Patent application number | Description | Published |
20140033297 | APPARATUS FOR CONTROLLING PROCESSOR EXECUTION IN A SECURE ENVIRONMENT - Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager. | 01-30-2014 |
20140282685 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 09-18-2014 |
20140282808 | SYSTEMS AND METHODS FOR ASSEMBLING AND EXTRACTING COMMAND AND CONTROL DATA - The present disclosure relates to systems and methods for assembling and extracting command and control data. In embodiments of the present disclosure, the command and control data is segmented and inserted into multiple packet headers. The header packets are identified by flags such as “First portion,” “Middle portion,” “Last portion,” or “Null Byte.” When a receiver extracts the command and control data from the headers, it tracks the flags associated with the headers. The command and control data is saved to buffer in association with its associated flag. The receiver uses the flags to determine when all command and control data headers have been received. The command and control data is then reconstructed and used to decrypt audio visual content. | 09-18-2014 |
20150016607 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 01-15-2015 |
20150016608 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content, in embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 01-15-2015 |
20150113585 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 04-23-2015 |
20150143105 | USB INTERFACE FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The secure processor may connect to the device via a standard connection, such as via a USB 3.0 connector. | 05-21-2015 |
Patent application number | Description | Published |
20090023406 | ENHANCED RADIO SYSTEMS AND METHODS - An enhanced radio system is disclosed that provides for the capture and playback of one or more radio stations. The user may tune to a station, or scan through stations, rewind to hear what was missed (even while the system is turned off), and fast-forward through undesired content. The system allows a user to rate content, and to be notified when that content is being played on any station. The system may recognize content as it is broadcast and may jump to desirable content, save a copy of desirable content, or skip over undesirable content. The system may make radio station recommendations. The system may support multiple sets of configuration information to allow its use by multiple listeners and in multiple locations. The system allows the user to respond easily to radio content, download and upload audio content, and send radio content to another user. The system may allow a user to download information about content that the user wishes to record a copy of. The system may include security features to prevent the unauthorized downloading, uploading, and saving of copies of the radio content. The system may provide other radio related and radio content related information. The system may provide a karaoke mode. The system may also allow the user to integrate a telephone with the radio. The system may report usage information to a collection facility. | 01-22-2009 |
20090258677 | ALTERNATE USER INTERFACES FOR MULTI TUNER RADIO DEVICE - A method, device, system, and media are directed to controlling a multi-tuner radio. A voice command may be received and/or filtered. An operation of the radio may be modified based on the voice command. A gesture input may be received through a gesture pad. Another operation of the multi-tuner radio may be modified based on the received gesture input. A fingerprint may be recognized with a gesture pad. A user may be authenticated based on the recognized fingerprint. The operation or the other operation may be personalized based on the fingerprint. User training may be provided for the gesture input. | 10-15-2009 |
Patent application number | Description | Published |
20080301403 | SYSTEM FOR INTEGRITY PROTECTION FOR STANDARD 2N-BIT MULTIPLE SIZED MEMORY DEVICES - An apparatus including a first circuit and a second circuit. The first circuit may be configured to generate one or more command signals, a read data path control signal and one or more write data path control signals in response to an integrity protection control signal and one or more arbitration signals. The second circuit may be configured to write data to a memory and read data from the memory in response to the one or more command signals, the read data path control signal and the one or more write data path control signals. In a first mode, the data may be written and read without integrity protection. In a second mode the data may be written and read with integrity protection, and the integrity protection is written and read separately from the data. | 12-04-2008 |
20110276727 | QUANTUM BURST ARBITER AND MEMORY CONTROLLER - An apparatus comprising an arbiter circuit, a protocol engine circuit and a channel router circuit. The arbiter circuit may be configured to determine a winning channel from a plurality of channel requests based on a first criteria. Each of the plurality of channel requests may represent a burst of data having a fixed length aligned to an address boundary of a memory. The protocol engine circuit may be configured to receive a signal from the arbiter circuit indicating the winning channel. The protocol engine circuit may also be configured to perform a memory protocol at a granularity equal to the burst of data. The channel router circuit may be configured to present the plurality of channel requests to the arbiter circuit and the protocol engine circuit. | 11-10-2011 |
