Patent application number | Description | Published |
20130113800 | SYSTEMS AND METHODS FOR 3-D SCENE ACCELERATION STRUCTURE CREATION AND UPDATING - Systems and methods for producing an acceleration structure provide for subdividing a 3-D scene into a plurality of volumetric portions, which have different sizes, each being addressable using a multipart address indicating a location and a relative size of each volumetric portion. A stream of primitives is processed by characterizing each according to one or more criteria, selecting a relative size of volumetric portions for use in bounding the primitive, and finding a set of volumetric portions of that relative size which bound the primitive. A primitive ID is stored in each location of a cache associated with each volumetric portion of the set of volumetric portions. A cache location is selected for eviction, responsive to each cache eviction decision made during the processing. An element of an acceleration structure according to the contents of the evicted cache location is generated, responsive to the evicted cache location. | 05-09-2013 |
20140333610 | SYSTEMS AND METHODS FOR 3-D SCENE ACCELERATION STRUCTURE CREATION AND UPDATING - Systems and methods for producing an acceleration structure provide for subdividing a 3-D scene into a plurality of volumetric portions, which have different sizes, each being addressable using a multipart address indicating a location and a relative size of each volumetric portion. A stream of primitives is processed by characterizing each according to one or more criteria, selecting a relative size of volumetric portions for use in bounding the primitive, and finding a set of volumetric portions of that relative size which bound the primitive. A primitive ID is stored in each location of a cache associated with each volumetric portion of the set of volumetric portions. A cache location is selected for eviction, responsive to each cache eviction decision made during the processing. An element of an acceleration structure according to the contents of the evicted cache location is generated, responsive to the evicted cache location. | 11-13-2014 |
20150042651 | Normal Offset Smoothing - During tracing of a primary ray in a 3-D space (e.g., a 3-D scene in graphics rendering), a ray is found to intersect a primitive (e.g., a triangle) located in the 3-D space. Secondary ray(s) may be generated for a variety of purposes. For example, occlusion rays may be generated to test occlusion of a point of intersection between the primary ray and primitive is illuminated by any of the light(s). An origin for each secondary ray can be modified from the intersection point based on characteristics of the primitive intersected. For example, an offset from the intersection point can be calculated using barycentric coordinates of the intersection point and interpolation of one or more parameters associated with vertices defining the primitive. These parameters may include a size of the primitive and differences between a geometric normal for the primitive and a respective additional vector supplied with each vertex. | 02-12-2015 |
Patent application number | Description | Published |
20090006729 | CACHE FOR A MULTI THREAD AND MULTI CORE SYSTEM AND METHODS THEREOF - According to one embodiment, the present disclosure generally provides a method for improving the performance of a cache of a processor. The method may include storing a plurality of data in a data Random Access Memory (RAM). The method may further include holding information for all outstanding requests forwarded to a next-level memory subsystem. The method may also include clearing information associated with a serviced request after the request has been fulfilled. The method may additionally include determining if a subsequent request matches an address supplied to one or more requests already in-flight to the next-level memory subsystem. The method may further include matching fulfilled requests serviced by the next-level memory subsystem to at least one requester who issued requests while an original request was in-flight to the next level memory subsystem. The method may also include storing information specific to each request, the information including a set attribute and a way attribute, the set and way attributes configured to identify where the returned data should be held in the data RAM once the data is returned, the information specific to each request further including at least one of thread ID, instruction queue position and color. The method may additionally include scheduling hit and miss data returns. Of course, various alternative embodiments are also within the scope of the present disclosure. | 01-01-2009 |
20090300651 | Thread To Thread Communication - Thread to thread communication is provided. A first thread registers with a gateway for receiving communication. Registration includes identifying a location for receiving messages. The gateway maps message payloads received from second threads to the location of the first thread. The first thread detects a payload in the location and consumes it for processing. | 12-03-2009 |
