Patent application number | Description | Published |
20090143026 | System and Method for Adaptive Polarization Diversity Between Closely Spaced Antennas - An electronic device comprises a transceiver and a probe. The transceiver is connected to a first antenna and a second antenna. The first and second antennas are configured to one of transmit and receive radio frequency signals. The first and second antennas are configured to exhibit a polarized diversity. The probe re-establishes the polarized diversity when the polarized diversity has been disrupted. | 06-04-2009 |
20090146887 | Reduced Volume Antennas - A device includes (a) a first wireless communications arrangement which is capable of at least one of transmitting and receiving. In addition, the device includes (b) a first antenna coupled to the first wireless communications arrangement and (c) a second wireless communications arrangement which is capable of at least one of transmitting and receiving. Furthermore, the device includes (d) a second antenna coupled to the second wireless communications arrangement. The second antenna acts as a parasitic element for the first antenna. | 06-11-2009 |
20100123550 | Coaxial Antenna Connection - A device comprises an RFID transceiver disposed on a first side of a printed circuit board; an antenna disposed on a second side of the printed circuit board; and a cable passing through the printed circuit board, a first end of the cable being connected to the RFID transceiver, a second end of the cable being connected to the antenna. | 05-20-2010 |
20110193750 | SYSTEMS AND METHODS FOR SETTING A MULTI-BAND ANTENNA BASED ON LOCATION - The present disclosure includes systems and methods for setting a multi-band tunable antenna, a quad-band antenna, or the like based on location information. Specifically, the present invention may include a mobile computing device, circuitry connected to an antenna, an operational method, and the like where location data is used to set operating frequencies and other parameters in the antenna. The location data may be provided from a wireless base station, from a global position system (GPS), or the like. Advantageously, the present invention simplifies antenna design and operation, allowing use of a tunable dual-band antenna in lieu of conventional quad-band antennas. Further, the present invention includes automated systems and methods for tuning the multi-band tunable antenna without requiring user input. | 08-11-2011 |
Patent application number | Description | Published |
20100134252 | Polarized RFID Antenna with Spatial Diversity - A system, apparatus, and techniques for interrogating a Radio Frequency Identification (RFID) tag are disclosed. The system includes an RFID reader that includes a pivotable polarized antenna for reading a reader/tag link. The antenna moves at a specific frequency over a specific distance resulting in reader/tag links being moved out of a null region of the reader. Advantageously, by pivoting the antenna, the antenna apparatus minimizes signal fading and improves signal quality from tags. | 06-03-2010 |
20120162037 | MOUNTING ELECTRONIC COMPONENTS ON AN ANTENNA STRUCTURE - A method and apparatus for mounting electronic components on an antenna structure includes at least one conductive antenna element | 06-28-2012 |
20120238210 | CLOSE PROXIMITY ANTENNA MEASUREMENT AND TUNING - A method and apparatus for providing close proximity antenna measurement and tuning, includes a first receive-only antenna, a second antenna operable in a transmit mode, a tuning circuit coupled to the first antenna, a transmitter coupled to the second antenna, a receiver coupled to the first antenna, the receiver operable to measure a power into the first antenna delivered by a signal from the second antenna driven by the transmitter, and a processor coupled to the tuning circuit, transmitter, and receiver, the processor operable to step changes in the tuning circuit until a substantially maximum power of the signal is measured by the receiver. | 09-20-2012 |
20130120194 | DISTRIBUTED COMB TAPPED MULTIBAND ANTENNA - A distributed comb tapped multiband antenna structure includes a PIFA-like antenna radiator having tap structures, and a counterpoise to the antenna radiator, wherein the tap structures include shunt connections to the counterpoise. | 05-16-2013 |
20130141296 | CAVITY BACKED CROSS-SLOT ANTENNA APPARATUS AND METHOD - An antenna apparatus and method includes an orthogonal slot antenna which overcomes the limitations associated with RF choke between the adjacent slots through various feed techniques. A cavity backed cross-slot antenna includes a horizontal slot antenna, a vertical slot antenna sharing a center portion with the horizontal slot antenna, a first feed for the horizontal slot antenna, and a second feed for the vertical slot antenna, the first feed and the second feed provided to the shared center portion. Another cavity backed cross-slot antenna includes a horizontal slot antenna, a vertical slot antenna, the horizontal slot antenna and the vertical slot antenna share a center portion therebetween, a first feed feeding both halves of the horizontal slot antenna, and a second feed feeding both halves of the vertical slot antenna. | 06-06-2013 |
20130222113 | REFLECTOR-BACKED RFID SLOT ANTENNA WITH A COSECANT-SQUARED-LIKE RADIATION PATTERN - An antenna method and apparatus includes a slot antenna configured within a ground plane and a conductive reflector backing the slot antenna and configured to reflect RF energy. The slot antenna, ground plane, and the reflector cooperatively form a reflector-backed slot antenna and a radial-mode waveguide providing an inverse, mirrored, substantially cosecant-squared radiation pattern. | 08-29-2013 |
Patent application number | Description | Published |
