Patents by Inventor Pontus Lidman
Pontus Lidman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230396665Abstract: Systems and method for streaming video content include downscaling video content using a downscaling model to generate downscaled video content and downloading the downscaled video content as a video stream and corresponding upscaling model to a client device. The system converts received video frames to a video memory format comprising channels having the same memory allocation size, each subsequent channel arranged in an adjacent memory location, for input to the downscaling model. The client device upscales the video stream using the received upscaling model for display by the client device in real-time. A training system trains the downscaling model to generate the downscaled video content, based on associated metadata identifying a type of video content. The downscaled video content and associated upscaling models are stored for access by an edge server, which downloads upscaling models to a client device to select an upscaling model.Type: ApplicationFiled: August 9, 2023Publication date: December 7, 2023Applicant: Synaptics IncorporatedInventors: Vladan PETROVIC, Utkarsh GAUR, Pontus LIDMAN
-
Patent number: 11785068Abstract: Systems and method for streaming video content include downscaling video content using a downscaling model to generate downscaled video content and downloading the downscaled video content as a video stream and corresponding upscaling model to a client device. The system converts received video frames to a video memory format comprising channels having the same memory allocation size, each subsequent channel arranged in an adjacent memory location, for input to the downscaling model. The client device upscales the video stream using the received upscaling model for display by the client device in real-time. A training system trains the downscaling model to generate the downscaled video content, based on associated metadata identifying a type of video content. The downscaled video content and associated upscaling models are stored for access by an edge server, which downloads upscaling models to a client device to select an upscaling model.Type: GrantFiled: December 31, 2020Date of Patent: October 10, 2023Assignee: Synaptics IncorporatedInventors: Vladan Petrovic, Utkarsh Gaur, Pontus Lidman
-
Publication number: 20220210213Abstract: Systems and method for streaming video content include downscaling video content using a downscaling model to generate downscaled video content and downloading the downscaled video content as a video stream and corresponding upscaling model to a client device. The system converts received video frames to a video memory format comprising channels having the same memory allocation size, each subsequent channel arranged in an adjacent memory location, for input to the downscaling model. The client device upscales the video stream using the received upscaling model for display by the client device in real-time. A training system trains the downscaling model to generate the downscaled video content, based on associated metadata identifying a type of video content. The downscaled video content and associated upscaling models are stored for access by an edge server, which downloads upscaling models to a client device to select an upscaling model.Type: ApplicationFiled: December 31, 2020Publication date: June 30, 2022Inventors: Vladan PETROVIC, Utkarsh GAUR, Pontus LIDMAN
-
Patent number: 10754967Abstract: Systems, methods, and other embodiments associated with handling secure interrupts between security zones are described. According to one embodiment, an apparatus includes a memory divided between a secure zone and a non-secure zone and storing a plurality of applications. The secure zone provides exclusive access to secure assets of the apparatus. A processor with an interface module configured to, in response to receiving an interrupt request from a requesting application that executes on the processor in the non-secure zone, tunnel the interrupt request into the secure zone of the processor. The non-secure zone and the secure zone are configured as operating environments of the processor with separate security controls. The processor includes a monitor module configured to issue the secure interrupt to a trusted application that is one of the plurality of applications in the secure zone, wherein the trusted application is registered to handle the secure interrupt.Type: GrantFiled: December 15, 2015Date of Patent: August 25, 2020Assignee: Marvell Asia Pte, Ltd.Inventors: Gaurav Arora, Yongsen Chen, Adil Jagmag, Pontus Lidman, Haobo Yu, Yongbing Chen, Ailing Du
-
Patent number: 10283094Abstract: A tile-based run-length compression and decompression system is described that reduces memory bandwidth when encoding media data to memory and decoding media data from memory. The described run-length compression system and techniques implement a series of processing steps followed by run-length encoding to compress one or more media frames into a plurality of compressed bits in the form of a run-length encoded bitstream. The described run-length decompression system and techniques implement run-length decoding followed by a series of processing steps to decompress a compressed run-length encoded bitstream into one or more media frames. In various implementations, processing steps applied by run-length compression and decompression systems include one or more of Differential Pulse Code Modulation steps, gray coding steps, bitplane decomposition steps, pixel assembly steps, bitstream extraction steps, or bitplane organization steps.Type: GrantFiled: August 18, 2016Date of Patent: May 7, 2019Assignee: Marvell International Ltd.Inventor: Pontus Lidman
-
Patent number: 9529732Abstract: Systems, methods, and other embodiments associated with rotating keys for a memory are described. According to one embodiment, a memory system comprises a memory controller configured to control access to a memory and to process memory access requests. Rekeying logic is configured to rotate a first key that was used to scramble data in the memory and re-scramble the data with a second key by: determining when the memory controller is in an idle cycle and performing a rekeying operation on a portion of the memory during the idle cycle, and pausing the rekeying operation when the memory controller is not in an idle cycle to allow memory access requests to be performed and resuming the rekeying operation during a next idle cycle.Type: GrantFiled: July 18, 2014Date of Patent: December 27, 2016Assignee: MARVELL WORLD TRADE LLCInventor: Pontus Lidman
-
Patent number: 9152807Abstract: Systems and methods for providing capture functionality according to a security policy are provided. A request to capture content is received from a requesting application at a capture controller. The request is evaluated based on the security policy of the capture controller. Based on the evaluation, a determination is made as to whether the request is to be granted completely, denied, or granted subject to a constraint. Capture of the requested content is initiated via capture hardware or software if the request is granted completely or granted subject to the constraint.Type: GrantFiled: February 14, 2013Date of Patent: October 6, 2015Assignee: MARVELL WORLD TRADE LTD.Inventors: Gaurav Arora, Jinhua Luo, Adil Jagmag, Geng Yang, Pontus Lidman
-
Publication number: 20150033037Abstract: Systems, methods, and other embodiments associated with rotating keys for a memory are described. According to one embodiment, a memory system comprises a memory controller configured to control access to a memory and to process memory access requests. Rrekeying logic is configured to rotate a first key that was used to scramble data in the memory and re-scramble the data with a second key by: determining when the memory controller is in an idle cycle and performing a rekeying operation on a portion of the memory during the idle cycle, and pausing the rekeying operation when the memory controller is not in an idle cycle to allow memory access requests to be performed and resuming the rekeying operation during a next idle cycle.Type: ApplicationFiled: July 18, 2014Publication date: January 29, 2015Inventor: Pontus LIDMAN
-
Publication number: 20130291054Abstract: Systems and methods for providing capture functionality according to a security policy are provided. A request to capture content is received from a requesting application at a capture controller. The request is evaluated based on the security policy of the capture controller. Based on the evaluation, a determination is made as to whether the request is to be granted completely, denied, or granted subject to a constraint. Capture of the requested content is initiated via capture hardware or software if the request is granted completely or granted subject to the constraint.Type: ApplicationFiled: February 14, 2013Publication date: October 31, 2013Applicant: Marvell World Trade Ltd.Inventors: Gaurav Arora, Jinhua Luo, Adil Jagmag, Geng Yang, Pontus Lidman