20110296068 | OPTIMIZED ARBITER USING MULTI-LEVEL ARBITRATION - An apparatus comprising a first sub-arbiter circuit and a second sub-arbiter circuit. The first sub-arbiter circuit may be configured to determine a winning channel from a plurality of channel requests based on a first criteria. The second sub-arbiter circuit may be configured to determine a winning channel received from the plurality of channel requests based on a second criteria. The second sub-arbiter may also be configured to optimize the order of the winning channels from the first sub-arbiter by overriding the first sub-arbiter if the second criteria creates a more efficient data transfer. | 12-01-2011 |
20110296124 | PARTITIONING MEMORY FOR ACCESS BY MULTIPLE REQUESTERS - An apparatus comprising a plurality of buffers and a channel router circuit. The buffers may be each configured to generate a control signal in response to a respective one of a plurality of channel requests received from a respective one of a plurality of clients. The channel router circuit may be configured to connect one or more of the buffers to one of a plurality of memory resources. The channel router circuit may be configured to return a data signal to a respective one of the buffers in an order requested by each of the buffers. | 12-01-2011 |
20110296214 | POWER SAVINGS AND/OR DYNAMIC POWER MANAGEMENT IN A MEMORY - An apparatus comprising a plurality of buffers and a memory controller. The plurality of buffers may each be configured to generate an access request signal in response to a respective one of a plurality of channel requests received from a respective one of a plurality of clients. The memory controller circuit may be configured to generate a clock enable signal in response to the plurality of access request signals. The clock enable signal may be configured to initiate entering and exiting a power savings mode of a memory circuit. | 12-01-2011 |
20130019050 | FLEXIBLE FLASH COMMANDS - A method of controlling a flash media system. The method includes providing a flash lane controller having a processor control mode and creating and presenting soft contexts. The soft contexts generally place the flash lane controller into the processor control mode. In the processor control mode, the flash lane controller stores the entire soft context, finishes executing any outstanding contexts, suspends normal hardware automation, and then executes the soft context. | 01-17-2013 |
20130019051 | META DATA HANDLING WITHIN A FLASH MEDIA CONTROLLER - A method for handling meta data stored in a page of a flash memory within a flash media controller. The method generally includes (i) defining the meta data on a per context basis, where the context is defined on a per page basis, (ii) when a size of the meta data is less than or equal to a predefined threshold, storing the complete meta data within a structure of the context, and (iii) when the size of the meta data is greater than the predefined threshold, defining meta data pointers within the context. | 01-17-2013 |
20130019052 | EFFECTIVE UTILIZATION OF FLASH INTERFACE - An apparatus including a first circuit, a second circuit, and a third circuit. The first circuit may be configured to maintain die-based information used for operation of a flash lane controller (FLC). The second circuit may be configured to manage contexts that are actively being processed by the flash lane controller (FLC). The third circuit may be configured to perform pipeline execution of a plurality of the contexts managed by the second circuit. | 01-17-2013 |
20130019053 | FLASH CONTROLLER HARDWARE ARCHITECTURE FOR FLASH DEVICES - A flash media controller including one or more dedicated data transfer paths, one or more flash lane controllers, and one or more flash bus controllers. The one or more flash lane controllers are generally coupled to the one or more dedicated data transfer paths. The one or more flash bus controllers are generally coupled to the one or more flash lane controllers. | 01-17-2013 |
20140043918 | AUTOMATED CONTROL OF OPENING AND CLOSING OF SYNCHRONOUS DYNAMIC RANDOM ACCESS MEMORY ROWS - An apparatus including a protocol engine and a built-in self test (BIST) engine. The built-in self test (BIST) engine is coupled to the protocol engine. The built-in self test (BIST) engine may be configured to directly control when to open and close rows of a synchronous dynamic random access memory (SDRAM) during double data rate (DDR) operations. | 02-13-2014 |
20140177371 | SUSPEND SDRAM REFRESH CYCLES DURING NORMAL DDR OPERATION - An apparatus comprising a test circuit and a protocol circuit. The test circuit may be configured to generate a plurality of control signals in response to one or more read data signals. The protocol circuit may be configured to generate a plurality of interface signals in response to the plurality of control signals. The protocol engine suspends a refresh operation during a normal operation of the apparatus. | 06-26-2014 |
