Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,996,716 Containment and recovery of software exceptions in interacting, replicated-state-machine-based fault-tolerant...
A method, system and article of manufacture are disclosed for error recovery in a replicated state machine. A batch of inputs is input to the machine, and the...
US-7,996,715 Multi nodal computer system and method for handling check stops in the multi nodal computer system
A new multi nodal computer system comprising a number of nodes on which chips of different types reside. The new multi nodal computer system is characterized in...
US-7,996,714 Systems and methods for redundancy management in fault tolerant computing
Systems and methods for redundancy management in fault tolerant computing are provided. The systems and methods generally relate to enabling the use of...
US-7,996,713 Server-to-server integrity checking
A method performed by a primary server includes receiving integrity criteria and sending a health check request to a secondary server based on the received...
US-7,996,712 Data transfer controller, data consistency determination method and storage controller
A data transfer controller of the present invention can determine whether or not data has been correctly stored in a cache memory even when the data is not...
US-7,996,711 Memory errors
The present invention provides a method of protecting against errors in a boot memory, the method comprising initiating booting of a processor by executing...
US-7,996,710 Defect management for a semiconductor memory system
A method is provided for managing defects in a semiconductor memory system having a plurality of addressable locations. In the method, a first plurality of the...
US-7,996,709 Remote data mirroring system
A method for data protection includes accepting data for storage from one or more data sources (24). The data is sent for storage in a primary storage device...
US-7,996,708 Techniques for file system resource restoration
Techniques for file system resource restoration are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for file...
US-7,996,707 Method to recover from ungrouped logical path failures
A system and method for recovering from a single logical path failure. More specifically, although a host has not grouped its logical paths, the host knows...
US-7,996,706 System to recover a failed flash of a blade service processor in a server chassis
A system for recovering a server blade, in a multiple server blade computer, that is lost during a flash update operation on a service processor in the server...
US-7,996,705 Signal bus, multilevel input interface and information processor
A multilevel input interface device connected to a signal bus including one or more data lines that transmit an M-level signal and a clock line that transmits a...
US-7,996,704 Asynchronous first in first out interface and operation method thereof
The invention provides an asynchronous first in first out (FIFO) interface and operation method wherein a read-out clock and a write-in clock of the...
US-7,996,703 Method and apparatus to avoid power transients during a microprocessor test
Exemplary embodiments provide a computer-implemented method and a system for a startup cycle for a cycle deterministic start. An initializing mechanism applies...
US-7,996,702 System and method for testing overclocking capability of CPU
A test system for overclocking capability of a central processing unit (CPU) includes a basic input and output system (BIOS), a frequency generator, and a...
US-7,996,701 Automated clock relationship detection
Automated clock relationship detection may quickly and reliably detect a clock relationship with minimal latency while reducing problems due to metastability...
US-7,996,700 Media data synchronization in a wireless network
A method of keeping global time in a wireless network, the method includes reading a Time Synchronization Function (TSF) to provide an initial time base. An...
US-7,996,699 System and method for synchronizing multiple media devices
Multiple media devices are synchronized in a multi-media system having a computer system, a plurality of media devices, and a display system. Each media device...
US-7,996,698 System and method for enabling functionality based on measured power
According to one embodiment of the invention, an apparatus comprises an input port, a measuring circuit and a processor. The measuring circuit is adapted to...
US-7,996,697 Matching system of electronic device and peripheral device and matching method thereof
A matching system of an electronic device and a perpheral device and a matching method thereof are described. The system includes and electric device, having an...
US-7,996,696 Updating kernel affinity for applications executing in a multiprocessor system
A multiprocessor system dynamically updates CPU affinities for processes executing on processors of the multiprocessor system based on an external signal. The...
US-7,996,695 Circuits and methods for sleep state leakage current reduction
A circuit for reducing sleep state current leakage is described. The circuit includes a hardware unit selected from at least one of a latch, a flip-flop, a...
US-7,996,694 Dark wake
Exemplary embodiments of methods, apparatuses, and systems for powering up select components of a computer from a sleep state, maintaining a network state, and...
US-7,996,693 Integrated circuit environment initialization according to information stored within the integrated circuit
A method for automatically initializing the operational settings of a system from information stored within a non-volatile storage of an integrated circuit so...
