Patent application number | Description | Published |
20100131717 | CACHE MEMORY BYPASS IN A MULTI-CORE PROCESSOR (MCP) - This invention describes an apparatus, computer architecture, memory structure, memory control, and cache memory operation method for multi-core processor. A logic core bypasses immediate cache memory units with low yield or deadly performance. The core mounts (multiple) cache unit(s) that might already be in use by other logic cores. Selected cache memory units serve multiple logic cores with the same contents. The shared cache memory unit(s) serves all the mounting cores with cache search, hit, miss, and write back functions. The method recovers a logic core whose cache memory block is not operational by sharing cache memory blocks which might already engage other logic cores. The method is used to improve reliability and performance of the remaining system. | 05-27-2010 |
20130124840 | SECURE BOOT UP OF A COMPUTER BASED ON A HARDWARE BASED ROOT OF TRUST - A method includes performing a boot up of a computer having a system on-chip having multiple processors and a nonvolatile read-only machine-readable medium. The boot up includes enabling a first processor of the multiple processors, while maintaining others of the multiple processors in a disabled state. The boot up includes retrieving initial stage instructions from the nonvolatile read-only machine-readable medium. The boot up also includes executing the initial stage instructions and validating multiple stages of firmware separately. The boot up includes, in response to validating the multiple stages of firmware, executing the multiple stages of firmware in consecutive stages of the boot up, wherein executing of each stage of the multiple stages of firmware enables a different set of disabled hardware components of the computer. The boot up also includes validating an operating system and, in response to validation, transferring control of the computer to the operating system. | 05-16-2013 |
20140132763 | Distributed Control of a Heterogeneous Video Surveillance Network - A surveillance video broker arbitrates access by multiple clients to multiple surveillance video sources. Both clients and sources register with the broker. Each source independently specifies respective clients permitted real-time access to its video and conditions of access, if any. Preferably, the video source is a local surveillance domain having one or more cameras, one or more sensors, and a local controller, the source specifying clients or client groups permitted access, and independently specifying conditions of access for each client or client group, where conditions may include scheduled events, non-scheduled events, such as alarms or emergencies, and/or physical proximity. The broker automatically authorizes real-time access according to pre-specified conditions. Preferably, the broker can also arbitrate alert notifications to the clients based on pre-specified notification criteria. | 05-15-2014 |
20140132764 | Providing Emergency Access to Surveillance Video - Real-time access by a public authority emergency responder to surveillance video of a privately-controlled source is conditionally pre-authorized dependent on the existence of at least one pre-specified emergency condition, and recorded in a data processing system. A public authority emergency responder subsequently requests real-time access to the surveillance video (e.g., during an emergency), and if the pre-specified emergency condition is met, access is automatically granted, i.e., without the need for manual intervention. A pre-specified emergency condition could, e.g., be an alarm condition detected by a sensor at the site of the video surveillance, or a declared state of emergency, properly declared by an appropriate public official. | 05-15-2014 |
20140132765 | Automated Authorization to Access Surveillance Video Based on Pre-Specified Events - Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a data processing system. A requestor subsequently requests real-time access to the surveillance video (e.g., as a result of an alarm), and if the pre-specified automatically detectable condition is met, access is automatically granted, i.e., without the need for manual intervention. An automatically detectable condition could, e.g., be an alarm condition detected by a sensor at the site of the video surveillance. Alternatively, it could be a locational proximity of the requestor to the site of the video surveillance. Alternatively, it could be a previously defined time interval. | 05-15-2014 |
20140132772 | Automated Authorization to Access Surveillance Video Based on Pre-Specified Events - Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a data processing system. A requestor subsequently requests real-time access to the surveillance video (e.g., as a result of an alarm), and if the pre-specified automatically detectable condition is met, access is automatically granted, i.e., without the need for manual intervention. An automatically detectable condition could, e.g., be an alarm condition detected by a sensor at the site of the video surveillance. Alternatively, it could be a locational proximity of the requestor to the site of the video surveillance. Alternatively, it could be a previously defined time interval. | 05-15-2014 |
20140133831 | Providing Emergency Access to Surveillance Video - Real-time access by a public authority emergency responder to surveillance video of a privately-controlled source is conditionally pre-authorized dependent on the existence of at least one pre-specified emergency condition, and recorded in a data processing system. A public authority emergency responder subsequently requests real-time access to the surveillance video (e.g., during an emergency), and if the pre-specified emergency condition is met, access is automatically granted, i.e., without the need for manual intervention. A pre-specified emergency condition could, e.g., be an alarm condition detected by a sensor at the site of the video surveillance, or a declared state of emergency, properly declared by an appropriate public official. | 05-15-2014 |
20140136701 | Distributed Control of a Heterogeneous Video Surveillance Network - A surveillance video broker arbitrates access by multiple clients to multiple surveillance video sources. Both clients and sources register with the broker. Each source independently specifies respective clients permitted real-time access to its video and conditions of access, if any. Preferably, the video source is a local surveillance domain having one or more cameras, one or more sensors, and a local controller, the source specifying clients or client groups permitted access, and independently specifying conditions of access for each client or client group, where conditions may include scheduled events, non-scheduled events, such as alarms or emergencies, and/or physical proximity. The broker automatically authorizes real-time access according to pre-specified conditions. Preferably, the broker can also arbitrate alert notifications to the clients based on pre-specified notification criteria. | 05-15-2014 |
Patent application number | Description | Published |
20090247756 | Process for the Preparation of Hexahydroisoquinolines from 1,2,3,4-Tetrahydroisoquinolines - The present invention is directed to processes for the synthesis of morphinans. In particular, a process for the asymmetric reduction of an imine moiety in a 3,4-dihydroisoquinoline to produce a tetrahydroisoquinoline, followed by a Birch reduction to produce a hexahydroisoquinoline. In various embodiments, the 3,4-dihydroisoquinoline contains a phenol moiety protected with a labile protecting group. In other embodiments, the imine reduction reaction mixture contains silver tetrafluoroborate. | 10-01-2009 |
20100022776 | Preparation of Hexahydroisoquinolines from Dihydroisoquinolines - The present invention is directed to processes for the synthesis of morphinans. In particular, a process for the asymmetric reduction of an imine moiety in a 3,4-dihydroisoquinoline to produce a tetrahydroisoquinoline, followed by a Birch reduction to produce a hexahydroisoquinoline. In various embodiments, the 3,4-dihydroisoquinoline contains a phenol moiety protected with a labile protecting group. In other embodiments, the imine reduction reaction mixture contains silver tetrafluoroborate. | 01-28-2010 |