Patent application number | Description | Published |
20090203339 | METHODS AND APPARATUS FOR PREDICTING A CHANNEL QUALITY INDICATOR IN A COMMUNICATION SYSTEM - Disclosed are methods and apparatus for predicting a channel quality indicator in a communication system, and in particular a delayed receiver. A disclosed method for determining the predictive channel quality indicator for a delayed receiver includes determining at least one channel quality indicator from a non-delayed receiver. The method also includes determining another channel quality indicator from the delayed receiver, and then calculating the predictive channel quality indicator for the delayed receiver through a function of the channel quality indicators from the non-delayed receiver and the channel quality indicator from the delayed receiver. Corresponding apparatus are also disclosed. | 08-13-2009 |
20110051832 | METHODS FOR DETERMINING RECONSTRUCTION WEIGHTS IN A MIMO SYSTEM WITH SUCCESSIVE INTERFERENCE CANCELLATION - Certain aspects provide a method for determining decoding order and reconstruction weights for decoded streams to be cancelled in a MIMO system with successive interference cancellation, based on estimates of the channel characteristics, the received composite signal and parameters of the system. | 03-03-2011 |
20110051865 | METHODS FOR DETERMINING DECODING ORDER IN A MIMO SYSTEM WITH SUCCESSIVE INTERFERENCE CANCELLATION - Certain aspects provide a method for determining decoding order and reconstruction weights for decoded streams to be cancelled in a MIMO system with successive interference cancellation, based on estimates of the channel characteristics, the received composite signal and parameters of the system. | 03-03-2011 |
20110268019 | USING JOINT DECODING ENGINE IN A WIRELESS DEVICE - A method for using a joint decoding engine in a wireless device is disclosed. A first symbol stream and a second symbol stream in a received multiple input multiple output (MIMO) signal is determined. A scaled channel estimate for a wireless transmission channel and a scaled noise covariance of the MIMO signal are also determined. The scaled channel estimate and the first symbol stream are whitened. Max log maximum a posteriori (MLM) processing is performed on the whitened first symbol stream to produce a first data stream. The first data stream may be de-rate matched and decoded to produce a decoded first data stream. | 11-03-2011 |
20120099446 | REPORTING OF CHANNEL QUALITY INDICATORS FOR A NON-LINEAR DETECTOR - Techniques for determining channel quality indicators (CQIs) for a non-linear detector at a user equipment (UE) are described. In one design, the UE may determine at least one parameter (e.g., at least one threshold) based on at least one constellation constrained capacity function. Each threshold may correspond to a maximum number of information bits for one stream when a particular modulation order is used for another stream. The UE may determine CQIs for multiple streams for the non-linear detector based on the at least one parameter. The UE may also select a precoding matrix (e.g., jointly with the CQIs) based on the at least one parameter. The UE may report the selected precoding matrix and the CQIs for the multiple streams. The UE may thereafter receive a transmission of the multiple streams, which may be transmitted based on the selected precoding matrix and the CQIs. | 04-26-2012 |
20130128940 | METHODS FOR DETERMINING DECODING ORDER IN A MIMO SYSTEM WITH SUCCESSIVE INTERFERENCE CANCELLATION - Certain aspects provide a method for determining decoding order and reconstruction weights for decoded streams to be cancelled in a MIMO system with successive interference cancellation, based on estimates of the channel characteristics, the received composite signal and parameters of the system. | 05-23-2013 |
Patent application number | Description | Published |
20080233969 | CALL ROUTING BASED ON PHYSICAL LOCATION OF CALLED PARTY - A system may include a locator device to track a location of a user, store information identifying locations of a group of telephone devices, and identify one telephone device of the group of telephone devices based on the location of the one telephone device and the location of the user in response to an incoming telephone call request for the user. | 09-25-2008 |
20080240401 | COMMUNICATION CENTER METHODS AND APPARATUS - A communications center supports sales and/or customer support services corresponding to a plurality of business affiliations. Operator terminals within the communications center are configurable. A management module manages the allocation of the operator terminals between the plurality of different business affiliations being supported by the communications center. The management module loads a set of configuration information into an operator terminal to match a determined business affiliation with a customer's communications device capabilities. At different times, e.g. corresponding to an initial communications session and a follow-on communications session, the same customer may be connected to different physical operator terminals and be communicating with different actual operators; however, from the perspective of the customer, the customer is made to think that the communication is with the same operator terminal and same operator. | 10-02-2008 |
