Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2011/0302433 CONTROL CIRCUIT OF POWER-SAVING SOCKET
A control circuit is provided for a power-saving socket and includes a central processing unit, a relay, a sensor unit, a time counting unit, a standby current...
2011/0302432 SUPER CAPACITOR SUPPLEMENTED SERVER POWER
Super capacitor supplemented server power is described. In embodiments, a power system manager is implemented to monitor the capability of one or more power...
2011/0302431 METHOD AND SYSTEM FOR MANAGING POWER CONSUMPTION UTILIZING INTER-GATEWAY COMMUNICATION
Aspects of a method and system for managing power consumption utilizing inter-gateway communication are provided. In this regard, a first broadband gateway...
2011/0302430 PEER TO PEER POWER MANAGEMENT
A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for...
2011/0302429 SERVER RACK SYSTEM
A rack system for a server includes a number of server units, which includes first to the third sets of server units, voltage converter, first to third power...
2011/0302428 METHOD, SYSTEM AND MEDIUM FOR ANALOG ENCRYPTION IN A FLASH MEMORY
A system and method for analog encryption and decryption, in which the encryption and encoding processes are interrelated, such that by failing to decrypt the...
2011/0302427 METHOD FOR ACTIVATING AT LEAST A FUNCTION ON A CHIPSET AND CHIPSET FOR THE IMPLEMENTATION OF THE METHOD
A method for activating a function of a chipset comprising at least a memory and a calculation module in charge of cryptographic operations, the memory...
2011/0302426 Method for generating a bit vector
A method and a circuit configuration for generating a bit vector are described. At least two configurations, each having state machines of the same design, are...
2011/0302425 SYSTEMS, METHODS, AND APPARATUS TO VIRTUALIZE TPM ACCESSES
Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a...
2011/0302424 Software Self-Checking Systems and Methods
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect...
2011/0302423 METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the...
2011/0302422 HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS
In the data security field, a modular cryptographic hash function process is embodied in a computer system or hardware (circuitry). The process is based on the...
2011/0302421 Authentication Method And Apparatus Using One Time Pads
An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one...
2011/0302420 SYSTEM AND METHOD FOR AUTHENTICATED AND PRIVACY PRESERVING BIOMETRIC IDENTIFICATION SYSTEMS
A biometric based identification and authorization for a collected physical biometric for a security infrastructure is presented. The biometric identification...
2011/0302419 IMAGE MANAGING METHOD AND IMAGE MANAGING SYSTEM
An image managing method includes dividing the original moving image into a header and a body and generating the group hash value of the header portion,...
2011/0302418 INFORMATION PROCESSING DEVICE
One embodiment is an information processing device for obtaining an HMAC, including a padding circuit for generating first key data by adding a first constant...
2011/0302417 IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS
This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter...
2011/0302416 METHOD AND SYSTEM FOR SECURED COMMUNICATION IN A NON-CTMS ENVIRONMENT
A method for bypassing a Cable Modem Termination System (CMTS), the method includes: receiving, by a session manager, an encrypted Security Association...
2011/0302415 SECURING CUSTOMER VIRTUAL MACHINES IN A MULTI-TENANT CLOUD
A trusted virtualization platform protects sensitive customer data during operation of virtual machines in a multi-tenant cloud computing center. The trusted...
2011/0302414 REMOTE CONTROL OF MEDICAL DEVICES USING INSTANT MESSAGING INFRASTRUCTURE
Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile...
2011/0302413 Authorizing Information Flows Based on a Sensitivity of an Information Object
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one...
2011/0302412 PSEUDONYMOUS PUBLIC KEYS BASED AUTHENTICATION
Systems and methods for pseudonymous public keys based authentication are described that enable an authentication to achieve pseudonymity and non-repudiation,...
2011/0302411 METHOD AND SYSTEM FOR UPDATING AND USING DIGITAL CERTIFICATES
A method and system for updating and using a digital certificate, and the method comprises: a first terminal establishing a secure link with an access point and...
2011/0302410 SECURE DOCUMENT DELIVERY
A method, machine-readable medium, and server to create a key, set an expiration event for the key to expire, send the key to a first client device to encrypt...
2011/0302409 METHOD AND SYSTEM FOR VERIFICATION OF AN ENDPOINT SECURITY SCAN
A method of granting access to resources includes the step of receiving a request from a node to access a resource. A scanning agent is generated to gather...
2011/0302408 Secure Communication Systems, Methods, and Devices
In par, the invention relates to a secure communication system. The system includes a voice call processing server; a user database in communication with the...
