Patents by Inventor Antonio S. Cheng
Antonio S. Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11789565Abstract: A lid controller hub (LCH) comprising processing components located in the lid of a mobile computing device, such as a laptop, processes sensor data generated by input sensors (microphones, cameras, touchscreen) and provides for improved and enhanced experiences over existing devices. For example, the LCH provides hardened privacy and the synchronization of touch display activities with the display refresh rate, the latter providing for a smoother and more responsive touch experience over existing designs. The LCH enables continuous gestures comprising touch gesture and in-air gesture portions as well as multi-plane gestures in which an initial touch gesture places the device into a mode or context in which it recognizes and acts upon subsequent in-air gestures. Touch operations of a mobile computing device can be based on user presence, user engagement, and a level of user interaction with the device.Type: GrantFiled: December 26, 2020Date of Patent: October 17, 2023Assignee: Intel CorporationInventors: Kunjal S. Parikh, Antonio S. Cheng, Paul S. Diefenbaugh, Jackson Tsai, Edward James Raleigh, Vishal Ravindra Sinha, Chung-yu Liang, Aleksander Magi, Yifan Li, Matt King
-
Publication number: 20230140108Abstract: Various systems and methods for controlling states of a portable device when connected with a wireless display device are described herein. A portable device is configured to initiate establishment of a wireless connection between the portable device and a wireless display device for the portable device to cast output to the wireless display device; receive an indication of a user absent event, the user absent event triggered by human presence sensing circuitry of the wireless display device; determine whether an exception exists; and control a state of the portable device based on whether the exception exists.Type: ApplicationFiled: December 27, 2022Publication date: May 4, 2023Inventors: Shuki Perlman, Chia-Hung Sophia Kuo, Antonio S. Cheng, Moorthy Rajesh, Sathvik Reddy Gaddam, Glen J. Anderson
-
Publication number: 20210132769Abstract: A lid controller hub (LCH) comprising processing components located in the lid of a mobile computing device, such as a laptop, processes sensor data generated by input sensors (microphones, cameras, touchscreen) and provides for improved and enhanced experiences over existing devices. For example, the LCH provides hardened privacy and the synchronization of touch display activities with the display refresh rate, the latter providing for a smoother and more responsive touch experience over existing designs. The LCH enables continuous gestures comprising touch gesture and in-air gesture portions as well as multi-plane gestures in which an initial touch gesture places the device into a mode or context in which it recognizes and acts upon subsequent in-air gestures. Touch operations of a mobile computing device can be based on user presence, user engagement, and a level of user interaction with the device.Type: ApplicationFiled: December 26, 2020Publication date: May 6, 2021Inventors: Kunjal S. Parikh, Antonio S. Cheng, Paul S. Diefenbaugh, Jackson Tsai, Edward James Raleigh, Vishal Ravindra Sinha, Chung-yu Liang, Aleksander Magi, Yifan Li
-
Patent number: 10754456Abstract: A method for power-efficient touch input, in which touch sensor data from a touch input is obtained by touch circuitry. Touch sensor data is obtained from touch input at touch circuitry included in a device that also includes a system-on-a-chip (SOC) and a display controller stack outside of the SOC. The touch sensor data is stored in a buffer. When the SOC is in a low-power state, the touch sensor data is communicated to the display controller stack for immediate display.Type: GrantFiled: December 26, 2018Date of Patent: August 25, 2020Assignee: Intel CorporationInventors: Antonio S. Cheng, Yifan Li, Paul Diefenbaugh, Vishal Sinha, Kathy Bui
-
Patent number: 9785447Abstract: Systems and methods may provide for assuming control over a processor in response to an operating system (OS) request to transition the processor into a sleeping state and transitioning the processor into an intermediate state that has a shorter wake latency than the sleeping state. Additionally, the processor may be maintained in the intermediate state until a wake event is detected. In one example, one or more power lowering operations may be reversed in response to the wake event.Type: GrantFiled: June 27, 2014Date of Patent: October 10, 2017Assignee: Intel CorporationInventors: Antonio S. Cheng, Siddharth Shah
-
Patent number: 9753519Abstract: Methods and systems may include a human interface device (HID) and logic to place the HID in a blocked state in response to a request to power off the system. The logic can also use a speculative start-up heuristic to establish one or more subsequent operating states for the system while the HID is in the blocked state, wherein the background automatic state transitions may maximize battery life when a user is not present. In addition, the HID may be removed from the blocked state in response to a request to power on the system. Accordingly, the speculative start-up heuristic can make system “ready-to-use” before the user actually interacts with any inputs (e.g. power button, or touch screen) of the system.Type: GrantFiled: October 14, 2011Date of Patent: September 5, 2017Assignee: Intel CorporatoinInventors: Antonio S. Cheng, Faraz A. Siddiqi
-
Patent number: 9753557Abstract: An apparatus for fast inking a touch display is described herein. The system for fast inking a touch display can include receiving touch input and generate touch sensor data. The system can include a graphics processing unit (GPU) including a fast inker and a display pipeline. The GPU can transmit human interface device (HID) data generated from the touch sensor data to a writing application memory and the fast inker. The fast inker can convert the HID data into inking data to be sent to the display pipeline through a direct hardware path. The writing application can convert the HID data into inking data to be sent to the display pipeline. The system can also include a touch display to display pixels marked according to the inking data received by the display pipeline.Type: GrantFiled: October 26, 2015Date of Patent: September 5, 2017Assignee: Intel CorporationInventors: Arvind Kumar, Ajay V. Bhatt, Balaji Vembu, Murali Ramadoss, Antonio S. Cheng, John J. Valavi, Chaitanya R. Gandra
-
