Patent application number | Description | Published |
20080307133 | Method for Synchronizing a Transmission of Information and a Device Having Synchronizing Capabilities - A method for synchronizing a transmission of information over a bus, and a device having synchronization capabilities. The device includes: a bus that includes multiple bus lines, a bus transmitter connected between an information source and the bus, a bus receiver connected between the bus and an information target; wherein the information source and the information target are mutually asynchronous; wherein the device is characterized by including a bus receiver control circuit that controls the bus receiver circuit and a bus transmitter control circuit that controls the bus transmitter circuit; wherein the bus transmitter control circuit enables to transmit information from the information source to the bus in response to a change in a value of a feedback signal sent from the bus receiver control circuit and wherein the bus receiver control circuit enables to provide information from the bus to the information target in response to a change in a value of a delayed strobe signal provided by a delay unit connected between the bus receiver control circuit and the bus transmitter control circuit. | 12-11-2008 |
20090174452 | DEVICE AND METHOD FOR HANDLING METASTABLE SIGNALS - A method and device for managing metastable signals. The device includes: a first latch and a second latch, a multiple switching point circuit, connected between an output node of the first latch and an input node of the second latch, wherein the multiple switching point circuit includes at least one pull up transistor and at least one pull down transistor that are selectively activated in response to a feedback signal provided from the second latch and in response to a an output signal of the first latch such as to define at least a low switching point that is lower than a high switching point of the multiple-switching point circuit; wherein a switching point of an inverter within the first latch is between the high and low switching points. | 07-09-2009 |
20090327795 | METHOD FOR PROTECTING A SECURED REAL TIME CLOCK MODULE AND A DEVICE HAVING PROTECTION CAPABILITIES - A method for protecting a secured real time clock module, the method includes: locking multiple input ports of the secured real time clock module if the multiple input ports of the secured real time clock module are idle during at least a first duration; unlocking the multiple input ports of the secured real time clock module if a predefined high frequency code is received over a control input port of the secured real time clock module; and providing a secured real time clock signal when the multiple input ports of the secured real time clock module are locked and when the multiple input ports of the secured real time clock module are unlocked; wherein changes in a supply voltage results in a supply voltage induced changes of an input signal provided to an input port of the secured real time clock module; wherein a maximal frequency of the supply voltage induced changes of the input signal is lower then the high frequency of the predefined high frequency code. | 12-31-2009 |
20110199159 | METHOD AND APPARATUS FOR GENERATING A CLOCK SIGNAL - An integrated circuit comprising oscillator circuitry is arranged to generate a clock signal for functional logic module of the integrated circuit. The oscillator circuitry comprises a plurality of propagation paths, and is arranged to apply a transition signal to inputs of the plurality of propagation paths, and to cause the output clock signal to transition based on a propagation of the transition signal through a determined set of the propagation paths. | 08-18-2011 |
Patent application number | Description | Published |
20090201850 | LOCATION TRACKING BASED ON PROXIMITY-BASED AD HOC NETWORK - A system and method is described for constructing a proximity-based ad hoc network among a plurality of sensors and for using such a network to perform location tracking. The system and method uses time-coded data received from each of the sensors to determine a current proximity of each of the sensors to one or more beacons. Then, by leveraging information relating to the effective transmission ranges of the beacons, the system and method determines the relative location of each of the plurality of sensors with respect to other sensors within the plurality of sensors. Where actual (as opposed to relative) location information is available for a particular sensor, it can be used to generate or augment location information associated with other sensors known to be spatially and temporally proximate to the particular sensor. The current location information for each of the sensors is then used in providing location-based services. | 08-13-2009 |
20090201896 | DATA SHARING BASED ON PROXIMITY-BASED AD HOC NETWORK - A system and method is described for constructing a proximity-based ad hoc network among a plurality of sensor-enabled devices and for using such a network to facilitate data sharing among users of those devices (referred to herein for simplicity as “sensors”). The system and method advantageously enables data to be shared among co-located sensors in a manner that does not require local connections or communication among those sensors and that protects user privacy. The system and method also beneficially enables data to be transferred among heterogeneous sensor types that would otherwise be incapable of detecting and/or communicating with each other. The system and method may perform user-initiated data transfer as well as automatic data transfer responsive to sensor proximity and other factors, such as commonality of user interests or activities or membership in a social network. | 08-13-2009 |
20090204348 | POWER MANAGEMENT FOR PROXIMITY-BASED AD HOC NETWORKS - A system and method is described herein for managing power consumption by a plurality of sensors in a proximity-based ad hoc network. The system and method receives sensor data that is provided from a plurality of sensors and constructs a proximity-based ad hoc network among the plurality of sensors based on the sensor data. The system and method also receives and analyzes power status information from each sensor in a group of spatially and temporally proximate sensors in the proximity-based ad hoc network. Based on the analysis, the system and method then modifies a manner in which at least one sensor in the group provides sensor data. | 08-13-2009 |
20100076777 | AUTOMATIC RECOMMENDATION OF LOCATION TRACKING PRIVACY POLICIES - A system and method is described herein that automatically provides users with recommendations regarding location tracking privacy policies that may be appropriate to enact in certain contexts as well as a means for enacting such policies. Once a privacy policy is enacted, the manner in which location information associated with the user is provided to at least one application or service will be controlled in accordance with the privacy policy. The recommended privacy policies may represent privacy policies that have been enacted by other users in like contexts. | 03-25-2010 |
20100077484 | LOCATION TRACKING PERMISSIONS AND PRIVACY - A location tracking privacy engine is described herein that is configured to allow users to define privacy policies that govern how location information about each user is provided to context-aware applications and services. Privacy policies can be defined in a highly flexible and context-specific manner such that the execution of a given privacy policy by the location tracking privacy engine is dependent on the existence of one or more social, topical, temporal or spatial conditions. Privacy policies are then executed automatically by the location tracking privacy engine when the conditions associated with the policies are determined to be satisfied. | 03-25-2010 |
Patent application number | Description | Published |
20090132689 | TRUST BASED MODERATION - A network device, system, and method are directed towards detecting trusted reporters and/or abusive users in an online community using reputation event inputs, such as abuse reports. When an abuse report is received for a content item, the combined trust (reputation) of previous reporters on the reported content item and the trust (reputation) of the content author are compared to determine whether to trust the content item. If the content item is un-trusted, the content item may be hidden from public view. In one embodiment, the content item might still be visible to the content author, and/or members in the author's contact list, or the like, while being hidden from another user in the community. In one embodiment, the author may appeal the determined trust, and results of the appeal may be used to modify a trust of at least one reporter. | 05-21-2009 |
20120180138 | TRUST BASED MODERATION - A network device, system, and method are directed towards detecting trusted reporters and/or abusive users in an online community using reputation event inputs, such as abuse reports. When an abuse report is received for a content item, the combined trust (reputation) of previous reporters on the reported content item and the trust (reputation) of the content author are compared to determine whether to trust the content item. If the content item is un-trusted, the content item may be hidden from public view. In one embodiment, the content item might still be visible to the content author, and/or members in the author's contact list, or the like, while being hidden from another user in the community. In one embodiment, the author may appeal the determined trust, and results of the appeal may be used to modify a trust of at least one reporter. | 07-12-2012 |