2011/0302407 SYSTEM AND METHOD FOR SENDING ENCRYPTED MESSAGES TO A DISTRIBUTION LIST
A system and method for sending encrypted messages to a distribution list that facilitates the sending of such messages only to individuals or other entities...
2011/0302406 METHOD AND SYSTEM FOR RECOVERING A SECURITY CREDENTIAL
A system and method for recovering a security credential is provided. A security credential stored in the storage of a computing device is encrypted using a...
2011/0302405 MOBILE WORKFORCE APPLICATIONS WHICH ARE HIGHLY SECURE AND TRUSTED FOR THE US GOVERNMENT AND OTHER INDUSTRIES
A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special ...
2011/0302404 System for secure variable data rate transmission
Secure Variable Data Rate Transceivers and methods for implementing Secure Variable Data Rate are presented. An efficient and systematic method and circuit for...
2011/0302403 SYSTEM AND METHOD FOR CONFIGURING PLURAL SOFTWARE PROFILES
A computer with multiple software applications has defined for it plural software profiles for selection of one of the profiles in response to a system and/or...
2011/0302402 ON-CHIP SECURITY METHOD AND APPARATUS
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been...
2011/0302401 Information processing apparatus, information processing method and recording medium
An information processing apparatus includes a receiver configured to receive a packet via a communication line, an operating processor configured to suspend an...
2011/0302400 SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURES
Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be...
2011/0302399 Rapid activation of service management processor subsystem for server device
A bootloader process executing on a service management processor (SMP) subsystem for a server device determines whether an initialization flag stored within...
2011/0302398 KEY PROTECTORS BASED ON ONLINE KEYS
An online key stored by a remote service is generated or otherwise obtained, and a storage media (as it applies to the storage of data on a physical or virtual...
2011/0302397 Method and Apparatus for Improved Secure Computing and Communications
A computing and communications system and method may comprise a primitive recursive function computing engine including an instruction set architecture...
2011/0302396 IMAGE PROCESSING APPARATUS THAT PERFORMS PROCESSING ACCORDING TO INSTRUCTION DEFINING THE PROCESSING, CONTROL...
An image processing apparatus which makes it possible to select a plurality of instructions at a time, and connect a plurality of documents together so that...
2011/0302395 HARDWARE ASSIST THREAD FOR DYNAMIC PERFORMANCE PROFILING
A method and data processing system for managing running of instructions in a program. A processor of the data processing system receives a monitoring...
2011/0302394 SYSTEM AND METHOD FOR PROCESSING REGULAR EXPRESSIONS USING SIMD AND PARALLEL STREAMS
A system and method for performing regular expression computations includes loading a plurality of input values corresponding to one or more input streams as...
2011/0302393 CONTROL SYSTEMS AND DATA PROCESSING METHOD
When executing sequential processing such as a ladder logic, converting a program formed of an instruction set of another processor to a program executable by...
2011/0302392 INSTRUCTION TRACKING SYSTEM FOR PROCESSORS
A method and apparatus for tracking instructions in a processor. A completion unit in the processor receives an instruction group to add to a table to form a...
2011/0302391 DIGITAL SIGNAL PROCESSOR
A digital signal processor comprises an instruction analysis unit, a digital signal processor (DSP) core and a memory unit. The instruction analysis unit...
2011/0302390 SYSTEMS AND METHODS FOR PROCESSING COMMUNICATIONS SIGNALS fUSING PARALLEL PROCESSING
Systems and methods for performing processing of communications signals on multi-processor architectures. The system consists of a digital interface that...
2011/0302389 MEMORY MANAGEMENT METHODS IN A COMPUTER SYSTEM WITH SHARED MEMORY MAPPINGS
A memory management sub-system includes code executable by a processor fir performing selecting a plurality of contexts, and selecting a sample of the...
2011/0302388 Hierarchical Scalable Memory Allocator
Aspects of the subject matter described herein relate to memory management. In aspects, a hierarchical, customized memory allocator may be created that...
2011/0302387 METHOD FOR MANAGING STORAGE, PROGRAM AND SYSTEM FOR THE SAME
A system including plural storage devices provides a technique for controlling storage devices in which files are located by a file system, and turning on or...
2011/0302386 METHOD AND APPARATUS TO MANAGE SPECIAL REARRANGEMENT IN AUTOMATED TIER MANAGEMENT
A storage controller performs automated page-based tier management of storing data in tiered storage using pool groups, which includes evaluating the pool...
2011/0302385 MEMORY DEVICE SYNCHRONIZATION
A memory controller includes first and second output modules for driving first and second data, respectively, to be written to a memory device. The memory...
2011/0302384 COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND...
A computer readable medium stores a program causing a computer to execute a process including receiving an instruction for deleting an information group from a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.