20090085770 | SYSTEMS, DEVICES, AND METHODS FOR PROVIDING ALERT TONES - Systems, devices, and methods for alerting pedestrians as to the presence of a vehicle are provided. The system for providing alert tones may include a personal communication device, such as a mobile terminal, a vehicle communication system, and an output device. A driver of a vehicle equipped with a vehicle communication system may select an alert tone to download to his vehicle directly using the vehicle communication system or indirectly via a communications link between the personal communication device and the vehicle communication system. Upon approaching a pedestrian, the driver may actuate the vehicle communication system to sound the alert tone through the output device by interacting with an input device, such as a button or a switch. Actuation may also be caused by a voice command or automatically, through the detection of an object within a certain distance of the vehicle via one or more sensors. | 04-02-2009 |
20090085803 | METHOD AND SYSTEM FOR PROVIDING PREFERENCE BASED LOCATION AWARE CONTENT - A system and method in accordance with exemplary embodiments may include receiving data associated with retrieving location specific downloadable content for a Global Positioning System (GPS) enabled device via a network, retrieving location specific downloadable content at least based on an approximate location of the Global Positioning System (GPS) enabled device, and sending location specific downloadable content to the Global Positioning System (GPS) enabled device via the network. | 04-02-2009 |
20090146831 | WIRELESS ENABLED DEVICE TRACKING SYSTEM AND METHOD - Systems and methods are provided for determining a location of one or more wireless devices. The method may include identifying an address associated with at least one wireless device and determining a phase relationship between a plurality of signals generated by the wireless device. The method further includes determining a location of the wireless device based on the phase relationship and the address associated with the wireless device. | 06-11-2009 |
20100125895 | DOMAIN BASED AUTHENTICATION SCHEME - In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary Internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and URIs that make up the rest of the web page, session or application. | 05-20-2010 |
20100287559 | ENERGY-AWARE COMPUTING ENVIRONMENT SCHEDULER - A method includes receiving a process request, identifying a current state of a device in which the process request is to be executed, calculating a power consumption associated with an execution of the process request, and assigning an urgency for the process request, where the urgency corresponds to a time-variant parameter to indicate a measure of necessity for the execution of the process request. The method further includes determining whether the execution of the process request can be delayed to a future time or not based on the current state, the power consumption, and the urgency, and causing the execution of the process request, or causing a delay of the execution of the process request to the future time, based on a result of the determining. | 11-11-2010 |
20110047552 | ENERGY-AWARE PROCESS ENVIRONMENT SCHEDULER - A device receives a request associated with a process, and determines one or more current states of one or more process resources used to execute the process request. The device also calculates a power consumption associated with execution of the process request by the one or more process resources, and assigns an urgency for the process request, where the urgency corresponds to a time-variant parameter that indicates a measure of necessity for the execution of the process request. The device further determines whether the execution of the process request can be delayed to a future time based on the one or more current states, the power consumption, and the urgency, and causes, based on the determination, the process request to be executed or delayed to the future time. | 02-24-2011 |
20110167266 | SYSTEMS AND METHODS FOR DOCUMENT CONTROL USING PUBLIC KEY ENCRYPTION - Systems and methods for document control using public key encryption are provided. An interface program serves as a software interface between user applications used to create and access documents and a data storage system that stores the documents in an encrypted form. When a document is saved for the first time, information corresponding to the destruction of that document is obtained either from a user or in accordance with predefined criteria. The document is encrypted and stored with a pointer to an encryption key on a token/key server. When the document is subsequently accessed, the interface program will read the pointer and attempt to retrieve the key. If the key has expired in accordance with the destruction policy, the document is inaccessible. Otherwise, the document is decrypted using the key. Multiple documents may be saved according to the same destruction policy and even the same key, thereby greatly enhancing the ability to “destroy” documents regardless of their location with minimal process. | 07-07-2011 |
20110296503 | DOMAIN BASED AUTHENTICATION SCHEME - In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary Internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and URIs that make up the rest of the web page, session or application. | 12-01-2011 |
20120039459 | COMMUNICATION CENTER METHODS AND APPARATUS - A communications center supports sales and/or customer support services corresponding to a plurality of business affiliations. Operator terminals within the communications center are configurable. A management module manages the allocation of the operator terminals between the plurality of different business affiliations being supported by the communications center. The management module loads a set of configuration information into an operator terminal to match a determined business affiliation with a customer's communications device capabilities. At different times, e.g. corresponding to an initial communications session and a follow-on communications session, the same customer may be connected to different physical operator terminals and be communicating with different actual operators; however, from the perspective of the customer, the customer is made to think that the communication is with the same operator terminal and same operator. | 02-16-2012 |
