Patents by Inventor Trevor Pering

Trevor Pering has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7200812
    Abstract: Documents may be greeked in whole or in part prior to viewing. Embodiments of the invention enable users to selectively greek and/or ungreek their documents for viewing in public locations. Various forms of greeking and/or ungreeking may be utilized to enable the user to view the document securely in whole or in part.
    Type: Grant
    Filed: July 14, 2003
    Date of Patent: April 3, 2007
    Assignee: Intel Corporation
    Inventors: John J. Light, Muralidharan Sundararajan, Trevor A. Pering, Roy Want
  • Patent number: 7174462
    Abstract: Authenticating a user operating an un-trusted access device includes causing the display, on the un-trusted access device, of a plurality of photographs to the user, at least one of the photographs being from the user's personal photograph collection and already familiar to the user, remaining photographs being decoy photographs, accepting an input selection from the user identifying one of the displayed photographs, and allowing access when the user's selection correctly identifies a sequence of displayed photographs from the user's photograph collection. No user training prior to using the authentication system is needed and no pre-selection of a password or photograph is necessary.
    Type: Grant
    Filed: November 12, 2002
    Date of Patent: February 6, 2007
    Assignee: Intel Corporation
    Inventors: Trevor A. Pering, John J. Light, Roy Want, Muralidharan Sundararajan
  • Publication number: 20060172778
    Abstract: According to one embodiment of the invention, a method for discovering the presence of at least one source and target mobile device, automatically displaying a graphical interface to show the dataset from the source mobile device, and initiating the transmission of data between the mobile devices, is provided. The method further includes automatically receiving the dataset from the source mobile device, where the dataset is at least a representation of the data on the source device. In one embodiment, the representation is a subset of the data on the device and/or a description of the data on the mobile device. In another embodiment, a method for a navigation system to discover the presence of at least one mobile device, to automatically receive data from the mobile device, and to process the data with navigation operations, is provided.
    Type: Application
    Filed: January 28, 2005
    Publication date: August 3, 2006
    Inventors: Muralidharan Sundararajan, Vinod Balakrishnan, John Light, Trevor Pering, Roy Want
  • Publication number: 20060104540
    Abstract: A result higher resolution (HR) image of a scene given multiple, observed lower resolution (LR) images of the scene is computed using a Bayesian estimation image reconstruction methodology. The methodology yields the result HR image based on a Likelihood probability function that implements a model for the formation of LR images in the presence of noise. This noise is modeled by a probabilistic, non-Gaussian, robust function. The image reconstruction methodology may be used to enhance the image quality of images or video captured using a low resolution image capture device. Other embodiments are also described and claimed.
    Type: Application
    Filed: December 28, 2005
    Publication date: May 18, 2006
    Inventors: Horst Haussecker, Oscar Nestares, Roy Want, Trevor Pering, John Light, Edward Epp
  • Publication number: 20060046736
    Abstract: A portable electronic device includes a first type of wireless transceiver and a second type of wireless transceiver. The device determines at least one of the quantity and type of data currently required to be transmitted. One of the two transceivers is selected based on the determined type and/or quantity of data required to be transmitted. The data is then transmitted using the selected one of the wireless transceivers. Other embodiments are described and claimed.
    Type: Application
    Filed: August 31, 2004
    Publication date: March 2, 2006
    Inventors: Trevor Pering, Muralidharan Sundararajan, John Light, Roy Want, Vijay Raghunathan
  • Publication number: 20050215195
    Abstract: A device having a moniker to enhance privacy and power saving is described. According to one embodiment, the moniker is stored within and is associated with a first device. The moniker is provided to a second device, which sends an inquiry message, including the moniker, to the first device. The first device determines whether to respond to the inquiry message based on the moniker.
