Patent application number | Description | Published |
20120111767 | INTERSTITIAL METAL HYDRIDE CATALYST SYSTEMS AND ASSOCIATED PROCESSES - Exemplary embodiments of the present invention relate to the processing of hydrocarbon-containing feedstreams in the presence of an interstitial metal hydride containing catalyst comprising a surface, and a Group VI/Group VIII metal sulfide coated onto the surface of the interstitial metal hydride. The catalysts and processes of the present invention can improve overall hydrogenation, product conversion, as well as sulfur reduction in hydrocarbon feedstreams. | 05-10-2012 |
20120115713 | POISON RESISTANT CATALYST SYSTEMS AND ASSOCIATED PROCESSES - Exemplary embodiments of the present invention relate to the processing of hydrocarbon-containing feedstreams in the presence of an active catalyst component comprising a surface, and a metal oxide film coated on the surface of the active catalyst component. The catalysts and processes of the present invention can improve overall hydrogenation, product conversion, as well as improved resistance to catalytic deactivation due to sulfur and nitrogen compounds present in the hydrocarbon feedstreams. | 05-10-2012 |
20140081060 | INTERSTITIAL METAL HYDRIDE CATALYST SYSTEMS AND ASSOCIATED PROCESSES - Exemplary embodiments of the present invention relate to the processing of hydrocarbon-containing feedstreams in the presence of an interstitial metal hydride containing catalyst comprising a surface, and a Group VI/Group VIII metal sulfide coated onto the surface of the interstitial metal hydride. The catalysts and processes of the present invention can improve overall hydrogenation, product conversion, as well as sulfur reduction in hydrocarbon feedstreams. | 03-20-2014 |
Patent application number | Description | Published |
20100124403 | Automatic correction of audio/video synchronization - A media playback device may experience lack of video and audio synchronization due to subsequent processing by another device. For example, an audio/video receiver may be coupled to a television. The television may implement additional video processing which causes audio issued from the receiver to be out of synchronization with the video produced by the television. A detection unit may detect light produced by the television and a sound produced by a speaker based on signals that initially were synchronized. The detection unit may determine the difference between the times when the light and the sound are actually perceived. This time difference may then be used to reduce or increase a delay to synchronize the video and audio. | 05-20-2010 |
20140380403 | SECURE ACCESS ENFORCEMENT PROXY - Efficient architecture for a secure access enforcement proxy is described. The proxy interfaces with multiple subsystems and multiple shared resources. The proxy identifies an original transaction command being sent from one of the subsystems to one of the shared resources, identifies a policy corresponding to the subsystem, performs an action pertaining to the original transaction command based on the policy, and sends a response to the subsystem based on the action. | 12-25-2014 |
20150180787 | BACKPRESSURE TECHNIQUES FOR MULTI-STREAM CAS - Techniques are disclosed for controlling data transmission in multi-stream digital systems. The techniques disclosed allow an input stream to a conditional access system to be throttled when a FIFO begins to fill up. Each data stream may have its own FIFO, which sends data to a MUX and exports its status to a backpressure rate control module. Multiple seconds worth of data may be stored in a BPRC buffer ahead of the backpressure rate control module prior to being transmitted to a MUX FIFO buffer. The backpressure rate control module may use the cached data to fill available spaces within a MUX FIFO buffer. The determination to forward a data packet may be based on the individual MUX FIFO buffer levels, the sum of all the MUX FIFO buffer levels, and/or one or more configurable threshold values. In some embodiments, individual thresholds may be assigned to each FIFO buffer. | 06-25-2015 |
Patent application number | Description | Published |
20140082724 | METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES - A disclosed example method involves when transitioning a processor system to a low-power mode, generating at least a first signature based on a data structure storing memory addresses of memory regions to be protected during the low-power mode. During a resume process of the processor system from the low-power mode, at least a second signature is generated based on the data structure storing the memory addresses of the memory regions to be protected during the low-power mode. When the first signature matches the second signature, the processor system resumes from the low-power mode. When the first signature does not match the second signature, an error is generated. | 03-20-2014 |
20150178500 | METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES - A disclosed example method involves configuring a processor to, when transitioning the processor system to a low-power mode, use a key and a random or pseudo-random value to generate a first signature based on a sample of memory regions to be protected during the low-power mode, the memory regions based on a manufacturer required regions table and a third-party required regions table. The disclosed example method also involves configuring a processor to, during a resume process of the processor system from the low-power mode, generate a second signature based on the sample of the memory regions protected during the low-power mode. The disclosed example method also involves configuring a processor to, when the first signature matches the second signature, cause the processor system to resume from the low-power mode, and when the first signature does not match the second signature, generate an error. | 06-25-2015 |
Patent application number | Description | Published |
20100228607 | ELECTRIC TOLL MANAGEMENT - Identifying a vehicle in a toll system includes accessing a set of toll transaction entries. Each entry in the set designates a toll transaction between a vehicle and the toll system and includes a transaction descriptor and a transaction time stamp. A series of toll transaction pictures is accessed. The series includes a plurality of pictures, each of which is associated with a picture time stamp. A toll transaction entry is identified from the set as a violation transaction entry based on the transaction descriptor. A toll transaction picture is selected from the series. The transaction time stamp of the violation transaction is compared, using a processing device, with the picture time stamp of the selected toll transaction picture. The selected toll transaction picture is identified as a violation picture corresponding to the violation transaction entry based on a result of the comparison. | 09-09-2010 |
