摘要:
Embodiments of the present invention provide a processor design that enables controller and I/O device power reduction and optimization. In a typical embodiment, a processing core is coupled to a set (e.g., three) of I/O blocks. The processing core provides for selective activation and/or deactivation of any of the I/O blocks. Two of the I/O blocks are coupled to individual voltage I/O components as well as individual external circuits. In one embodiment, the individual external circuits are coupled to individual voltage control components.
摘要:
Embodiments of the present invention provide a system for secure error detection and synchronous data tagging for high-speed data transfer (e.g., utilizing a set of SSD memory disk units). Specifically, in a typical embodiment, the system comprises a SSD memory disk unit in communication with a device driver. A first encoded communication stream will be generated with the device driver and sent via PCI-based channel (e.g., full duplex) to the SSD memory disk unit. The stream is received, synchronized, and decoded on the SSD memory disk unit. In turn, the SSD memory disk unit can generate and send a second encoded communication steam to the device driver.
摘要:
The invention provides a method, system, and program product for authenticating a user to a telephonic communication device. In one embodiment, the invention includes obtaining a reference sample of an authorized user's voice, storing the reference sample of the authorized user's voice, collecting a sample of the voice of a user of the telephonic communication device, comparing the sample of the voice of the user to the reference sample of the authorized user's voice, determining whether the user is the authorized user, and in the case that the user is determined not to be the authorized user, prohibiting use of the telephonic communication device.
摘要:
Embodiments of the present invention provide a system and method for authorizing the use of a biometric transaction card. Specifically, embodiments of the present invention provide a biometric card having a biometric sensor to determine whether the biometric information (fingerprint) is from human skin. In a typical embodiment, the cardholder approaches a magnetic reader with the card. The user places his/her finger on the SpO2 sensor of the card. The sensor estimates the SpO2 level. Card authorization is based, in part, on the estimated SpO2 level.
摘要:
Embodiments of the present invention provide time-varying barcodes in an active display for information exchange. Specifically, embodiments of the present invention provide a system and method for communicating information between electronic devices via a barcode image sequence. In a typical embodiment, a barcode image sequence is displayed on the display screen of a first electronic device. A second electronic device reads and decodes the barcode image sequence. The second electronic device displays an acknowledgement on the display screen of the second electronic device. The acknowledgement is read by the first electronic device.
摘要:
An improved solution for prioritizing conference call participants is provided. In an embodiment of the invention, a method includes detecting a sound of a first conference call participant; disabling a distribution of a sound of a second conference call participant upon the detecting; and enabling the distribution of the sound of the second conference call participant after an expiration of a time period. In an embodiment, a higher priority may be assigned to a specific participant, such as the host, an administrator, or manager.
摘要:
Embodiments of the present invention provide time-varying barcodes for information exchange. Specifically, embodiments of the present invention provide a system and method for communicating information between electronic devices via a time-varying barcode image sequence. In a typical embodiment, information to be transmitted is divided into packets. A barcode image is generated from each packet. Each barcode image is displayed sequentially with varying display times based on the complexity of the barcode image. A second electronic device reads and decodes the barcode image sequence until the entire information is received.
摘要:
Embodiments of the present invention provide a semiconductor sensor reliability system and method. Specifically, the present invention provides in-situ positioning of a reliability sensor (hereinafter sensors) within each functional block, as well as at critical locations, of a semiconductor system. The quantity and location of the sensors are optimized to have maximum sensitivity to known process variations. In general, the sensor models a behavior (e.g., aging process) of the location (e.g., functional block) in which it is positioned and comprises a plurality of stages connected as a network and a self-digitizer. Each sensor has a mode selection input for selecting a mode thereof and an operational trigger input for enabling the sensor to model the behavior. The model selection input and operation trigger enable the sensor to have an operational mode in which the plurality of sensors are subject to an aging process, as well as a measurement mode in which an age of the plurality of sensors is outputted.
摘要:
In general, embodiments of the present invention provide approaches for providing power to RFID transponders. In one embodiment, the RFID transponder is powered using a magnetic field generated by power lines. In another embodiment, the RFID transponder is powered using a field generated by a wireless network. In the case of the latter, the RFID transponder acts as a member of the wireless network. In so doing, the RFID transponder is granted user rights and controls, and can control devices that are available on the network
摘要:
Embodiments of the present invention provide a strong passive ad-hoc radio-frequency identification (RFID) network (the “network). The network typically includes an RFID receiver and N quantity of RFID tags coupled to one another. For example, a network under the present invention can include an RFID reader; a first RFID tag in communication with the RFID reader; and a second RFID tag in communication with the first RFID tag. The first RFID tag and the second RFID tag will have passive capacitance to allow them to store energy and data. In this example, the first RFID tag can be enabled to behave as an RFID reader. Moreover, the first RFID tag is positioned within a first field generated by the RFID reader, while the second RFID tag being in a second field generated by the first RFID tag, the second field generated using the energy stored in the first RFID tag. This type of tag to tag coupling/communication arrangement can continue for a number of tags. Not only does this allow for communication around physical obstacles, but it allows any RFID tag to be configured to perform a synchronized reader operation with the RFID reader.