20120158953 | SYSTEMS AND METHODS FOR MONITORING AND MITIGATING INFORMATION LEAKS - Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization's web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer's servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization's web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization's network which will obscure an intent the organization has with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space. | 06-21-2012 |
20120175466 | SPACE DEBRIS REMOVAL USING UPPER ATMOSPHERE - The systems and methods of the invention modulate atmospheric gases to temporarily increase the amount of atmospheric particles in the path of the debris, in order to decelerate the debris and accelerate natural orbital decay to the point of atmospheric re-entry. In one aspect of the invention, clearing the space debris includes propelling a plume of atmospheric gases substantially orthogonal to the path of the debris such that the debris collides with the gaseous plume as it passes through the plume. Increased atmospheric drag from the gaseous particles of the plume in the path of the debris obstructs a forward propagation of the debris and gradually decelerates the debris, leading eventually to atmospheric recapture. Embodiments of the invention can be employed in any number of applications, including without limitation, clearing debris in the low-earth orbit (LEO) which is particularly susceptible to debris build-up, de-orbiting non-refuse payloads from orbits, and clearing debris from geosynchronous orbits. | 07-12-2012 |
20130014117 | ENERGY-AWARE COMPUTING ENVIRONMENT SCHEDULER - A method includes receiving a process request, identifying a current state of a device in which the process request is to be executed, calculating a power consumption associated with an execution of the process request, and assigning an urgency for the process request, where the urgency corresponds to a time-variant parameter to indicate a measure of necessity for the execution of the process request. The method further includes determining whether the execution of the process request can be delayed to a future time or not based on the current state, the power consumption, and the urgency, and causing the execution of the process request, or causing a delay of the execution of the process request to the future time, based on a result of the determining. | 01-10-2013 |
20130219400 | ENERGY-AWARE COMPUTING ENVIRONMENT SCHEDULER - A method includes receiving a process request, identifying a current state of a device in which the process request is to be executed, calculating a power consumption associated with an execution of the process request, and assigning an urgency for the process request, where the urgency corresponds to a time-variant parameter to indicate a measure of necessity for the execution of the process request. The method further includes determining whether the execution of the process request can be delayed to a future time or not based on the current state, the power consumption, and the urgency, and causing the execution of the process request, or causing a delay of the execution of the process request to the future time, based on a result of the determining. | 08-22-2013 |
20130298256 | SYSTEMS AND METHODS FOR MONITORING AND MITIGATING INFORMATION LEAKS - Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization's web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer's servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization's web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization's network which will obscure an intent with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space. | 11-07-2013 |
20130306799 | SPACE DEBRIS REMOVAL USING UPPER ATMOSPHERE - The systems and methods of the invention modulate atmospheric gases to temporarily increase the amount of atmospheric particles in the path of the debris, in order to decelerate the debris and accelerate natural orbital decay to the point of atmospheric re-entry. In one aspect of the invention, clearing the space debris includes propelling a plume of atmospheric gases substantially orthogonal to the path of the debris such that the debris collides with the gaseous plume as it passes through the plume. Increased atmospheric drag from the gaseous particles of the plume in the path of the debris obstructs a forward propagation of the debris and gradually decelerates the debris, leading eventually to atmospheric recapture. Embodiments of the invention can be employed in any number of applications, including without limitation, clearing debris in the low-earth orbit (LEO) which is particularly susceptible to debris build-up, de-orbiting non-refuse payloads front orbits, and clearing debris from geosynchronous orbits. | 11-21-2013 |
20140123264 | DOMAIN BASED AUTHENTICATION SCHEME - In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary Internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and URIs that make up the rest of the web page, session or application. | 05-01-2014 |
Patent application number | Description | Published |