    Type: Application
    Filed: March 23, 2004
    Publication date: September 29, 2005
    Inventors: John Light, Muralidharan Sundararajan, Trevor Pering, Roy Want
  • Publication number: 20050198035
    Abstract: Automatic exchange of information in an ad-hoc computing environment is disclosed. According to one embodiment of the invention, a collection agent module facilitates a search for a first device to connect to via a wireless network. The collection agent queries for and receives a first document from the first device based on metadata associated with the first document and the collection agent automatically forwards the received first document to a second device connected to the wireless network upon receiving the first document from the first device. The collection agent also automatically sends a second document to the first device upon the first device connecting to the wireless network.
    Type: Application
    Filed: March 5, 2004
    Publication date: September 8, 2005
    Inventors: Muralidharan Sundararajan, John Light, Trevor Pering, Roy Want
  • Publication number: 20050060365
    Abstract: Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items from which processing criteria are derived includes a user's calendar of appointments, schedule changes, exceptions, and the like.
    Type: Application
    Filed: January 24, 2002
    Publication date: March 17, 2005
    Inventors: Scott Robinson, Uttam Sengupta, Andrew Anderson, Steven Bennett, Paul Pierce, Trevor Pering, Nicholas Wade, Shreekant Thakkar, Kit Tham
  • Publication number: 20050055421
    Abstract: An apparatus and a system, as well as a method and article, may operate to receive solicited or unsolicited computing platform service information associated with services offered by a plurality of service points in a range area, store some portion of the received information, and periodically transmit, with or without confirmation, some portion of the stored information to one or more potential subscribers.
    Type: Application
    Filed: September 10, 2003
    Publication date: March 10, 2005
    Inventors: John Light, Muralidharan Sundararajan, Trevor Pering, Roy Want
  • Patent number: 6865653
    Abstract: A power management system for digital circuitry uses data buffer monitoring to determine appropriate processor clock speed or voltage. This allows a processor to be switched from a low power state to a high power state when a monitored data buffer level feeding data to a power intensive application is greater than a second memory buffer level. The processor is switched from a high power state to a low power state when the monitored data buffer level is less than a first memory buffer level.
    Type: Grant
    Filed: December 18, 2001
    Date of Patent: March 8, 2005
    Assignee: Intel Corporation
    Inventors: André Zaccarin, Trevor Pering, Marco Y. Wirasinghe
  • Publication number: 20050015723
    Abstract: Documents may be greeked in whole or in part prior to viewing. Embodiments of the invention enable users to selectively greek and/or ungreek their documents for viewing in public locations. Various forms of greeking and/or ungreeking may be utilized to enable the user to view the document securely in whole or in part.
    Type: Application
    Filed: July 14, 2003
    Publication date: January 20, 2005
    Inventors: John Light, Muralidharan Sundararajan, Trevor Pering, Roy Want
  • Publication number: 20050015604
    Abstract: Authenticating a user of an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, may be accomplished by randomly generating a temporary password by the portable computing device, sending the temporary password to the peripheral device, rendering the temporary password by the peripheral device for perception by the user, inputting a password, by the user, into the un-trusted computing system, receiving, by the portable computing device, the password input by the user from the un-trusted computing system, and allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password. In one embodiment, the peripheral device may be a small form factor device worn by the user. In one embodiment, the user may carry or have immediate access to multiple portable computing devices.
    Type: Application
    Filed: July 16, 2003
    Publication date: January 20, 2005
    Inventors: Muralidharan Sundararajan, John Light, Trevor Pering, Roy Want
  • Publication number: 20050010768
    Abstract: Authenticating a user operating a portable computing device includes causing a sequence of images to be shown on a display, accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user's password, the user's password being known by the portable computing device, correlating the input selection to the currently displayed image, and allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user's password.
    Type: Application
    Filed: July 8, 2003
    Publication date: January 13, 2005
    Inventors: John Light, Trevor Pering, Muralidharan Sundararajan, Roy Want
  • Publication number: 20040205757
    Abstract: Processor speed associated with each of different types of processing requirements is determined. These processor speeds are aggregated together to form an effective processor speed for a processor in a system. The processor speed for the processor enables meeting the different types of processing requirements while reducing power consumption.
