10908 patents
Page 21 of 546
Utility
Technologies for securing network function virtualization images
31 Oct 23
Technologies for securing a virtualization network function (VNF) image includes a security server to generate a wrapping cryptographic key to wrap a private key of the VNF image and replace the private key with the wrapped private key to secure the private key.
Changzheng Wei, Weigang Li, Danny Y. Zhou, Junyuan Wang, Hari K. Tadepalli, Rashmin N. Patel
Filed: 31 Mar 18
Utility
Method and apparatus for supporting image processing, and computer-readable recording medium for executing the method
31 Oct 23
A support for image processing is provided, comprising: (a) detecting respective face regions from images consecutively photographed for a first person at predetermined time intervals by an image pickup unit to display images of the face regions detected in relation to the first person in a first region of a screen, and providing a user interface for indicating that a specific face image is selected from the face images of the first person displayed in the first region; (b) additionally displaying the specific face image through a second region adjacent to the first region; and (c) displaying a synthesized image using the specific face image as a representative face of the first person, when the specific face image displayed through the second region is selected.
Daesung Kim, Jaihyun Ahn
Filed: 6 Jun 22
Utility
Enhanced feedback for secure mode wireless communications
31 Oct 23
This disclosure describes systems, methods, and devices related to enhanced feedback for secure mode wireless communications.
Qinghua Li, Feng Jiang, Jonathan Segev, Xiaogang Chen, Assaf Gurevitz, Gadi Shor, Robert Stacey
Filed: 24 Dec 20
Utility
Multiple trigger events based conditional handover in 5G NR networks
31 Oct 23
A UE may decode a radio-resource control (RRC) reconfiguration message comprising a conditional handover (CHO) configuration (CHO-Config) which may identify a CHO configuration for at least one target candidate cell.
Yi Guo, Candy Yiu, Youn Hyoung Heo, Bharat Shrestha
Filed: 23 Nov 20
Utility
Multiple-input multiple-output channel access
31 Oct 23
This disclosure describes systems, methods, and devices related to multiple-input multiple-output (MIMO) channel access.
Cheng Chen, Carlos Cordeiro, Claudio Da Silva, Oren Kedem
Filed: 5 Mar 21
Utility
Multi-link device re-setup and transition
31 Oct 23
Multi-link device (MLD) devices and transitions are described.
Po-Kai Huang, Ido Ouzieli, Robert J. Stacey, Danny Alexander, Daniel F. Bravo, Laurent Cariou, Arik Klein
Filed: 23 Dec 20
Utility
Chip assemblies
31 Oct 23
A chip assembly may include a package substrate that includes one or more pins.
Loke Yip Foo, Choong Kooi Chee, Teong Guan Yew
Filed: 5 Nov 20
Utility
Offload computing protocol
31 Oct 23
Systems and methods for are provided for offloading computing tasks from constrained devices.
Fearghal O'Hare, Michael Nolan, James A. O'Neill
Filed: 20 Dec 21
Utility
Instruction prefetch mechanism
31 Oct 23
An apparatus to facilitate data prefetching is disclosed.
Vasileios Porpodas, Guei-Yuan Lueh, Subramaniam Maiyuran, Wei-Yu Chen
Filed: 24 Mar 21
Utility
Boot code load system
31 Oct 23
Examples described herein provide a hardware-software interface solution reads the boot code in segments into a buffer.
Bharat S. Pillilli, Eswaramoorthi Nallusamy
Filed: 7 Feb 20
Utility
Methods and systems for budgeted and simplified training of deep neural networks
31 Oct 23
Methods and systems for budgeted and simplified training of deep neural networks (DNNs) are disclosed.
Yiwen Guo, Yuqing Hou, Anbang Yao, Dongqi Cai, Lin Xu, Ping Hu, Shandong Wang, Wenhua Cheng, Yurong Chen, Libin Wang
Filed: 25 Jan 22
Utility
Using network interface controller (NIC) queue depth for power state management
24 Oct 23
A computer-implemented method can include receiving a queue depth for a receive queue of a network interface controller (NIC), determining whether a power state of a central processing unit (CPU) core mapped to the receive queue should be adjusted based on the queue depth, and adjusting the power state of the CPU core responsive to a determination that the power state of the CPU core should be adjusted.
Brian J. Skerry, Ira Weiny, Patrick Connor, Tsung-Yuan C. Tai, Alexander W. Min
Filed: 30 Jun 21
Utility
Apparatus and method for speculative execution information flow tracking
24 Oct 23
An apparatus and method for tracking speculative execution flow and detecting potential vulnerabilities.
Carlos Rozas, Francis McKeen, Pasquale Cocchini, Meltem Ozsoy, Matthew Fernandez
Filed: 27 Dec 19
Utility
Efficient receive interrupt signaling
24 Oct 23
Methods for performing efficient receive interrupt signaling and associated apparatus, computing platform, software, and firmware.
Linden Cornett, Anil Vasudevan, Parthasarathy Sarangam, Kiran Patil
Filed: 11 Dec 19
Utility
Data management for edge architectures
24 Oct 23
Data management for edge architected computing systems extends current storage and memory schemes of edge resources to expose interfaces to allow a device, such as an endpoint or client device, or another edge resource, to specify criteria for managing data originating from the device and stored in an edge resource, and extends the storage and memory controllers to manage data in accordance with the criteria, including removing stored data that no longer satisfies the criteria.
Francesc Guim Bernat, Ramanathan Sethuraman, Karthik Kumar, Mark A. Schmisseur, Brinda Ganesh
Filed: 13 Aug 21
Utility
Multichip package link error detection
24 Oct 23
First data is received on a plurality of data lanes of a physical link and a stream signal corresponding to the first data is received on a stream lane identifying a type of the first data.
Venkatraman Iyer, Robert G. Blankenship, Mahesh Wagh, Zuoguo Wu
Filed: 14 Apr 22
Utility
Delivering interrupts to user-level applications
24 Oct 23
Systems and methods for delivering interrupts to user-level applications.
Gilbert Neiger, Rajesh M. Sankaran
Filed: 31 Aug 21
Utility
Tracking caloric expenditure using sensor driven fingerprints
24 Oct 23
System and techniques for tracking caloric expenditure using sensor driven fingerprints are described herein.
Lama Nachman, Hong Lu, Jennifer Healey, Rahul C. Shah, Jonathan J Huang, Rita H Wouhaybi, Giuseppe Raffa
Filed: 30 Mar 16
Utility
Memory scanning methods and apparatus
24 Oct 23
An example apparatus includes a scan manager to add a portion of a page of physical memory from a first sequence of mappings to a second sequence of mappings in response to determining the second sequence includes an address corresponding to the portion of the page of physical memory, and a scanner to scan the first sequence and the second sequence to determine whether at least one of first data in the first sequence or second data in the second sequence includes a pattern indicative of malware.
Michael LeMay, David M. Durham, Men Long
Filed: 23 Jul 21
Utility
Protected data accesses using remote copy operations
24 Oct 23
Examples herein relate to an interface selectively providing access to a memory region for a work request from an entity by providing selective access to a physical address of the memory region and selective access to a cryptographic key for use by a memory controller to access the memory region.
Ned Smith, Kshitij A. Doshi, Francesc Guim Bernat, Kapil Sood, Tarun Viswanathan
Filed: 10 Apr 20