At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
REDUNDANT ARRAY OF INDEPENDENT DISK (RAID) STORAGE RECOVERY
In one embodiment, a system includes a storage subsystem having an array of storage devices; a receiving component for receiving an error message; a determining...
DISASTER RECOVERY PRODUCTION TAKEOVER
Various embodiments for disaster recovery (DR) production takeover in a computing environment by a processor device are provided. If, for a designated storage...
CORRECTING AN ERRANT ENCODED DATA SLICE
A method begins by a processing module decoding a set of encoded data slices to produce a decoded data segment and determining whether the decoded data segment...
STORAGE DEVICE, AND DATA PATH FAILOVER METHOD OF INTERNAL NETWORK OF
A storage device in which the MR-IOV is applied to an internal network of a storage controller. Data path failover can be executed in the storage device. The...
FAILOVER SYSTEM, STORAGE PROCESSING DEVICE AND FAILOVER CONTROL METHOD
A NAS as a main machine transmits a search packet for searching for a NAS as a new backup machine when a response from a NAS as a backup machine is not...
DETERMINING RECOVERY TIME FOR INTERDEPENDENT RESOURCES IN HETEROGENEOUS
Provided are techniques for determining a recovery time for a resource in a heterogeneous computing environment comprising interdependent resources. A graph for...
INTER-PROCESSOR FAILURE DETECTION AND RECOVERY
An approach to detecting processor failure in a multi-processor environment is disclosed. The approach may include having each CPU in the system responsible for...
METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ANALYZING AN
OCCURRENCE OF AN ERROR IN A COMPUTER PROGRAM...
A method of analyzing an occurrence of an error in a computer program executing on a data processing system includes receiving data that are associated with an...
Method and Device for Exception Handling in Embedded System
A method and a device for handling exceptions in an embedded system are disclosed. The method comprises: establishing an exception callback linked list for an...
CONTENT PROCESSING APPARATUS
A content processing apparatus includes a plurality of takers. Each of a plurality of takers runs with reference to any one of N (N: an integer of two or more)...
METHOD FOR COMPENSATING FOR VARIATIONS IN DATA TIMING
A method for compensating for variations in timing of data sent to a processor on data bit lines relative to a strobe clock sent to the processor on a strobe...
METHOD AND APPARATUS FOR ON-DEMAND POWER MANAGEMENT
A power management apparatus and method are described. The method including monitoring, using a controller, a system bus for a processing demand in a processing...
CIRCUIT AND METHOD FOR AN UNINTERRUPTIBLE POWER SUPPLY OF ELECTRONIC
A circuit for uninterruptible power supply, wherein the circuit can be connected to an energy supply and a load and includes a capacitive energy store, a...
SYSTEMS AND METHODS FOR OPTIMIZING DATA STORAGE AMONG A PLURALITY OF SOLID
STATE MEMORY SUBSYSTEMS
A solid state storage device includes an interface system configured to communicate with an external host system over an aggregated multi-channel interface to...
HIGH SPEED NETWORK INTERFACE WITH AUTOMATIC POWER MANAGEMENT WITH
A power management circuit for managing power of a network interface is provided. The network interface includes a medium interface unit coupled to a network...
ENERGY OPTIMIZATION TECHNIQUES IN A COMPUTING SYSTEM
A computing platform may include components to determine performance loss values and energy savings values for each of the plurality of regions and/or the...
POWER MANAGEMENT METHOD FOR CONTROLLING COMMUNICATION INTERFACE TO
ENTER/LEAVE POWER-SAVING MODE AND RELATED...
One power management method of a communication interface includes: when receiving a command transmitted via the communication interface, checking if a...
Optimizing Power Usage By Factoring Processor Architectural Events To PMU
A method and apparatus to monitor architecture events is disclosed. The architecture events are linked together via a push bus mechanism with each architectural...
COOKIE MANAGEMENT SYSTEM AND METHOD
A system for managing cookies in a client device on a network includes a communication module, a cookie parser, an encryption module, and a storing module. The...
Apparatus and Method for Securing Data on a Portable Storage Device
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of...
METHOD OF OBTAINING AUTHORIZATION FOR ACCESSING A SERVICE
Methods and devices for obtaining authorization for a requestor to access a service are provided. In accordance with one embodiment, there is provided a method...
METHOD AND ARRANGEMENT FOR SENDING AND RECEIVING CONFIDENTIAL ELECTRONIC
MESSAGES IN A LEGALLY BINDING MANNER
In a method and arrangement for the secure transmission of at least one electronic message from a first terminal of a first user to at least one second terminal...
VERIFIABLE DEVICE ASSISTED SERVICE USAGE BILLING WITH INTEGRATED
ACCOUNTING, MEDIATION ACCOUNTING, AND...