20140359395 | PROTECTION OF DATA IN MEMORY - A method for protecting data in a memory is disclosed. The method generally includes steps (A) to (D). Step (A) converts a logical address of one of a plurality of logical units to a physical address of a corresponding one of a plurality of physical units. Each physical unit is configured to store (i) data from a corresponding one of the logical units, (ii) respective error correction information and (iii) respective verification information. Step (B) writes a particular one of the physical units to the memory. Step (C) reads a portion of the particular physical unit from the memory. The portion includes the respective verification information. The respective verification information includes an indication of the logical address. Step (D) verifies the writing according to the respective verification information in the portion. | 12-04-2014 |
Patent application number | Description | Published |
20100102974 | Diagnostic and response systems and methods for fluid power systems - Diagnostic and response systems and methods for a fluid power system acquire data from pressure and temperature sensors disposed in the fluid power system, analyze the data in a failure algorithm to build a history of cumulative damage to hoses in the fluid power system, communicates an indication of potential imminent hose failure to a central location when a level of the cumulative damage indicates imminent failure of a hose, analyze the information at the central location to determine an appropriate response, and transmit information about the fluid power system, including location, and identification of the hose about to fail to a response unit. The response unit responds to the location and replaces the component prior to failure, or the communication might include information that the hose has failed, such that the response unit replaces the failed hose to return the fluid power system to normal operation. | 04-29-2010 |
20100106461 | Diagnostic and response systems and methods for fluid power systems - Diagnostic and response systems and methods for a fluid power system acquire data from pressure and temperature sensors disposed in the fluid power system, analyze the data in a failure algorithm to build a history of cumulative damage to hoses in the fluid power system, communicates an indication of potential imminent hose failure to a central location when a level of the cumulative damage indicates imminent failure of a hose, analyze the information at the central location to determine an appropriate response, and transmit information about the fluid power system, including location, and identification of the hose about to fail to a response unit. The response unit responds to the location and replaces the component prior to failure, or the communication might include information that the hose has failed, such that the response unit replaces the failed hose to return the fluid power system to normal operation. | 04-29-2010 |
20100206415 | HEATED FLUID CONDUIT END COVERS, SYSTEMS AND METHODS - A fluid conduit body having a semi-conductive material disposed therein and at least one wire coupling an electrical power supply to the conduit to provide an electrical current therethrough to heat the fluid conduit also has an end cover molded over a fitting fitted to an end of the conduit and over an end of the wire coupling the power supply to an end of the conduit. Alternatively, a fluid conduit heating system employs a semi-conductive sleeve disposed over a fluid conduit with the sleeve extending at least partially over a fitting fitted to an end of the conduit. An electrical power supply is coupled to each end of the sleeve to provide an electrical current through the semi-conductive sleeve to heat the sleeve and the fluid conduit. An end cover is molded over at least a portion of the fitting and the sleeve extending thereover. | 08-19-2010 |
20100209085 | Heated fluid conduits, systems and methods - A heated fluid conduit has a body with a semi-conductive material disposed therein with an electrical power supply coupled to the conduit to provide a voltage across the conduit and a current therethrough, heating the fluid conduit. A fluid conduit heating system comprises a semiconductive sleeve disposed over a fluid conduit and an electrical power supply coupled to the ends of the sleeve to provide a voltage across the sleeve and a resulting current through the semiconductive sleeve, heating the sleeve and conduit Alternatively, one terminal of the electrical power supply is coupled to each end of the sleeve or conduit, and another terminal of the electrical power supply is coupled to the sleeve or conduit therebetween, to provide parallel heating circuits. | 08-19-2010 |
20110297266 | Overmolded standoff and method for abrasion routing protection of a hose - An hose standoff comprises a sleeve molded onto a hose and a standoff flange extending circumferentially from the sleeve. The flange contacts a surface to which the hose is adjacent, spacing the hose away from the surface and any proximate edges. The sleeve may extend from the flange, along the hose, in at least one direction to protect the hose from abrasion or cutting by an edge extending perpendicular from the surface toward the hose. A metal collar may be crimped onto the hose with the sleeve overmolding the collar. Also, a fabric covering may be disposed over the hose with the collar crimped over the fabric covering and the sleeve overmolding the collar and at least a portion of the fabric covering. Preferably the sleeve overmold contacts and bonds or otherwise mechanically locks with the fabric covering and/or the underlying hose. | 12-08-2011 |