US-7,996,692 Information processing apparatus and semiconductor integrated circuit
The information processing apparatus equipped with a microprocessor is provided. The information processing apparatus equipped with a microprocessor includes:...
US-7,996,690 System and method for dynamic utilization-based power allocation in a modular information handling system
Power from a modular chassis to plural modular information handling systems contained by the chassis is dynamically allocated according to power consumed at...
US-7,996,689 System and method for power control for ASIC device
A system and method for power control for ASIC device is disclosed. According to an embodiment, the present invention provides a system for adjusting power...
US-7,996,688 Ultrasound system power management
Disclosed are systems and methods which power-down (reduce power to or deactivate) circuits in an ultrasound system during periods in which an acoustic signal...
US-7,996,687 Product for providing a scalable trusted platform module in a hypervisor environment
Multiple logical partitions are provided in a data processing system. A unique context is generated for each one of the logical partitions. When one of the...
US-7,996,686 Branch trace methodology
Method, system, and computer program product embodiments for performing a branch trace operation on a computer system of an end user are provided. An encrypted...
US-7,996,685 Method for effective tamper resistance
A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in...
US-7,996,684 Apparatus and method for a programmable security processor
A digital logic circuit comprises a programmable logic device and a programmable security circuit. The programmable security circuit stores a set of authorized...
US-7,996,683 System, portable device and method for digital authenticating, crypting and signing by generating short-lived...
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely...
US-7,996,682 Secure prompting
Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include...
US-7,996,681 Methods for implementing color change frequency as image signature
A method for performing electronic signature verification for an entity is provided. The method includes creating a signature card for the entity by analyzing...
US-7,996,680 Secure data log management
In one embodiment a secure computer system comprises a processor and a memory module including logic instructions stored on a computer readable medium which....
US-7,996,679 System and method for performing a trust-preserving migration of data objects from a source to a target
A data migration system performs a tamper-resistant data migration for regulatory compliance systems. The system generates a secure hash for the data object,...
US-7,996,678 Embedding and detection of watermark in a motion image signal
A video watermarking scheme is disclosed, which is designed for the digital cinema format, as it will be used on large projector screens in theaters. The...
US-7,996,677 Digitally certified stationery
Systems and methods for digitally certified stationery are described. In one aspect, a stationery granting authority (SGA) receives a request from a user to...
US-7,996,676 Masked digital signatures
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with...
US-7,996,675 Host identity protocol method and apparatus
A modified Host Identity Protocol, HIP, base exchange method is provided for use by first and second HIP hosts (Initiator and Responder) having a shared state...
US-7,996,674 LDAP user authentication
A computer implemented method and data processing system for authenticating a user. A control module receives a user authentication request. The control module...
US-7,996,673 System, method and computer product for sending encrypted messages to recipients where the sender does not...
A system for encrypting and decrypting messages using a browser in either a web or wireless device or secure message client software for transmission to or from...
US-7,996,672 Support for multiple digital rights management systems for same content
Methods, systems, and apparatus, including medium-encoded computer program products, for protecting a document with multiple digital rights management systems...
US-7,996,671 Security of program executables and microprocessors based on compiler-architecture interaction
A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a...
US-7,996,670 Classification engine in a cryptography acceleration chip
Provided is an architecture for a cryptography accelerator chip that allows significant performance improvements over previous prior art designs. In various...
US-7,996,669 Computer platforms and their methods of operation
A computer platform (100) uses a tamper-proof component (120), or "trusted module", of a computer platform in conjunction with software, preferably running...
US-7,996,668 Distributed system and computer program product for establishing security in a publish/subscribe data...
A technique for establishing security in a publish/subscribe data processing broker network is presented. The technique includes providing a security extension...
US-7,996,667 System with at least two BIOS memories for starting the system
A system with at least two basic input-output system (BIOS) memories includes a chip unit, a control unit, and two or more BIOS memories. The chip unit includes...
US-7,996,666 User influenced loading sequence of startup applications
There is provided a method for altering a sequence in which programs and content are loaded upon startup of an electronic device. A user may change the loading...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.