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service...
ONE WAY AUTHENTICATION
A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without...
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND
An information processing apparatus includes: a data processor which creates content to be distributed to a client, wherein the data processor executes...
COMMUNICATION SYSTEM FOR AUTHENTICATING MESSAGES WITH UNIQUELY SPECIFIED
In a sensor network system, a transmitter device uses a message authentication key generated by a message generator to transmit a message with authenticator to...
DIGITAL SIGNATURES OF COMPOSITE RESOURCE DOCUMENTS
An embodiment of the disclosure can receive a composite resource document containing at least one resource. An updated manifest resource can be obtained. The...
SYSTEM AND METHOD FOR CONTROLLING DATA COMMUNICATIONS BETWEEN A SERVER AND
A CLIENT DEVICE
A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a...
ONLINE SECURE DEVICE PROVISIONING WITH ONLINE DEVICE BINDING USING
One or more servers are provided including a session manager, authentication module, authorization module, encryption module, database, and protocol handler....
METHOD AND DEVICE FOR SECURELY CONFIGURING A TERMINAL
A method of configuring a terminal including initializing the terminal, and which automatically triggers at least: detecting presence of a memory by a basic...
KEYLESS CHALLENGE AND RESPONSE SYSTEM
A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a...
OBJECT DELIVERY AUTHENTICATION
A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network...
System and Method for Automatic Authentication of an Item
A system, apparatus and method automatically authenticating an item. The media device includes a housing, a processor disposed within the housing, the item...
ESTABLISHMENT METHOD AND DEVICE FOR LINK BETWEEN ACCESS POINT AND REPEATER
IN WIRELESS DISTRIBUTION SYSTEM
The present invention provides an establishment method and device for a link between an access point and a repeater in a wireless distribution system. The...
SECURE DEPLOYMENT OF PROVABLE IDENTITY FOR DYNAMIC APPLICATION
An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller...
METHODS OF ISSUING A CREDIT FOR A CERTIFICATE FOR A DOMAIN NAME
The invention provides methods for efficiently registering a domain name and issuing a certificate without a Subscriber submitting a separate request for the...
Associating A Multi-Context Trusted Platform Module With Distributed
In one embodiment, the present invention includes a method for creating an instance of a virtual trusted platform module (TPM) in a central platform and...
METHOD AND DEVICE FOR DIGITALLY ATTESTING THE AUTHENTICITY OF BINDING
Method for digitally attesting the authenticity of an interaction, comprising the steps of establishing a secure digital communication channel between a...
Accelerating stream cipher operations using single and grid systems
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method...
SECURE TUNNEL OVER HTTPS CONNECTION
Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them...
COMPUTING DEVICE AND METHOD TO REDUCE THE TIME NEEDED FOR THE DEVICE TO
One example of the invention operates during the device shut-down procedure, to generate a merged command list containing the components from the various...
METHODS OF OPERATING MEMORY DEVICES AND ELECTRONIC SYSTEMS HAVING MEMORY
Methods of operating memory devices and electronic systems having memory devices include initiating a boot mode of operation of the memory device in response to...
APPARATUS AND METHOD FOR GENERATING A BOOT IMAGE THAT IS ADJUSTABLE IN
A technique for reducing a size of a snapshot boot image by adjusting a structure of the snapshot boot image based on an analysis of a computing system. In...
PROCESSOR AND VECTOR LOAD INSTRUCTION EXECUTION METHOD
Provided is a processor including an instruction issue unit that issues a vector load instruction read from a main memory based on branch target prediction of a...
PROCESSING APPARATUS, COMPILING APPARATUS, AND DYNAMIC CONDITIONAL BRANCH
A technology for reducing pipeline a control hazard is provided. A conditional branch is processed through a conditional branch prediction, and a predetermined...
INFORMATION PROCESSING DEVICE AND EMULATION PROCESSING PROGRAM AND METHOD
An emulation processing method causing a computer including a first and a second processor to execute emulation processing, the emulation processing method...
DEBUGGING APPARATUS AND METHOD
A debugging apparatus and method are provided. The debugging apparatus may include a breakpoint setting unit configured to store a first instruction...
HYBRID MECHANISM FOR MORE EFFICIENT EMULATION AND METHOD THEREFOR
In a host system, a method for using instruction scheduling to efficiently emulate the operation of a target computing syste includes preparing, on the host...
ISSUING INSTRUCTIONS WITH UNRESOLVED DATA DEPENDENCIES
The described embodiments include a processor that determines instructions that can be issued based on unresolved data dependencies. In an issue unit in the...
Decoding instructions from multiple instructions sets
A data processing apparatus, method and computer program are described that are capable of decoding instructions from different instruction sets. The method...