20100031268 | Thread ordering techniques - Techniques are described that can be used to ensure ordered computation and/or retirement of threads in a multithreaded environment. Threads may contain bundled instances of work, each with unique ordering restrictions relative to other instances of work packaged in other threads in the system. When applied to 3D graphics, video and image processing domains allow unrestricted processing of threads until reaching their critical sections. Ordering may be required prior to executing critical sections and beyond. | 02-04-2010 |
20110067035 | Thread to Thread Communication - Thread to thread communication is provided. A first thread registers with a gateway for receiving communication. Registration includes identifying a location for receiving messages. The gateway maps message payloads received from second threads to the location of the first thread. The first thread detects a payload in the location and consumes it for processing. | 03-17-2011 |
Patent application number | Description | Published |
20090164779 | FILE SYSTEM FILTER AUTHENTICATION - A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device. | 06-25-2009 |
20090172809 | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 07-02-2009 |
20090182919 | Media Card Command Pass Through Methods - Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions. | 07-16-2009 |
20090293117 | AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 11-26-2009 |
20090293118 | SYSTEMS FOR AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 11-26-2009 |
20100169222 | Method for Secure Storage and Delivery of Media Content - The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g. abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content) may be generated and loaded in a secure and efficient manner. | 07-01-2010 |
20100191962 | FILE SYSTEM FILTER AUTHENTICATION - A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to the challenge. A file system filter response is calculated at the file system filter using the challenge, and access to first content on the secure removable memory device is provided if the software entity response matches the file system filter response. | 07-29-2010 |
20120066412 | MEDIA CARD COMMAND PASS THROUGH METHODS - Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions. | 03-15-2012 |
20120151576 | METHOD AND SYSTEM FOR CREATING AND ACCESSING A SECURE STORAGE AREA IN A NON-VOLATILE MEMORY CARD - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 06-14-2012 |
Patent application number | Description | Published |
20090038377 | OIL MIGRATION SYSTEM - An apparatus and a system is provided that may be utilized to determine oil migration and oil displacement from a pre-oiled air filter. The present invention may also be utilized to determine if oil is displaced from the air filter onto a portion of the apparatus for visualization to a user. The present invention utilizes a demonstration apparatus having a system for forcing air through the oil subjected air filter thereby attempting to force displacement of the oil from the air filter. The apparatus utilizes a blowing means whereby the oil infused air filter is subject to higher than normal air flow and whereby the apparatus has a deflection portion whereby if oil is displaced from the air filter, it is deflected onto the deflection portion where it would be physically viewable to an observer present in the vicinity of the apparatus. | 02-12-2009 |
20100050878 | OIL MIGRATION SYSTEM - An apparatus and a system is provided that may be utilized to determine oil migration and oil displacement from a pre-oiled air filter. The present invention may also be utilized to determine if oil is displaced from the air filter onto a portion of the apparatus for visualization to a user. The present invention utilizes a demonstration apparatus having a system for forcing air through the oil subjected air filter thereby attempting to force displacement of the oil from the air filter. The apparatus utilizes a blowing means whereby the oil infused air filter is subject to higher than normal air flow and whereby the apparatus has a deflection portion whereby if oil is displaced from the air filter, it is deflected onto the deflection portion where it would be physically viewable to an observer present in the vicinity of the apparatus. | 03-04-2010 |
20110277641 | OIL MIGRATION SYSTEM - An apparatus and a system is provided that may be utilized to determine oil migration and oil displacement from a pre-oiled air filter. The present invention may also be utilized to determine if oil is displaced from the air filter onto a portion of the apparatus for visualization to a user. The present invention utilizes a demonstration apparatus having a system for forcing air through the oil subjected air filter thereby attempting to force displacement of the oil from the air filter. The apparatus utilizes a blowing means whereby the oil infused air filter is subject to higher than normal air flow and whereby the apparatus has a deflection portion whereby if oil is displaced from the air filter, it is deflected onto the deflection portion where it would be physically viewable to an observer present in the vicinity of the apparatus. | 11-17-2011 |
