At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Data transmitter with an electric power distribution unit distributes
electric power from radio signal received...
According to one embodiment, a data transmitter includes a radio receiver, a power distributor, a storage module, a radio transmitter, and a power supply. The...
Processor performance state optimization
A processor performance state optimization includes a system to change a performance state of a processor. In an embodiment, the system to change a performance...
Administering power supplies in a data center
Administering power supplies in a data center including, upon connection of a first power supply through a power line to a circuit breaker in the data center,...
Adaptive capacity power supply
Methods and systems are disclosed for automatically tracking and controlling the capacity ratings of UPS units. The methods and systems provide a central server...
Power source control circuit, power source control device, power source
control system, and information...
In order to make it possible to reduce the time required for the central power source control unit to perform power source control of the power source unit of...
Power management method for information platform
A power management method for an information platform, includes holding system configuration information indicating a correspondence between a logical system...
Secure database access through partial encryption
The present invention generally is directed to systems, methods, and articles of manufacture for securing sensitive information involved in database...
Device and method capable of verifying program operation of non-volatile
memory and method card including the same
A method of verifying programming of an integrated circuit card includes transferring program data to a page buffer of a non-volatile memory, copying the...
Systems and methods of securing resources through passwords
Disclosed is a method of authorizing access to an item that maintains a lockout count and blocks access to the item if the lockout count exceeds a predetermined...
Dynamic pin pad for credit/debit/ other electronic transactions
A method is provided for authenticating debit card transactions engaged in by a cardholder on a communications network. The method includes: a) establishing a...
Smart card data protection method and system thereof
A data protection method and system thereof used for a smart card, wherein, the user may select a data frame in a smart card through a data access interface,...
Providing pattern based user password access
The Pattern Based Password Tool provides a user with a unique, single-use password that is hard to steal, but easy for the user to remember. The Pattern Based...
Digital watermarked imagery, video, maps and signs
Imagery, video, maps or signs are embedded with plural-bit data in the form of digital watermarking. In one embodiment, a method includes obtaining a media...
Methods and systems for inserting watermarks in digital signals
The presently claimed invention relates generally to steganographic encoding and digital watermarking. One claim recites a method including identifying at least...
Data depository and associated methodology providing secure access
pursuant to compliance standard conformity
A secure data depository assembly, and an associated method, provides for storage of data at a secured location forming a vault. Data associated with any of...
Preventing execution of software without a dynamically generated key
A method, system and computer program product for partitioning the binary image of a software program, and partially removing code bits to create an encrypted...
Session initial protocol identification method
A Session Initiation Protocol (SIP) authentication method, sends a request message without authentication information to a server end from a client to request...
Block-based media content authentication
A technique for security and authentication on block-based media includes involves the use of protected keys, providing authentication and encryption...
Secure proximity verification of a node on a network
A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification...
System and method for providing searchable data transport stream
A packetized transport stream for protecting viewing content from unauthorized access and methods for manufacturing and using same. The transport stream...
Architecture and design for central authentication and authorization in an
on-demand utility environment
A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a...
Method and apparatus for protecting information and privacy
A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended...
Method for securing an authentication and key agreement protocol
An authentication method including operation of a personal token, a personal token for a terminal in a communication network, an authentication server, and a...
Telecommunication system, for example an IP telecommunication system, and
equipment units for use in the system
The invention relates to a telecommunication system including a plurality of terminals divided into groups such that within each group each terminal can send...
Power reduction for system on chip
Disclosed herein are SOC devices with peripheral units having power management logic.
Apparatus operable under an operating system, method of controlling
apparatus and computer-readable recording...
According to an aspect of an embodiment, an apparatus operable under an operating system having an input device for inputting information, the apparatus being...
Memory access system and memory access method thereof
A memory access system for accessing a basic input output system (BIOS) program is provided. The memory access system includes a flash memory, a CPU, a...
System and method for OS boot image provisioning based on user identity to
enable mobile users
A method for provisioning a boot image includes receiving authentication information from an information handling system (IHS) over a network. The ...
Communication device and firmware update method thereof
A method for updating firmware in a communication device storing an original firmware in a first data area of a non-volatile memory includes receiving and...
Comparing text strings
A shorter and a longer text string may be compared. Instead of simply comparing the characters only one character at a time, more than one character can be...
Microprocessor starting to execute a computer program at a predetermined
A microprocessor which is adapted to start a second task at a predetermined time when a first task is running if a current time becomes to be equal to the...
System and method for implementing and utilizing a zero overhead loop
Systems and methods for implementing a zero overhead loop in a microprocessor or microprocessor based system/chip are disclosed. The systems and methods include...
System and method for executing loops in a processor
A loop control system comprises at least one loop flag in an instruction word, at least one loop counter associated with the at least one loop flag operable to...
Register set used in multithreaded parallel processor architecture
A parallel hardware-based multithreaded processor. The processor includes a general purpose processor that coordinates system functions and a plurality of...
Microcomputer and encoding system for executing peripheral function
A microcomputer that can process plural tasks time-divisionally and in parallel, wherein one of a plural programs described by one of the tasks is described as...
Completion of asynchronous memory move in the presence of a barrier
A method within a data processing system by which a processor executes an asynchronous memory move (AMM) store (ST) instruction to complete a corresponding AMM...
Concurrent execution of instructions in a processing system
A scalable processing system includes a memory device having a plurality of executable program instructions, wherein each of the executable program instructions...
Issuing load-dependent instructions in an issue queue in a processing unit
of a data processing system
A system and method for issuing load-dependent instructions in an issue queue in a processing unit. A load miss queue is provided. The load miss queue comprises...
Network on chip with low latency, high bandwidth application messaging
interconnects that abstract hardware...
Data processing on a network on chip (`NOC`) that includes integrated processor (`IP`) blocks, each of a plurality of the IP blocks including at least one...
Advanced processor translation lookaside buffer management in a
An advanced processor comprises a plurality of multithreaded processor cores each having a data cache and instruction cache. A data switch interconnect is...
Permanent pool memory management method and system
A method, system, and computer program manager for a computing system memory in the operation of a computing process. At least one memory segment provides...
Storage medium control unit, data storage device, data storage system,
method, and control program
To prevent random access commands from remaining even in the case of mixed sequential and random accesses. A storage medium control unit is used in a data...
Storage system having dynamic volume allocation function
Access to a plurality of logical devices is enabled regardless of the number of ports provided in a storage system and the number of logical devices that can be...
Data storage systems, methods and networks having a snapshot efficient
A data storage system includes a storage device divided into a plurality of blocks for storing data for a plurality of volumes, and a processor to execute...
Determining whether to use a full volume or repository for a logical copy
Provided are a method, system, and article of manufacture for determining whether to use a full volume or repository for a logical copy backup space. A...
State management for transactional backup consistency
Aspects of the subject matter described herein relate to transactions. In aspects, a consistency requester such as a shadow copy service requests to have a...
Remote copy with worm guarantee
In the case in which data in a storage system A is remotely copied to a storage system B, it is not taken into account whether the data of the remote copy is...
Method, system, apparatus, and computer-readable medium for improving disk
A method, system, apparatus, and computer-readable medium are provided for improved maintenance of metadata relating to a mass storage array. The metadata may...
Queue memory management
Systems and techniques relating to managing a queue memory include, in some implementations, a method comprising: retrieving stored data from an oldest read...
Using type stability to facilitate contention management
Various technologies and techniques are disclosed for providing type stability techniques to enhance contention management. A reference counting mechanism is...