会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明授权
    • Printer with scanner function, and its control method and control program product
    • 带扫描仪功能的打印机及其控制方法和控制程序产品
    • US07859730B2
    • 2010-12-28
    • US10830784
    • 2004-04-22
    • Kazumi Yamada
    • Kazumi Yamada
    • G03F3/08
    • H04N1/00538H04N1/58H04N1/6019
    • When text is taken in with a scanner, the reflection of the light from a sheet of paper, etc. causes a tinge on the sheet of paper. The tinge around each letter is printed as minute dots, and the outlines of printed letters are blurred and the clearness or distinctness of the letters are decreased.When printing text taken in through a scanner unit 30, by reducing (or reducing to zero) the ratios of occurrence of small dots in a gradient range “n” or “m” of the data for printing (CMYK signals) generated from image data (RGB signals), or converting such ratios of occurrence of small dots into the ratios of occurrence of large dots based on the weight ratio, the blur of each letter that may be caused by the small dots can be reduced, and the clearness and distinctness of each letter can be improved.
    • 当用扫描仪拍摄文本时,来自一张纸等的光的反射在纸张上产生色调。 每个字母周围的色调打印为微小点,打印字母的轮廓模糊,字母的清晰度或明显性降低。 当通过扫描器单元30拍摄的文本通过在图像数据生成的打印数据(CMYK信号)的梯度范围“n”或“m”中减小(或减少到零)小点的出现比率 (RGB信号),或者根据重量比将小点的出现比例转换成大点的出现比例,可以减少由小点引起的每个字母的模糊,并且清晰度和清晰度 的每个字母可以改进。
    • 33. 发明授权
    • Using a single buffer for multiple I/O standards
    • 使用单个缓冲区用于多个I / O标准
    • US07855577B1
    • 2010-12-21
    • US12269149
    • 2008-11-12
    • Chai Yee TengKet Chiew Sia
    • Chai Yee TengKet Chiew Sia
    • H03K19/094H03K19/0175
    • H03K19/018514H03K19/017509H03K19/017581H03K19/018585
    • A buffer circuit for using one buffer for multiple differential I/O standards is disclosed. The buffer circuit includes a differential input buffer. The first input of the differential input buffer may receive an input and the second input is coupled to a switch. The switch may be a one-time-programmable switch. The switch has a coupling to transmit a signal to the second input of the differential input buffer. The switch may be programmed to selectively transmit different signals to the differential input buffer. The first input terminal of the switch may receive an inverted version of the input signal and the second input terminal of the switch may receive a reference voltage. The buffer may transmit an LVDS signal or an SSTL signal or an HSTL signal. Using one differential buffer for multiple I/O standards may reduce the overall die size and may save space on the die.
    • 公开了一种用于使用一个缓冲器用于多个差分I / O标准的缓冲电路。 缓冲电路包括差分输入缓冲器。 差分输入缓冲器的第一输入可以接收输入,第二输入耦合到开关。 开关可以是一次性可编程开关。 开关具有将信号传输到差分输入缓冲器的第二输入的耦合。 该开关可被编程为选择性地向差分输入缓冲器发送不同的信号。 开关的第一输入端子可以接收输入信号的反相形式,并且开关的第二输入端子可以接收参考电压。 缓冲器可以发送LVDS信号或SSTL信号或HSTL信号。 对于多个I / O标准使用一个差分缓冲器可能会降低整体管芯尺寸,并且可以节省管芯上的空间。
    • 34. 发明授权
    • Reverse donut model
    • 反向甜甜圈型号
    • US07849430B2
    • 2010-12-07
    • US12054317
    • 2008-03-24
    • Richard W. SmithHang KwanManzurul Khan
    • Richard W. SmithHang KwanManzurul Khan
    • G06F17/50G06F9/45
    • G06F17/5031G06F2217/84
    • A pruning algorithm for generating a reverse donut model (RDM) for running timing analysis for a block in an IC includes logic to reduce a hierarchical model of the IC to a single level flat model. A block from a plurality of blocks that make up the IC is identified from the single level flat model of the IC. The pruning algorithm is further used to initialize a timer and to define timing constraints associated with each of a plurality of input and output pins associated with the identified block. A RDM for the identified block is generated by identifying and including connectivity information associated with a plurality of input and output pins in an outer boundary of the identified block and at least one layer of interface connection between each of the plurality of input and output pins in the outer layer of the identified block and one or more circuit elements external to the identified block in the IC interfacing with each of the plurality of input and output pins in the identified block. The generated RDM acts as a blackbox for the identified block and is used in place of the identified block for running the timing analysis.
    • 用于生成用于对IC中的块运行时序分析的反向环形模型(RDM)的修剪算法包括将IC的分级模型减小到单个级别平面模型的逻辑。 从IC的单级平面型号识别来自构成IC的多个块的块。 修剪算法还用于初始化定时器并且定义与与所识别的块相关联的多个输入和输出引脚中的每一个相关联的定时约束。 通过识别并包括与所识别的块的外边界中的多个输入和输出引脚相关联的连通性信息以及多个输入和输出引脚中的每一个之间的至少一层接口连接来生成用于所识别的块的RDM 所识别的块的外层和IC中所识别的块外部的一个或多个电路元件与所识别的块中的多个输入和输出引脚中的每一个接口连接。 生成的RDM用作识别块的黑盒,并用于代替用于运行时序分析的标识块。
    • 35. 发明授权
    • Command and control of arbitrary resources in a peer-to-peer network
    • 命令和控制对等网络中的任意资源
    • US07849203B2
    • 2010-12-07
    • US10845508
    • 2004-05-12
    • Howard BerkeyGreg CorsonJohn Paul Bates
    • Howard BerkeyGreg CorsonJohn Paul Bates
    • G06F15/16
    • H04L67/104H04L29/08846H04L67/1068H04L67/28H04L67/2876
    • Provided is a method and apparatus for virtualizing access to resources in a distributed peer-to-peer (P2P) network. Specifically, a resource locally managed by a peer in the P2P network can be published such that other peers can identify the peer managing the resource. Any peer requesting access to the resource of another peer establishes communication to the peer managing the resource. After establishing communication, a proxy of the peer managing the resource can establish a proxy interface. The proxy interface operating on the peer requesting access, permits the peer requesting access to generate command and control data to control the resource. Thus, the peer requesting access believes that it manages the local resource, while in reality, the peer requesting access only has virtualized access to the resource.
