At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Communication apparatus and control method
A communication apparatus includes: a transmitting unit, a receiving unit and a control unit. The transmitting unit transmits video data to an external...
Determining recovery time for interdependent resources in heterogeneous
A system and associated method for determining a recovery time for a resource in a heterogeneous computing environment comprising interdependent resources. A...
Apparatus and method for micro performance tuning of a clocked digital
An apparatus and method for micro-tuning an effective clock frequency of a core in a microprocessor. The apparatus includes a microprocessor having at least one...
Security device intended to be connected to a processing unit for an
audio/video signal and process using such...
Example embodiments relate to a security device having two communication interfaces sharing at least one pin, each interface being capable of operating...
Data interface method and apparatus
A data interface method includes differentially amplifying differential data signals based on a mode control signal indicating a first mode, transmitting the...
Structures including circuits for noise reduction in digital systems
A design structure including a digital system. The digital system includes (a) a first logic circuit and a second logic circuit, (b) a first register, (c) a...
Spread spectrum clock generation
The present disclosure provides a spread spectrum clock generation system having a digitally controlled phase locked loop (PLL) and a digital frequency profile...
Apparatus and method for synchronizing a channel card in a mobile
An apparatus and a method for synchronization in a channel card in a mobile communication system are provided. A channel card for synchronizing a Digital Signal...
Dynamic power control for reduced voltage level of graphics controller
component of memory controller based on...
A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller...
Information handling system with processing system, low-power processing
system and shared resources
An information handling system employs low-power processing. In a particular form, an information handling system can include a processing system configured...
Quad-state power-saving virtual storage controller
A method, system and computer program product for reducing the collective power consumption of a plurality of storage devices including a plurality of...
Energy efficient method to wake host system for charging battery powered
portable devices via bus powered...
Optimized bus powered peripheral battery charging includes a circuit to initiate a change in an advanced configuration and power interface (ACPI) state in a...
Non-identical power supply units for higher efficiency in redundant mode
A power supply system for a server includes a first power supply, a second power supply, a first variable slope circuit, and a second variable slope circuit....
Systems and methods for determining power consumption profiles for
resource users and using the profiles for...
According to one embodiment, a system comprises a plurality of resources. The resources may be any limited-capacity computing resource that is capable of...
Protocol and interface between a LAN on motherboard (LOM) and a powered
device (PD) for a personal computing...
A Power-over-Ethernet (PoE) communication system dynamically provides power and data communications over a communications link. In a computing environment made...
System and method for improving dynamic response in a power supply
A system for improving dynamic response in a power supply includes a mainframe module having a memory and a mainframe microprocessor, the mainframe processor...
Power control unit with digitally supplied system parameters
Methods and apparatuses provide voltage regulation for a processor. Control or configuration parameters for a voltage regulator (VR) are provided digitally over...
System and method for determining power consumption
A system and method is provided to measure the power consumption of circuits whereby, in one aspect, a processor's temperature is maintained so that its power...
Power over ethernet connector with integrated power source equipment (PSE)
controller supporting high power...
In a Power over Ethernet (POE) system, a power source equipment (PSE) device configured to deliver power to one or more powered devices (PDs) over a plurality...
System and method for using an ethernet physical layer device to identify
A system and method for using an Ethernet physical layer device to identify cabling topologies. A power sourcing equipment (PSE) can power independent powered...
Power consumption reduction device for data backup
A power reducer for data backup stops a power supply one after another for each memory whose backup has been completed, thereby reducing power consumption for...
Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
Magnetic recording medium encryption
Systems and methods for easily and at high speed re-encrypting data recorded on a magnetic recording medium when the data is encrypted using an encryption key...
System and method for securely storing cryptographic keys with encrypted
The payload of a set of storage devices is encrypted using a payload key that is stored within the set of storage devices itself. However, the payload key is...
System and methods for dependent trust in a computer system
A method for dependent trust in a computer system is provided. In this method, trust dependency relationships are defined among components of the computer...
Method for authenticating and executing a program
Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility...
Method and system for user information verification
A system and method for authenticating users based on personal information. The personal information may include age-related data where the users are interested...
Integrated circuit card
An IC card includes a capacitance type fingerprint sensor, a display device, and a control unit. The display device displays an encrypted image that is readable...
Replacing blinded authentication authority
A manufacturing entity provides a blinded signature to a secure device and associates a time with the blinded signature. If a signing key is compromised, the...
Method and arrangement for real-time betting with an off-line terminal
The invention relates generally to a method and arrangement for real-time betting with an off-line terminal, and especially to the technological field of...
Method and apparatus for digital signature authentication, and computer
An apparatus for digital signature authentication includes a dividing unit that divides streaming data into plural pieces of partial data in a predetermined...
Digital watermark systems and methods
A digital watermark is added to audio or visual content. An illustrative embodiment segments the content, permutes the segments, and transforms such data into...
Document authentication combining digital signature verification and
A document authentication system and method combine digital and non-electronic (or visual) authentication methodologies in an integrated, unified manner. As...
Portable data storage device with encryption system
A portable data storage device has a non-volatile memory 3 for storing user data, an interface section 7 for receiving and transmitting data to a host, and a...
Electronic certificate issuance system, electronic certificate issuing
device, communication device, and...
An electronic certificate issuance system comprising at least one communication device, and an electronic certificate issuing device for issuing a set of an...
System and method for securing on-line documents using authentication
A system and method for providing an authentication code across a network for use in authentication of documents, such as printed lottery tickets. The system...
Method for realizing network access authentication
A method for realizing network access authentication, wherein a network access authentication device pre-storing a system integrity value of a device waiting to...
Securing multiple links and paths in a wireless mesh network including
A method and logic encoded in tangible media and apparatus for securing links between a mesh point and one or more identities of one or more parent mesh points...
System and method for lost data destruction of electronic data stored on
portable electronic devices
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device...
System and method for providing secure multicasting across virtual private
A method is provided for securely transmitting multicast data across an unsecured public network. Such a method includes receiving a join message identifying at...
Method and system for ensuring secure forwarding of messages
The method is for ensuring secure forwarding of a message is performed in a telecommunication network that has at least one terminal from which the message is...
Setting an encryption key
In some aspects, an encryption key setting method includes inputting a code string, selecting a generating procedure for generating a code string from a...
Information processing apparatus with certificate invalidity determination
An information processing apparatus includes a verification unit for verifying validity of a certificate that certifies a communication party and a transmission...
Domain-less service selection
A method and apparatus for providing domainless service selection (DLSS) are described. According to one embodiment of the invention, there is a service...
System and method for providing security via a top level domain
A system and method is disclosed for providing end-to-end security for communications between registered clients of a top level domain without the need for...
Network and node for providing a secure transmission of mobile application
According to the present invention a telecommunication network with a first domain (PLMN-A) comprising at least one mobile application part protocol instance is...
Apparatus and method for counter-based communications in wireless sensor
networks and other networks
A method includes wirelessly receiving a message at a receiving node. The method also includes extracting a partial counter value from the message, where the...
Hardware-bonded credential manager method and system
An internet data exchange authentication method that can provide much of the user authentication assurance and capability of dedicated computer security...
Authentication of products using identification tags
An identification tag for authenticating a product is associated with the product and has authentication data transmissible to a reader device. The ...
Selecting a random processor to boot on a multiprocessor system
Pervasive logic is provided that includes a random event generator. The random event generator randomly selects which processor of a plurality of processors in...