as Flash memory. In some embodiments, an electronic device such as media player is provided, which may include a system-on-a-chip (SoC) and a non-volatile memory. The SoC may include SoC control circuitry and a memory interface that acts as an interface between the SoC control circuitry and the non-volatile memory. The SoC can also include an encryption module, such as a block cipher based on the Advanced Encryption Standard (AES). The memory interface can direct the encryption module to whiten all types of data prior to storage in the non-volatile memory, including sensitive data, non-sensitive data, and memory management data. This can, for example, prevent or reduce program-disturb problems or other read/write/erase reliability issues. | 09-09-2010 |
20100293401 | Power Managed Lock Optimization - In an embodiment, a timer unit may be provided that may be programmed to a selected time interval, or wakeup interval. A processor may execute a wait for event instruction, and enter a low power state for the thread that includes the instruction. The timer unit may signal a timer event at the expiration of the wakeup interval, and the processor may exit the low power state in response to the timer event. The thread may continue executing with the instruction following the wait for event instruction. In an embodiment, the processor/timer unit may be used to implement a power-managed lock acquisition mechanism, in which the processor is awakened a number of times to check the lock and execute the wait for event instruction if the lock is not free, after which the thread may block until the lock is free. | 11-18-2010 |
20120144081 | Automatic Interrupt Masking in an Interrupt Controller - In one embodiment, an interrupt controller may implement an interrupt distribution scheme for distributing interrupts among multiple processors. The scheme may take into account various processor state in determining which processor should receive a given interrupt. For example, the processor state may include whether or not the processor is in a sleep state, whether or not interrupts are enabled, whether or not the processor has responded to previous interrupts, etc. The interrupt controller may implement timeout mechanisms to detect that an interrupt is being delayed (e.g. after being offered to a processor). The interrupt may be re-evaluated at the expiration of a timeout, and potentially offered to another processor. The interrupt controller may be configured to automatically, and atomically, mask an interrupt in response to delivering an interrupt vector for the interrupt to a responding processor. | 06-07-2012 |
20120167107 | Power Managed Lock Optimization - In an embodiment, a timer unit may be provided that may be programmed to a selected time interval, or wakeup interval. A processor may execute a wait for event instruction, and enter a low power state for the thread that includes the instruction. The timer unit may signal a timer event at the expiration of the wakeup interval, and the processor may exit the low power state in response to the timer event. The thread may continue executing with the instruction following the wait for event instruction. In an embodiment, the processor/timer unit may be used to implement a power-managed lock acquisition mechanism, in which the processor is awakened a number of times to check the lock and execute the wait for event instruction if the lock is not free, after which the thread may block until the lock is free. | 06-28-2012 |
20130067257 | Power Managed Lock Optimization - In an embodiment, a timer unit may be provided that may be programmed to a selected time interval, or wakeup interval. A processor may execute a wait for event instruction, and enter a low power state for the thread that includes the instruction. The timer unit may signal a timer event at the expiration of the wakeup interval, and the processor may exit the low power state in response to the timer event. The thread may continue executing with the instruction following the wait for event instruction. In an embodiment, the processor/timer unit may be used to implement a power-managed lock acquisition mechanism, in which the processor is awakened a number of times to check the lock and execute the wait for event instruction if the lock is not free, after which the thread may block until the lock is free. | 03-14-2013 |
20140075208 | DATA WHITENING FOR WRITING AND READING DATA TO AND FROM A NON-VOLATILE MEMORY - Systems, apparatuses, and methods are provided for whitening and managing data for storage in non-volatile memories, such as Flash memory. In some embodiments, an electronic device such as media player is provided, which may include a system-on-a-chip (SoC) and a non-volatile memory. The SoC may include SoC control circuitry and a memory interface that acts as an interface between the SoC control circuitry and the non-volatile memory. The SoC can also include an encryption module, such as a block cipher based on the Advanced Encryption Standard (AES). The memory interface can direct the encryption module to whiten all types of data prior to storage in the non-volatile memory, including sensitive data, non-sensitive data, and memory management data. This can, for example, prevent or reduce program-disturb problems or other read/write/erase reliability issues. | 03-13-2014 |
20140089650 | Security Enclave Processor Boot Control - An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. | 03-27-2014 |
20140089682 | Security Enclave Processor for a System on a Chip - An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. | 03-27-2014 |
20140215182 | Persistent Relocatable Reset Vector for Processor - In an embodiment, an integrated circuit includes at least one processor. The processor may include a reset vector base address register configured to store a reset vector address for the processor. Responsive to a reset, the processor may be configured to capture a reset vector address on an input, updating the reset vector base address register. Upon release from reset, the processor may initiate instruction execution at the reset vector address. The integrated circuit may further include a logic circuit that is coupled to provide the reset vector address. The logic circuit may include a register that is programmable with the reset vector address. More particularly, in an embodiment, the register may be programmable via a write operation issued by the processor (e.g. a memory-mapped write operation). Accordingly, the reset vector address may be programmable in the integrated circuit, and may be changed from time to time. | 07-31-2014 |
20150046702 | Embedded Encryption/Secure Memory Management Unit for Peripheral Interface Controller - In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC. | 02-12-2015 |