Patent application number | Description | Published |
20090085737 | Battery-Centric Tamper Resistant Circuitry and Portable Electronic Devices - Tamper-resistant circuitry for use with an electronic device is provided, where the electronic device comprises a plurality of connections for coupling the tamper-resistant circuitry to functional circuitry for performing functionality in connection with the electronic device. The tamper-resistant circuitry comprises an interface for coupling to the plurality of connections and a power source for coupling to at least one connection in the plurality of connections. The tamper-resistant circuitry further comprises circuitry operable to evaluate a measure of an operational parameter related to the power source and in response to a signal at at least one connection in the plurality of connections, to provide an acceptable range for the operational parameter, and to inhibit standard operation of the functional circuitry in response to detecting an anomaly in the functional circuitry by detecting that the measure is outside the acceptable range. | 04-02-2009 |
20090164666 | Method for Creating Bit Planes Using a Digital Signal Processor and Double Index Addressing Direct Memory Access - According to one embodiment of the present invention, a method for creating bit planes from frame data for a digital mirror device is disclosed including forming data elements comprising bits of equal significance from a plurality of pixel data in the frame data, the forming including using dual index direct memory address operations. | 06-25-2009 |
20090221232 | Portable Telephone With Unitary Transceiver Having Cellular and RFID Functionality - An electronic device. The device comprises circuitry for transmitting and receiving radio frequency signals and a modulator/demodulator, coupled to the circuitry for transmitting and receiving. The device also comprises circuitry for controlling the modulator/demodulator so that in a first time period the modulator/demodulator provides an RFID excitation signal to the circuitry for transmitting and receiving and so that in a second time period the modulator/demodulator provides a cellular communications signal to the circuitry for transmitting and receiving. | 09-03-2009 |
20090322531 | CRYPTOGRAPHIC LOCK, METHOD OF OPERATION THEREOF AND SECURE CONTAINER EMPLOYING THE SAME - Various cryptographic locks for securing assets, secure containers and methods of operating a cryptographic lock. One embodiment of a cryptographic lock includes: (1) a shape memory alloy (SMA) having a first and second phase, wherein the first phase inhibits access to an asset and the second phase allows access to the asset and (2) an RFID transponder, coupled to the SMA, configured to receive an authentication signal from an RFID transceiver and, based thereon, energize the SMA to temporarily change the SMA from the first phase to the second phase. | 12-31-2009 |
20110092805 | DIGITAL DRUG DELIVERY - For delivery of a chemical to a target region of a subject's brain, an apparatus comprising a storage medium on which is stored digital representations of subject-specific selective visual stimuli that, when viewed, selectively stimulate blood flow to the target area of the brain; and an electronic display device coupled thereto and configured for converting the stored digital representations to images viewable by the subject; wherein the one or more selective visual stimuli were determined by exposing the subject to a plurality of potential stimuli; measuring the blood flow response to multiple regions of the brain, including the target area and one or more non-target areas; comparing the blood flow responses to the potential stimuli, and selecting as selective stimuli potential stimuli that result in relatively more blood flow to the target area and relatively less blood flow one or more non-target areas. | 04-21-2011 |
20110188391 | INTERRELATED WiFi AND USB PROTOCOLS AND OTHER APPLICATION FRAMEWORK PROCESSES, CIRCUITS AND SYSTEMS - A master electronic circuit ( | 08-04-2011 |
20120106528 | UNIFIED PROTOCOL STACK FOR COLOCATED WIRELESS TRANSCEIVERS - A system and method for accessing a wireless network via unified protocol stack. In one embodiment a wireless networking system includes a wireless device. The wireless device includes a first wireless transceiver, a second wireless transceiver, a processor, and a unified protocol stack. The first wireless transceiver is configured for communication via a first wireless network. The second wireless transceiver is configured for communication via a second wireless network. The unified protocol stack includes first protocols defined for accessing the first wireless network and second protocols defined for accessing the second wireless network. The unified protocol stack includes instructions that cause the processor to access the first wireless network via the first wireless transceiver using one of the second protocols. | 05-03-2012 |
20130128238 | Display Systems and Methods for Mobile Devices - Display systems and methods for mobile devices and mobile devices are disclosed. In one embodiment, a display system for a mobile device is provided. The mobile device is handheld and includes a primary display screen. The display system includes an auxiliary screen and a connecting device coupled to the auxiliary screen and attachable to the mobile device. An image from the mobile device is producible on the auxiliary screen. The display system is removable from the mobile device. | 05-23-2013 |
20130286973 | Interrelated WiFi and USB Protocols and Other Application Framework Processes, Circuits and Systems - A master electronic circuit ( | 10-31-2013 |
20150085725 | POWER EFFICIENT METHOD FOR WI-FI HOME AUTOMATION - A method for automation and control of a wireless device in a WiFi environment. The method includes a wireless mobile device configured with a soft access point (softAP) transmitting probe requests to home automation devices and traditional stationary access points. The wireless mobile device periodically wakes up to scan for other services, sends a probe request, authenticates the received probe response from the another device and receives control information via the received probe response. | 03-26-2015 |