20100088739 | Hardware Based Mandatory Access Control - Hardware mechanisms are provided for performing hardware based access control of instructions to data. These hardware mechanisms associate an instruction access policy label with an instruction to be processed by a processor and associate an operand access policy label with data to be processed by the processor. The instruction access policy label is passed along with the instruction through one or more hardware functional units of the processor. The operand access policy label is passed along with the data through the one or more hardware functional units of the processor. One or more hardware implemented policy engines associated with the one or more hardware functional units of the processor are utilized to control access by the instruction to the data based on the instruction access policy label and the operand access policy label. | 04-08-2010 |
20100125708 | Recursive Logical Partition Real Memory Map - A recursive logical partition real memory map mechanism is provided for use in address translation. The mechanism, which is provided in a data processing system, receives a first address based on an address submitted from a process of a currently active logical partition. The first address is translated into a second address using a recursive logical partition real memory (RLPRM) map data structure for the currently active logical partition. The memory is accessed using the second address. The RLPRM map data structure provides a plurality of translation table pointers, each translation table pointer pointing to a separate page table for a separate level of virtualization in the data processing system with the data processing system supporting multiple levels of virtualization. | 05-20-2010 |
20100125709 | Logical Partition Memory - A mechanism is provided, in a data processing system, for accessing memory based on an effective address submitted by a process of a partition. The mechanism may translate the effective address into a virtual address using a segment look-aside buffer. The mechanism may further translate the virtual address into a partition real address using a page table. Moreover, the mechanism may translate the partition real address into a system real address using a logical partition real memory map for the partition. The system real address may then be used to access the memory. | 05-20-2010 |
20100125915 | Secure Computer Architecture - A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure computer architecture, for transmission across a data communication link. The data is converted, by the component, to one or more first fixed length frames. The one or more first fixed length frames are then transmitted, by the component, on the data communication link in a continuous stream of frames. The continuous stream of frames includes one or more second fixed length frames generated when no data is available for inclusion in the frames of the continuous stream. | 05-20-2010 |
20110035532 | Secure Recursive Virtualization - A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM) or an operating system (OS) to a new domain. An initial program for the new domain is loaded into the portion of memory. Secure recursive virtualization firmware (SVF) in the data processing system is called to request that the new domain be generated. A determination is made as to whether the call is from a privileged domain or a non-privileged domain. Responsive to the request being from a privileged domain, all access to the new domain is removed from any other domain in the data processing system. Responsive to receiving an indication that the new domain has been generated, an execution of the initial program is scheduled. | 02-10-2011 |
20120331466 | Secure Recursive Virtualization - A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM) or an operating system (OS) to a new domain. An initial program for the new domain is loaded into the portion of memory. Secure recursive virtualization firmware (SVF) in the data processing system is called to request that the new domain be generated. A determination is made as to whether the call is from a privileged domain or a non-privileged domain. Responsive to the request being from a privileged domain, all access to the new domain is removed from any other domain in the data processing system. Responsive to receiving an indication that the new domain has been generated, an execution of the initial program is scheduled. | 12-27-2012 |
20130019307 | Secure Computer Architecture - A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure computer architecture, for transmission across a data communication link. The data is converted, by the component, to one or more first fixed length frames. The one or more first fixed length frames are then transmitted, by the component, on the data communication link in a continuous stream of frames. The continuous stream of frames includes one or more second fixed length frames generated when no data is available for inclusion in the frames of the continuous stream. | 01-17-2013 |
20130227704 | PROCESSOR AND DATA PROCESSING METHOD WITH NON-HIERARCHICAL COMPUTER SECURITY ENHANCEMENTS FOR CONTEXT STATES - Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a context control unit that uses context identifier tags associated with corresponding contexts to control access by the contexts to context information (i.e., context states) contained in the processor's non-stackable and/or stackable registers. For example, in response to an access request, the context control unit can grant a specific context access to a register only when that register is tagged with a specific context identifier tag. If the register is tagged with another context identifier tag, the contents of the specific register are saved in a context save area of memory and the previous context states of the specific context are restored to the specific register before access can be granted. The context control unit can also provide such computer security enhancements while still facilitating authorized cross-context and/or cross-level communications. | 08-29-2013 |