Patents by Inventor Stephen D. Goglin
Stephen D. Goglin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230173382Abstract: A game streaming system concurrently executes different instances of a game program, each instance employing a different set of hardware resources, including different local memory, such as the hardware resources of different servers or different GPUs. Based on a game state, the game streaming system streams rendered frames from a first set of hardware resources associated with the game level to a client device wherein the rendered frames, depicting a portion of a virtual environment. In response to an indication from the game program of a game level change to a new game level, the game streaming system transfers a player state to another set of hardware resources, and begins streaming rendered frames to the client device from the other of hardware resources.Type: ApplicationFiled: May 13, 2020Publication date: June 8, 2023Inventor: Stephen D. Goglin
-
Patent number: 8874767Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: GrantFiled: April 3, 2012Date of Patent: October 28, 2014Assignee: Intel CorporationInventors: Stephen D. Goglin, Linden Cornett
-
Publication number: 20140171124Abstract: In accordance with embodiments disclosed herein, there are provided systems, apparatuses, and methods for saving GPS power by detecting indoor use. For example, in one embodiment, such means may include means for receiving a first reading of light within a visible spectrum of electromagnetic radiation; means for receiving a second reading of light within an infrared spectrum of electromagnetic radiation; means for selecting an indoor environmental state when (a) the first reading of light within the visible spectrum of electromagnetic radiation is above a first threshold and (b) the second reading of light within the infrared spectrum of electromagnetic radiation is below a second threshold; and means for transitioning a Global Positioning System (GPS) sensor to a power savings mode based on the indoor environmental state being selected.Type: ApplicationFiled: March 30, 2012Publication date: June 19, 2014Inventor: Stephen D. Goglin
-
Publication number: 20140115662Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.Type: ApplicationFiled: December 31, 2013Publication date: April 24, 2014Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
-
Patent number: 8561178Abstract: In general, in one aspect, an interface chipset includes at least one interface to receive user commands from input devices, filters to monitor the received user commands and to copy the user commands associated with at least a subset of the input devices, and an isolated execution environment. The isolated execution environment is to provide a secure communication link between an on-line application and a remote service provider. The isolated execution environment is also to detect at least some subset of user command modifications, on-line application code modifications, and on-line application process flow modifications. The isolated execution environment is further to notify the remote service provider when a modification is detected via the secure communication link.Type: GrantFiled: November 30, 2007Date of Patent: October 15, 2013Assignee: Intel CorporationInventors: Travis T. Schluessler, Stephen D. Goglin, Erik J. Johnson
-
Patent number: 8307439Abstract: In general, in one aspect, an add-in card includes inaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link. The add-in card also includes an isolated execution environment and a machine-accessible medium comprising content. The content when executed by the isolated execution environment causes the isolated execution environment to route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween, detect on-line application code modifications, detect on-line application process flow modifications, and notify, via the secure communication link, the remote service provider when a modification is detected.Type: GrantFiled: November 30, 2007Date of Patent: November 6, 2012Assignee: Intel CorporationInventors: Travis T. Schluessler, Stephen D. Goglin, Erik J. Johnson
-
Publication number: 20120189013Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: ApplicationFiled: April 3, 2012Publication date: July 26, 2012Inventors: Stephen D. Goglin, Linden Cornett
-
Patent number: 8150981Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: GrantFiled: August 28, 2009Date of Patent: April 3, 2012Assignee: Intel CorporationInventors: Stephen D. Goglin, Linden Cornett
-
Patent number: 7792960Abstract: In general, in one aspect, a method is described that includes monitoring data received from input devices. The received data from the input devices associated with an application is copied when the application is active. The data is converted to user commands. Commands used to update the application are received from the application. The converted user commands are compared to the commands from the application. Mismatching commands are reported to a remote server.Type: GrantFiled: November 30, 2007Date of Patent: September 7, 2010Assignee: Intel CorporationInventors: Stephen D. Goglin, Travis T. Schluessler
-
Patent number: 7788650Abstract: Source code includes a directive to indicate data structures of related data to a compiler. The compiler associates the related data to the same one of multiple processors in a multiprocessor environment. The compiler searches the source code for locks associated with the related data, and generates executable code that is modified with respect to locks written in the source code. The compiler may replace or remove locks written in the source code to protect access to the related data, resulting in an executable program that does not include the locks.Type: GrantFiled: May 10, 2005Date of Patent: August 31, 2010Assignee: Intel CorporationInventors: Erik J. Johnson, Stephen D. Goglin
-
Publication number: 20100061377Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: ApplicationFiled: August 28, 2009Publication date: March 11, 2010Applicant: INTEL CORPORATIONInventors: Stephen D. Goglin, Linden Cornett
-
Publication number: 20090292924Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.Type: ApplicationFiled: September 12, 2008Publication date: November 26, 2009Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
-
Patent number: 7584286Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: GrantFiled: June 28, 2006Date of Patent: September 1, 2009Assignee: Intel CorporationInventors: Stephen D. Goglin, Linden Cornett
-
Patent number: 7581045Abstract: Provided are a method, system, and article of manufacture for mapping programming interfaces. A synchronous request for reading data is received. An asynchronous request to fill selected buffers of a plurality of buffers is sent. The synchronous request is responded to with the data from at least one buffer of the plurality of buffers.Type: GrantFiled: June 14, 2005Date of Patent: August 25, 2009Assignee: Intel CorporationInventors: John A. Wiegert, Stephen D. Goglin
-
Publication number: 20090144825Abstract: In general, in one aspect, an interface chipset includes at least one interface to receive user commands from input devices, filters to monitor the received user commands and to copy the user commands associated with at least a subset of the input devices, and an isolated execution environment. The isolated execution environment is to provide a secure communication link between an on-line application and a remote service provider. The isolated execution environment is also to detect at least some subset of user command modifications, on-line application code modifications, and on-line application process flow modifications. The isolated execution environment is further to notify the remote service provider when a modification is detected via the secure communication link.Type: ApplicationFiled: November 30, 2007Publication date: June 4, 2009Inventors: Travis T. Schluessler, Stephen D. Goglin, Erik J. Johnson
-
Publication number: 20090143144Abstract: In general, in one aspect, an add-in card includes inaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link. The add-in card also includes an isolated execution environment and a machine-accessible medium comprising content. The content when executed by the isolated execution environment causes the isolated execution environment to route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween, detect on-line application code modifications, detect on-line application process flow modifications, and notify, via the secure communication link, the remote service provider when a modification is detected.Type: ApplicationFiled: November 30, 2007Publication date: June 4, 2009Inventors: Travis T. Schluessler, Stephen D. Goglin, Erik J. Johnson
-
Publication number: 20090144415Abstract: In general, in one aspect, a method is described that includes monitoring data received from input devices. The received data from the input devices associated with an application is copied when the application is active. The data is converted to user commands. Commands used to update the application are received from the application. The converted user commands are compared to the commands from the application. Mismatching commands are reported to a remote server.Type: ApplicationFiled: November 30, 2007Publication date: June 4, 2009Inventors: Stephen D. Goglin, Travis T. Schluessler
-
Publication number: 20080005352Abstract: In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.Type: ApplicationFiled: June 28, 2006Publication date: January 3, 2008Inventors: Stephen D. Goglin, Linden Cornett