At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Efficient trace capture buffer management
A system and method for efficiently storing traces of multiple components in an embedded system. A system-on-a-chip (SOC) includes a trace unit for collecting...
Scalar readXF instruction for processing vectors
The described embodiments include a processor that handles faults. The processor first receives an input vector, a control vector, and a predicate vector, each...
Apparatus and methods for storing electronic access clients
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an...
Instruction type issue throttling upon reaching threshold by adjusting
counter increment amount for issued...
A system and method for reducing power consumption through issue throttling of selected problematic instructions. A power throttle unit within a processor...
Memory management unit speculative hardware table walk scheme
A system and method for efficiently handling translation look-aside buffer (TLB) misses. A memory management unit (MMU) detects when a given virtual address...
Memory controller mapping on-the-fly
Systems, methods, and devices for dynamically mapping and remapping memory when a portion of memory is activated or deactivated are provided. In accordance with...
Edge-triggered interrupt conversion in a system employing level-sensitive
In an embodiment, a system includes an interrupt controller, one or more CPUs coupled to the interrupt controller, a communication fabric, one or more...
Lookahead scheme for prioritized reads
A circular queue implementing a scheme for prioritized reads is disclosed. In one embodiment, a circular queue (or buffer) includes a number of storage...
Method and apparatus for idling a network connection
The described embodiments include a system that configures a network interface. During operation, the system receives a signal from an operating system...
Extended database search
Methods, program products, and systems implementing integrated repository of structured and unstructured data are disclosed. An integrated environment is...
Temporal metadata track
A description of types of metadata can provide, in one embodiment, an index to the types of metadata in a time based metadata track that can be associated with...
Restoring electronic information
Systems and methods are provided for automatic detection of data loss to system or a particular application. In one implementation a method is provided. The...
Method, medium, and system detecting speech using energy levels of speech
A speech recognition method, medium, and system. The method includes detecting an energy change of each frame making up signals including speech and non-speech...
Methods to determine availability of user based on mobile phone status
A command is received at an operating system of a first mobile phone for displaying contact information of a remote user having a mobile phone number of a...
Configuring a codec for communicating audio data using a Bluetooth network
In the described embodiments, when configuring a Bluetooth network connection between a first electronic device and a second electronic device, the first...
Enhanced encapsulation mechanism using GRE protocol
Wireless gateway nodes are enabled to support mobile node services, such as content based billing, when a data treatment server is present in the system. Using...
Pilot scheme for a MIMO communication system
The present invention employs a pilot scheme for frequency division multiple access (FDM) communication systems, such as single carrier FDM communication...
Apparatus and methods for network assisted hybrid network operation
Methods and apparatus for minimizing scheduling collisions between networks. In one embodiment, the networks are substantially unsynchronized, and during hybrid...
Fast transition from PCH to DCH for UMTS
Systems and methods for logically transitioning a client device or user equipment (UE) directly to a DCH state for the data path when an application layer...
Methods and systems for enabling feedback in wireless communication
Aspects of the present invention provide additional MAC functionality to support the PHY features of a wireless communication system framework. The additional...
MIMO based network coding network
A wireless communication system includes an intermediate node, a first node and a second node. A apparatus for implementing MIMO based network coding, comprises...
Passive proximity detection
Techniques and devices are disclosed for utilizing passively received audio signals to determine proximity of devices to other objects. In one embodiment, a...
Enhanced data storage in 3-D memory using string-specific source-side
A method includes storing data in a memory, which includes multiple strings of analog memory cells arranged in a three-dimensional (3-D) configuration having a...
Selective activation of programming schemes in analog memory cell arrays
A method for data storage includes defining a first programming scheme that programs a group of analog memory cells while reducing interference caused by at...
Two-shot knuckles for coupling electrically isolated sections of an
electronic device and methods for making...
Two shot knuckles include a first shot component and a second shot component. Both shot components are composed of different dielectric materials, where the...
Authenticating printers prior to pairing with portable electronic devices
The disclosed embodiments provide a system that facilitates the execution of a print job. During operation, the system receives, at a printer, a signal from a...
Image capturing devices using orientation detectors to implement automatic
Several methods and apparatuses for implementing automatic exposure mechanisms for image capturing devices are described. In one embodiment, an orientation...
Alleviating dominant color failure in automatic white balance using
Methods, devices and computer readable media for implementing novel dominant color alleviation techniques for color balancing are described. The techniques take...
Motion-based image stitching
Systems, methods, and computer readable media for stitching or aligning multiple images (or portions of images) to generate a panoramic image are described. In...
One embodiment of a clock synthesis apparatus can include a clock generator that can provide two or more clock waveforms. One clock waveform from the clock...
Display panel self-refresh entry and exit
Embodiments of an apparatus for implementing a display port interface are disclosed. The apparatus may include a source processor and a sink processor coupled...
Advanced receive channel architecture
This relates to an architecture of a receive channel circuit used during both a spectrum analysis phase and a touch panel detection phase. Various components of...
Method and apparatus for enhancing keycap legend visibility in low light
Techniques and apparatus to provide improved visibility to user input devices, such as keys, are disclosed. In low light conditions, keys can be difficult to...
Automatic identification and storage of frequently visited locations
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for automatically generating and updating a list of previously visited...
A magnetic assembly for use in a housing of an electronic device can include a first and a second magnet and a magnetic shield. The magnetic shield can reduce...
Connector with gold-palladium plated contacts
An improved outer layer of plating comprising a binary metal alloy of gold and palladium is employed on connector contacts. The binary metal alloy is plated on...
Temperature regulated melt crucible for cold chamber die casting
Disclosed is a vessel for melting and casting meltable materials. The vessel may be a surface temperature regulated vessel for providing a substantially...
Display screen or portion thereof with icon
Packaging with accessory
Methods for managing authority designation of graphical user interfaces
According to one aspect, a graphics management system receives a first message from a first process for granting one or more rights to a second process for...
Methods and apparatuses for automatic type checking via poisoned pointers
A method and an apparatus that modify pointer values pointing to typed data with type information are described. The type information can be automatically...
Indicating input focus by showing focus transitions
A GUI conveys the location of input focus to a user by a dynamic focus indicator that displays the path followed by input focus during a transition from one GUI...
Extensible application state preservation architecture
The preservation of the user interface state of first application on a first device allows, in one embodiment, a user to resume use of at least a portion of the...
Page fault prediction for processing vector instructions
A system including a processor that handles a TLB miss while executing a vector read instruction in a processor is described herein. During operation, the...
Engagement features and adjustment structures for electronic devices with
Electronic devices may be provided that contain wireless communications circuitry. The wireless communications circuitry may include antenna structures that are...
Power management of a radio data transceiver
Methods and apparatuses for operating a wireless mobile station configured to communicate with a wireless access point are described. A first awake timer may be...
Proximity-based notifications in a mobile device
Methods, program products, and systems for proximity-based notifications are described. A proximity-based notification system can receive a request to be...
Monitoring a location fingerprint database
Methods, program products, and systems for monitoring a location fingerprint database are described. A location fingerprint database can store location data...
Authentication with secondary approver
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first...