20100228608 | ELECTRIC TOLL MANAGEMENT - Identifying a vehicle in a toll system includes accessing a set of toll transaction entries. Each entry in the set designates a toll transaction between a vehicle and the toll system and includes a transaction descriptor and a transaction time stamp. A series of toll transaction pictures is accessed. The series includes a plurality of pictures, each of which is associated with a picture time stamp. A toll transaction entry is identified from the set as a violation transaction entry based on the transaction descriptor. A toll transaction picture is selected from the series. The transaction time stamp of the violation transaction is compared, using a processing device, with the picture time stamp of the selected toll transaction picture. The selected toll transaction picture is identified as a violation picture corresponding to the violation transaction entry based on a result of the comparison. | 09-09-2010 |
20110288909 | Electronic Toll Management and Vehicle Identification - Identifying a vehicle in a toll system includes accessing image data for a first vehicle and obtaining license plate data from the accessed image data for the first vehicle. A set of records is accessed. Each record includes license plate data for a vehicle. The license plate data for the first vehicle is compared with the license plate data for vehicles in the set of records. Based on the results of the comparison of the license plate data, a set of vehicles is identified from the vehicles having records in the set of records. Vehicle fingerprint data is accessed for the first vehicle. The vehicle fingerprint data for the first vehicle is based on the image data for the first vehicle. Vehicle fingerprint data for a vehicle in the set of vehicles is accessed. Using a processing device, the vehicle fingerprint data for the first vehicle is compared with the vehicle fingerprint data for the vehicle in the set of vehicles. The vehicle in the set of vehicles is identified as the first vehicle based on results of the comparison of vehicle fingerprint data. | 11-24-2011 |
20130058531 | Electronic Toll Management and Vehicle Identification - Identifying a vehicle in a toll system includes accessing image data for a first vehicle and obtaining license plate data from the accessed image data for the first vehicle. A set of records is accessed. The license plate data for the first vehicle is compared with the license plate data for vehicles in the set of records. Based on the comparison of the license plate data, a set of vehicles is identified from the vehicles having records in the set of records. Second vehicle identifier data is accessed for the first vehicle and for a vehicle in the set of vehicles. Using a processing device, the second vehicle identifier data for the first vehicle is compared with the second vehicle identifier data for the vehicle in the set of vehicles. The vehicle in the set of vehicles is identified as the first vehicle based on results of the comparison. | 03-07-2013 |
20130346165 | Electronic Toll Management and Vehicle Identification - Identifying a vehicle in a toll system includes accessing image data for a first vehicle and obtaining first vehicle identifier data from the accessed image data for the first vehicle. A set of records is accessed. Each record includes first vehicle identifier data for a vehicle. The first vehicle identifier data for the first vehicle is compared with the first vehicle identifier data for vehicles in the set of records. Based on the results of the comparison of the first vehicle identifier data, a set of vehicles is identified from the vehicles having records in the set of records. Second vehicle identifier data is accessed for the first vehicle and is compared to second vehicle identifier data for the set of vehicles in order to identify the first vehicle. | 12-26-2013 |
20140074567 | Electronic Toll Management - Identifying a vehicle in a toll system includes accessing a set of toll transaction entries. Each entry in the set designates a toll transaction between a vehicle and the toll system and includes a transaction descriptor and a transaction time stamp. A series of toll transaction pictures is accessed. The series includes a plurality of pictures, each of which is associated with a picture time stamp. A toll transaction entry is identified from the set as a violation transaction entry based on the transaction descriptor. A toll transaction picture is selected from the series. The transaction time stamp of the violation transaction is compared, using a processing device, with the picture time stamp of the selected toll transaction picture. The selected toll transaction picture is identified as a violation picture corresponding to the violation transaction entry based on a result of the comparison. | 03-13-2014 |
20140355837 | Electronic Toll Management and Vehicle Identification - Identifying a vehicle in a toll system includes accessing image data for a first vehicle and obtaining license plate data from the accessed image data for the first vehicle. A set of records is accessed. Each record includes license plate data for a vehicle. The license plate data for the first vehicle is compared with the license plate data for vehicles in the set of records. Based on the results of the comparison of the license plate data, a set of vehicles is identified from the vehicles having records in the set of records. Vehicle fingerprint data is accessed for the first vehicle. The vehicle fingerprint data for the first vehicle is based on the image data for the first vehicle. Vehicle fingerprint data for a vehicle in the set of vehicles is accessed. Using a processing device, the vehicle fingerprint data for the first vehicle is compared with the vehicle fingerprint data for the vehicle in the set of vehicles. The vehicle in the set of vehicles is identified as the first vehicle based on results of the comparison of vehicle fingerprint data. | 12-04-2014 |
20160049015 | Electronic Toll Management - Identifying a vehicle in a toll system includes accessing a set of toll transaction entries. Each entry in the set designates a toll transaction between a vehicle and the toll system and includes a transaction descriptor and a transaction time stamp. A series of toll transaction pictures is accessed. The series includes a plurality of pictures, each of which is associated with a picture time stamp. A toll transaction entry is identified from the set as a violation transaction entry based on the transaction descriptor. A toll transaction picture is selected from the series. The transaction time stamp of the violation transaction is compared, using a processing device, with the picture time stamp of the selected toll transaction picture. The selected toll transaction picture is identified as a violation picture corresponding to the violation transaction entry based on a result of the comparison. | 02-18-2016 |