    • 提供了一种用于虚拟化分布式对等(P2P)网络中的资源的访问的方法和装置。 具体来说,可以发布由P2P网络中的对等体本地管理的资源,使得其他对等体可以识别管理资源的对等体。 请求访问另一个对等体的资源的任何对等体建立与管理资源的对等体的通信。 建立通信后,管理资源的对等体的代理可以建立代理接口。 在对等体上操作的代理接口请求访问,允许对等体请求访问生成命令和控制数据以控制资源。 因此,对等体请求访问认为它管理本地资源,而实际上,对等请求访问仅具有对资源的虚拟访问。
    • 37. 发明授权
    • System and method for authentication of embedded RAID on a host RAID card
    • 用于主机RAID卡上嵌入式RAID认证的系统和方法
    • US07836219B1
    • 2010-11-16
    • US11054785
    • 2005-02-09
    • Fadi A. MahmoudGanapathy S. Sridaran
    • Fadi A. MahmoudGanapathy S. Sridaran
    • G06F3/00G06F9/445
    • G06F21/123
    • An invention is provided for authenticating software associated with an embedded device on a motherboard. An embodiment includes executing an option ROM BIOS for the embedded device. If a bit pattern read from a first memory located on the host card does not match a predetermined bit pattern, the option ROM BIOS is terminated. In another embodiment, a first memory address is provided to the address lines of a memory device located on the host card and a first set of data is output from the memory device, followed by a second memory address to output a second set of data. The second memory address is equal to the first memory address plus the maximum addressable size of the memory device. The first set of data is compared to the second data, and the option ROM BIOS is terminated if the first and second sets of data do not match.
    • 提供了一种用于认证与主板上的嵌入式设备相关联的软件的发明。 实施例包括为嵌入式设备执行选项ROM BIOS。 如果从位于主机卡上的第一存储器读取的位模式与预定位模式不匹配,则选项ROM BIOS终止。 在另一个实施例中,第一存储器地址被提供给位于主机卡上的存储器设备的地址线,并且第一组数据从存储器件输出,随后是第二存储器地址以输出第二组数据。 第二个存储器地址等于第一个存储器地址加上存储器件的最大寻址大小。 将第一组数据与第二数据进行比较,如果第一组数据和第二组数据不匹配,则选项ROM BIOS将被终止。
    • 39. 发明授权
    • Methods for data-smuggling
    • 数据走私方法
    • US07822935B2
    • 2010-10-26
    • US11772211
    • 2007-06-30
    • Amir Mosek
    • Amir Mosek
    • G06F12/00
    • G06F12/1441
    • The present invention discloses methods for an application, running on a host system, to access a restricted area of a storage device, the method including the steps of: providing a file system for running on the host system; restricting access, by the file system, to the restricted area; sending an indication, from the application to the storage device, that data being sent by the application to the storage device via the file system is intended for the restricted area; detecting the indication in the storage device; and making the data, residing in the restricted area, available for reading by the application upon receiving an application request. Preferably, the method further includes the step of: releasing wasted areas, of the storage device, for use by the file system. Preferably, the method further includes the step of: copying non-restricted data from a non-restricted area into the restricted area.
    • 本发明公开了一种在主机系统上运行以访问存储设备的受限区域的应用的方法,所述方法包括以下步骤:提供用于在所述主机系统上运行的文件系统; 限制文件系统访问限制区域; 从所述应用向所述存储设备发送由所述应用经由所述文件系统发送到所述存储设备的数据指示所述受限区域; 检测存储设备中的指示; 并且在接收到应用请求时,驻留在限制区域中的数据可供应用读取。 优选地,该方法还包括以下步骤:释放存储装置的浪费区域供文件系统使用。 优选地,该方法还包括以下步骤:将非受限制的数据从非限制区域复制到限制区域中。
    • 40. 发明授权
    • Erase history-based flash writing method
    • 擦除基于历史的闪存写入方式
    • US07814263B2
    • 2010-10-12
    • US11727986
    • 2007-03-29
    • Ori SternAmir Mosek
    • Ori SternAmir Mosek
    • G06F12/00
    • G11C16/102
    • A method for writing into a flash memory device includes calculating a physical block for writing data thereto, checking whether the calculated physical block has been erased since a last power-up of the device and if it has been erased writing the data, or, if it has not been erased performing a refresh operation thereby obtaining a newly erased block since a last power-up that the data can be written to. The newly erased block may be the calculated block or another block of the flash memory.
    • 一种用于写入闪速存储装置的方法包括:计算用于向其写入数据的物理块,检查所述计算的物理块是否已经从设备的最后上电并且已被擦除写入数据而被擦除,或者如果 由于可以写入数据的最后一次上电,所以没有擦除执行刷新操作从而获得新擦除的块。 新擦除的块可以是计算的块或闪存的另一块。