Abstract:
A method, apparatus, and storage medium for processing video data. According to one embodiment, data encoded in a first high level encoding format is partially decoded (503). The partially decoded data is encoded in accordance with a second high level encoding format (505).
Abstract:
A computer system is programmed with a general purpose electronic conference (GPEC) application (22) having a conference manager (26) including a plurality of functions for setting up and exchanging "business cards" (38) electronically, thereby modeling the business card exchange behavior of conference participants of face-to-face conferences. In particular, the functions for setting up and exchanging "business cards" electronically include the ability to set up a special international name (41h) displayable in most languages, and automatically substitute the name of a conference participant with the international name in the event a received electronic "business card" was originated from the conferencing system with an incompatible language. As a result, usability of an international electronic conference is improved.
Abstract:
A wireless authentication system to control an operating state of a node such as a computer, door control mechanism or any multistate product based on the proximity of an authorized user to the node. The wireless authentication system comprises a security device implemented within the node (110) and a user authentication token ("token") in possession of the authorized user. A Challenge/Response protocol (140) is configured between the security device and the token (120). The first successful Challenge/Response message exchange between the security device and the token (120) places the node (110) in an operational state allowing the authorized user access to the contents and/or networked resources of the node (110). Later Challenge/Response message exchanges are set to occur periodically to check whether the authorized user possessing the token has left the node (110) unattended thereby causing the node (110) to be placed in a non-operational state.
Abstract:
A cryptographic device (140) formed as an integrated circuit encapsulated in an integrated circuit package. The cryptographic device (140) decrypts information having a first encrypted format (202) that is input into the cryptographic device producing information in a non-encrypted format (241). The information in the non-encrypted format (241) is subsequently re-encrypted into a second encrypted format (223) which is output from the cryptographic device (140). The decryption and re-encryption operations are accomplished entirely within the cryptographic device (140).
Abstract:
An apparatus and method for forming solder interconnection structures that reduce thermo-mechanical stresses at the solder joints of a semiconductor device (42) and its supporting substrate (44). In one embodiment, the solder interconnection structure of the present invention comprises a semiconductor device and a substrate having a plurality of solder connections (46) extending from the substrate to electrode or bond pads on the semiconductor device. A multilayer structure is disposed between the semiconductor device and substrate filling the gap formed by the solder connections. The multilayer structure includes a first layer (40A) and a second layer (40B), each having a different coefficient of thermal expansion. Thus, in accordance with the present invention, the stress concentration points are moved away from the solder joints of the semiconductor device and substrate to a point located between the first and second layers of the filler structure.
Abstract:
A system for controlling power consumption in a microprocessor. The microprocessor fetches an instruction (210) from memory (350). The instruction is decoded (215), producing an operation flow of at least one operation. Then, power micro-operations are introduced into the operation flow. These power micro-operations provide power consumption control functions for those functional units which are required to execute the various operations which have been decoded (215) from the fetched instruction (210). The operations and power micro-operations are then scheduled for dispatch to the appropriate execution units. The scheduling is based on the availability of the appropriate execution units and the validity of operation data (225). The operations and power micro-operations are dispatched to the appropriate execution units (230), where the operations and power micro-operations are executed (235). The execution results are subsequently committed to the processor state in the original program order (240).
Abstract:
The clock generator (10) generates an output (fout) of known frequency from an internally generated high frequency signal (finternal) of unknown frequency and from a low frequency input signal (fin) of known frequency. The frequency of the internal signal is determined (18) by counting the number of transitions during one period of the input signal. The output is generated based upon the determined frequency of the internal signal. A software control unit (12) calculates a divide factor for use by a programmable divider (20) based upon the period of the input signal, the count of transitions, and the desired period for the output. The internal signal is routed through the programmable divider to divide the internal signal by an amount sufficient to produce an output having a period approximately equal to the desired output period. The clock multiplier also includes a mechanism (12) for determining whether the actual frequency of the output remains within an acceptable range of frequencies and for reprogramming the programmable divider, if necessary, to reset the output frequency to within the acceptable range of frequencies.
Abstract:
Accelerating transfer of control of access to a shared resource (13) between a plurality of controllers (25 and 26) having access to a bus (12) used by the shared resource (13) includes detecting an access request by a bus controller (25 or 26). Immediately after detecting an access request by a bus controller (25 or 26), commencing a fast bus transfer sequence if the bus (12) is not in use, and commencing a slow bus transfer when the bus (12) use is over if the bus (12) is in use.
Abstract:
An apparatus for cooling the components within an enclosed computer system. The apparatus includes a first compartment (11) containing a power supply (17) and a fan (12), a second compartment (25) containing a variety of electrical components and an air duct (13) containing the computer system microprocessor (14). The air duct directs an air flow from the exterior of the computer system enclosure across the microprocessor to an inlet opening (29) of the first compartment. Holes are provided within the air duct at points downstream of the microprocessor to permit an air flow from the second compartment into the air duct. The fan generates an air stream through the cooling system and exhausts to the exterior of the computer system enclosure.
Abstract:
A method and apparatus (100) for recovering missing teleconference object data during an electronic conference starts with a second participant being assigned to provide requested teleconference object data to a first participant. The first participant later determines that the second participant is unavailable (601). The first participant broadcasts a message (602) to the plurality of participants to determine if another participant has the requested conference object data. A third participant replies to the first participant if it has the requested teleconference object data (603). The first participant assigns the third participant to provide the requested teleconference object data to the first participant (604).