    Type: Application
    Filed: April 9, 2003
    Publication date: October 14, 2004
    Inventor: Trevor A. Pering
  • Publication number: 20040093527
    Abstract: Authenticating a user operating an un-trusted access device includes causing the display, on the un-trusted access device, of a plurality of photographs to the user, at least one of the photographs being from the user's personal photograph collection and already familiar to the user, remaining photographs being decoy photographs, accepting an input selection from the user identifying one of the displayed photographs, and allowing access when the user's selection correctly identifies a sequence of displayed photographs from the user's photograph collection. No user training prior to using the authentication system is needed and no pre-selection of a password or photograph is necessary.
    Type: Application
    Filed: November 12, 2002
    Publication date: May 13, 2004
    Inventors: Trevor A. Pering, John J. Light, Roy Want, Muralidharan Sundararajan
  • Publication number: 20030140088
    Abstract: Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items from which processing criteria are derived includes a user's calendar of appointments, schedule changes, exceptions, and the like.
    Type: Application
    Filed: January 24, 2002
    Publication date: July 24, 2003
    Inventors: Scott H. Robinson, Uttam Sengupta, Andrew V. Anderson, Steven M. Bennett, Paul R. Pierce, Trevor A. Pering, Nicholas D. Wade, Shreekant S. Thakkar, Kit Y. Tham
  • Publication number: 20030115415
    Abstract: A method and device is provided for communicating with an access device. The device includes a wireless communications module to communicate with the access device in a wireless fashion, a data storage module to store bulk data, and a controller connected to the communication module and to the data storage module. The controller controls storage of data in the data storage module and retrieval of data from the data storage module in response to requests from a user via the access device. The device may function as a personal server which, for example, communicates with an access device (e.g., PC, PDA, cellular telephone, or the like) using Bluetooth technology. As Bluetooth is a universally accepted communication standard, a variety of different access devices, or any one particular preferred interface, in proximity to the user may be used to define a personal computing environment.
    Type: Application
    Filed: December 18, 2001
    Publication date: June 19, 2003
    Inventors: Roy Want, James Kardach, Graham D. Kirby, Trevor A. Pering, Steven Swanson
  • Publication number: 20030114190
    Abstract: A portable device is provided which includes a wireless communication module, a data storage module, and a controller for controlling the storage and/or retrieval of data from the data storage module. The wireless communication module communicates with each of a plurality of remote devices and the data storage module defines a first storage area and a second storage area. The controller controls the communication of data between the first storage area and the remote device, and the second storage area and the remote device dependent upon access rights associated with the remote device. The first storage area typically defines a public storage area with which data is exchanged in a relatively free manner, and the second storage area typically defines a private storage area with which data is exchanged in a relatively restricted manner.
    Type: Application
    Filed: December 18, 2001
    Publication date: June 19, 2003
    Inventors: Roy Want, James Kardach, Graham D. Kirby, Trevor A. Pering
  • Publication number: 20030115428
    Abstract: A power management system for digital circuityr uses data buffer monitoring to determine appropriate processor clock speed or voltage. This allows a processor to be switched from a low power state to a high power state when a monitored data buffer level feeding data to a power intensive application is greater than a second memory buffer level. The processor is switched from a high power state to a low power state when the monitored data buffer level is less than a first memory buffer level.
    Type: Application
    Filed: December 18, 2001
    Publication date: June 19, 2003
    Inventors: Andre Zaccarin, Trevor Pering, Marco Y. Wirasinghe
  • Publication number: 20020178019
    Abstract: A method and apparatus for taking action in response to an event without contacting at least one person if the level of importance of the event to a first person meets or exceeds one threshold, but is below or only meeting another threshold.
    Type: Application
    Filed: June 29, 2001
    Publication date: November 28, 2002
    Inventors: Andrew V. Anderson, Paul R. Pierce, Uttam Sengupta, Ticky Thakkar, Kit Tham, Nick Wade, Trevor Pering, Steve Bennett, Lee Hirsch, Scott Robinson