Publication number: 20170115754Abstract: An apparatus for fast inking a touch display is described herein. The system for fast inking a touch display can include receiving touch input and generate touch sensor data. The system can include a graphics processing unit (GPU) including a fast inker and a display pipeline. The GPU can transmit human interface device (HID) data generated from the touch sensor data to a writing application memory and the fast inker. The fast inker can convert the HID data into inking data to be sent to the display pipeline through a direct hardware path. The writing application can convert the HID data into inking data to be sent to the display pipeline. The system can also include a touch display to display pixels marked according to the inking data received by the display pipeline.Type: ApplicationFiled: October 26, 2015Publication date: April 27, 2017Applicant: INTEL CORPORATIONInventors: Arvind Kumar, Ajay V. Bhatt, Balaji Vembu, Murali Ramadoss, Antonio S. Cheng, John J. Valavi, Chaitanya R. Gandra
-
Publication number: 20150378748Abstract: Systems and methods may provide for assuming control over a processor in response to an operating system (OS) request to transition the processor into a sleeping state and transitioning the processor into an intermediate state that has a shorter wake latency than the sleeping state. Additionally, the processor may be maintained in the intermediate state until a wake event is detected. In one example, one or more power lowering operations may be reversed in response to the wake event.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: ANTONIO S. CHENG, SIDDHARTH SHAH
-
Publication number: 20140215248Abstract: Methods and systems may include a human interface device (HID) and logic to place the HID in a blocked state in response to a request to power off the system. The logic can also use a speculative start-up heuristic to establish one or more subsequent operating states for the system while the HID is in the blocked state, wherein the background automatic state transitions may maximize battery life when a user is not present. In addition, the HID may be removed from the blocked state in response to a request to power on the system. Accordingly, the speculative start-up heuristic can make system “ready-to-use” before the user actually interacts with any inputs (e.g. power button, or touch screen) of the system.Type: ApplicationFiled: October 14, 2011Publication date: July 31, 2014Inventors: Antonio S. Cheng, Faraz A. Siddiqi
-
Patent number: 8250374Abstract: Described herein is an alteration of the normal reset sequence of a programmable microprocessor to perform a cryptographic verification of a block of memory before executing any instructions from the memory. A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.Type: GrantFiled: May 20, 2010Date of Patent: August 21, 2012Assignee: Intel CorporationInventors: Antonio S. Cheng, Kirk D. Brannock
-
Patent number: 8028341Abstract: In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a protection indicator of a protection record maintained outside of an application's data space with a memory location, and preventing access to the memory location based on the status of the protection indicator. In such manner, more secure operation is provided, as malicious code or other malware is prevented from accessing protected memory locations. Other embodiments are described and claimed.Type: GrantFiled: October 27, 2009Date of Patent: September 27, 2011Assignee: Intel CorporationInventors: Antonio S. Cheng, Francis X. McKeen
-
Publication number: 20100228997Abstract: A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.Type: ApplicationFiled: May 20, 2010Publication date: September 9, 2010Inventors: Antonio S. Cheng, Kirk D. Brannock
-
Patent number: 7765392Abstract: A programmable processor calculates a hash value of a memory region, then monitors program operation to detect a security monitoring system initialization. The hash value is added to extend a security measurement sequence if the security monitoring system initialization clears a security state. Processors that implement similar methods, and systems using such processors, are also described and claimed.Type: GrantFiled: June 29, 2006Date of Patent: July 27, 2010Assignee: Intel CorporationInventors: Antonio S. Cheng, Kirk D. Brannock
-
Patent number: 7757098Abstract: A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.Type: GrantFiled: June 27, 2006Date of Patent: July 13, 2010Assignee: Intel CorporationInventors: Kirk D. Brannock, Antonio S. Cheng
-
Patent number: 7673345Abstract: In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a protection indicator of a protection record maintained outside of an application's data space with a memory location, and preventing access to the memory location based on the status of the protection indicator. In such manner, more secure operation is provided, as malicious code or other malware is prevented from accessing protected memory locations. Other embodiments are described and claimed.Type: GrantFiled: March 31, 2005Date of Patent: March 2, 2010Assignee: Intel CorporationInventors: Antonio S. Cheng, Francis X. McKeen
-
Publication number: 20100050266Abstract: In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a protection indicator of a protection record maintained outside of an application's data space with a memory location, and preventing access to the memory location based on the status of the protection indicator. In such manner, more secure operation is provided, as malicious code or other malware is prevented from accessing protected memory locations. Other embodiments are described and claimed.Type: ApplicationFiled: October 27, 2009Publication date: February 25, 2010Inventors: Antonio S. Cheng, Francis X. McKeen
-
Publication number: 20080022108Abstract: A programmable processor initializes its state, then computes and verifies a hash of a boot code region of memory before executing any user instructions in the memory. Systems using similar processors, and software to control such a processor's operation, are also described and claimed.Type: ApplicationFiled: June 27, 2006Publication date: January 24, 2008Inventors: Kirk D. Brannock, Antonio S. Cheng
-
Publication number: 20080005574Abstract: A programmable processor calculates a hash value of a memory region, then monitors program operation to detect a security monitoring system initialization. The hash value is added to extend a security measurement sequence if the security monitoring system initialization clears a security state. Processors that implement similar methods, and systems using such processors, are also described and claimed.Type: ApplicationFiled: June 29, 2006Publication date: January 3, 2008Inventors: Antonio S. Cheng, Kirk D. Brannock