20130192347 | OIL MIGRATION SYSTEM - An apparatus and a system is provided that may be utilized to determine oil migration and oil displacement from a pre-oiled air filter. The present invention may also be utilized to determine if oil is displaced from the air filter onto a portion of the apparatus for visualization to a user. The present invention utilizes a demonstration apparatus having a system for forcing air through the oil subjected air filter thereby attempting to force displacement of the oil from the air filter. The apparatus utilizes a blowing means whereby the oil infused air filter is subject to higher than normal air flow and whereby the apparatus has a deflection portion whereby if oil is displaced from the air filter, it is deflected onto the deflection portion where it would be physically viewable to an observer present in the vicinity of the apparatus. | 08-01-2013 |
20140290345 | Oil Migration System - An apparatus and a system is provided that may be utilized to determine oil migration and oil displacement from a pre-oiled air filter. The present invention may also be utilized to determine if oil is displaced from the air filter onto a portion of the apparatus for visualization to a user. The present invention utilizes a demonstration apparatus having a system for forcing air through the oil subjected air filter thereby attempting to force displacement of the oil from the air filter. The apparatus utilizes a blowing means whereby the oil infused air filter is subject to higher than normal air flow and whereby the apparatus has a deflection portion whereby if oil is displaced from the air filter, it is deflected onto the deflection portion where it would be physically viewable to an observer present in the vicinity of the apparatus. | 10-02-2014 |
Patent application number | Description | Published |
20100287099 | RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION - Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules. | 11-11-2010 |
20110307382 | SYSTEM AND METHOD FOR IDENTIFYING A POINT OF COMPROMISE IN A PAYMENT TRANSACTION PROCESSING SYSTEM - A system, apparatus, and method for reducing fraud in payment transactions by identifying a potential point of compromise (POC) that may lead to subsequent fraudulent transactions, or confirming that a suspected point of compromise is in fact responsible for a security breach leading to fraudulent payment transactions. The invention is also directed to a system, apparatus, and method for identifying data or transaction characteristics that may be used to most effectively identify a point of compromise in a payment transaction syst | 12-15-2011 |
20150178735 | RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION - Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules. | 06-25-2015 |
Patent application number | Description | Published |
20110293354 | Airless cosmetics applicator with airtight sealing dual cap - An airless applicator may deliver high/low viscosity liquids or semi-liquids, and contains a valve controlling flow between a product reservoir and an intermediate pooling area, while a narrow opening between the intermediate pooling area and a product dispensing chamber controls flow therebetween. This arrangement prevents backflow to the product reservoir, precluding an influx of contamination therein. Product delivery is by specially adapted applicator heads. In one embodiment, a plurality of prongs, and openings into the product dispensing chamber, permit application of mascara onto eyelashes. Alternating prong heights increases effectiveness in applying mascara onto all sides of a user's lashes. Other applicator heads are configured for lip product applications such as for lipstick, and for eye products such as eyeliner and eye shadow. An air-tight sealing cap having a spring biased inner cap member may prevent moisture from escaping from the product dispensing chamber and prevent entry of contaminants therein. | 12-01-2011 |
20150037084 | Airless Cosmetics Applicator with Airtight Sealing Dual Cap - An airless applicator may deliver high/low viscosity liquids or semi-liquids, and contains a valve controlling flow between a product reservoir and an intermediate pooling area, while a narrow opening between the intermediate pooling area and a product dispensing chamber controls flow therebetween. This arrangement prevents backflow to the product reservoir, precluding an influx of contamination therein. Product delivery is by specially adapted applicator heads. In one embodiment, a plurality of prongs, and openings into the product dispensing chamber, permit application of mascara onto eyelashes. Alternating prong heights increases effectiveness in applying mascara onto all sides of a user's lashes. Other applicator heads are configured for lip product applications such as for lipstick, and for eye products such as eyeliner and eye shadow. An air-tight sealing cap having a spring biased inner cap member may prevent moisture from escaping from the product dispensing chamber and prevent entry of contaminants therein. | 02-05-2015 |