20100319051 | CONTROLLING ACCESS TO RESOURCES BY HOSTED ENTITIES - Controlling resource access by entities hosted by an execution extension environment via entity identifiers associated with the resources or with the execution extension environment. Policy sets define the access to the resources. Each policy set includes a principal identifier for execution extension environment, a resource identifier for one of the resources, and access rights. The principal identifier or the resource identifier includes one of the entity identifiers. Access requests from entities are evaluated by comparing the entity identifiers to the policy sets. In some embodiments, the policy sets implement access control for web browsers hosting executable code that attempts to access resources on a computing device. | 12-16-2010 |
20100323716 | CONTROLLING AD DELIVERY TO MOBILE CLIENTS - Systems and methods for controlling ad delivery to mobile clients while maintaining user privacy are herein provided. One exemplary method involves a location broker service. The method includes receiving, at an ad delivery service, a location use token from a mobile client, which may be a single use token. The method includes sending, from the ad delivery service, the location use token to the location broker service for verification at the location broker service. The method includes receiving, at the ad delivery service, the mobile client location from the location broker service based on the verification. The method includes delivering, from the ad delivery service, a location-targeted ad to the mobile client at the mobile client location, where the delivering is further based on a geographic density of a plurality of mobile clients. An advertiser using the ad delivery service may be billed based on location use token history. | 12-23-2010 |
20120095979 | PROVIDING INFORMATION TO USERS BASED ON CONTEXT - Selecting and providing context information relevant to a user at a particular time and location. Input parameters such as a location and time are selected. Context information is obtained for the selected location and time based on the input parameters. Exemplary input parameters include a user activity history, user content such as calendar appointments, social networking data, and a state of a computing device of the user (e.g., as collected by sensors of the computing device). The computing device of the user presents the obtained context information to the user at the selected location and time. | 04-19-2012 |
20120108221 | AUGMENTING COMMUNICATION SESSIONS WITH APPLICATIONS - Embodiments include applications as participants in a communication session such as a voice call. The applications provide functionality to the communication session by performing commands issued by the participants during the communication session to generate output data. Example functionality includes recording audio, playing music, obtaining search results, obtaining calendar data to schedule future meetings, etc. The output data is made available to the participants during the communication session. | 05-03-2012 |
20120322459 | MOBILE COMMUNICATION DEVICE MAINTAINING LIFETRAILS IN A BATTERY EFFICIENT MANNER - A method is used to develop and maintain a user's lifetrail, which is a historical record specifying the location of the user while in possession of a mobile communication device. A mobile device determines its current location by extracting a beacon ID from a signal source and transmitting it to a remotely-located server, which accesses a look-up table to find the corresponding location of the signal source represented by the beacon ID. The location may be specified in accordance with a spatial compression technique. The server transmits the signal source location back to the mobile device so that the mobile device knows that it is located within the coverage area of the signal source. Battery power is conserved by collecting the beacon IDs when it is receiving the beacon signals for some other purpose and not necessarily solely for the purpose of determining its current location. Battery power can be further conserved by deferring the resolution of the beacon IDs so that they are not necessarily associated with their corresponding location when they are received, but only at some later convenient time. In some cases resolution of the beacon IDs may be performed using social graph data received from a social network. | 12-20-2012 |
20140068085 | CONTROLLING ACCESS TO RESOURCES BY HOSTED ENTITIES - Controlling resource access by entities hosted by an execution extension environment via entity identifiers associated with the resources or with the execution extension environment. Policy sets define the access to the resources. Each policy set includes a principal identifier for execution extension environment, a resource identifier for one of the resources, and access rights. The principal identifier or the resource identifier includes one of the entity identifiers. Access requests from entities are evaluated by comparing the entity identifiers to the policy sets. In some embodiments, the policy sets implement access control for web browsers hosting executable code that attempts to access resources on a computing device. | 03-06-2014 |
20140365513 | PROVIDING INFORMATION TO USERS BASED ON CONTEXT - Selecting and providing context information relevant to a user at a particular time and location. Input parameters such as a location and time are selected. Context information is obtained for the selected location and time based on the input parameters. Exemplary input parameters include a user activity history, user content such as calendar appointments, social networking data, and a state of a computing device of the user (e.g., as collected by sensors of the computing device). The computing device of the user presents the obtained context information to the user at the selected location and time. | 12-11-2014 |