At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System, architecture, and method for logical server and other network
devices in a dynamically configurable...
Network architecture, computer system and/or server, circuit, device, apparatus, method, and computer program and control mechanism for managing power...
Storage apparatus for power saving and achieving longest mean time between
Proposed is an operation method for seeking a power interruption operation target in which MTBF will become longest. When a target value regarding a power...
Storage system including plurality of storage apparatuses
Conventionally, no consideration was given to the control of the main power supply circuit in a storage apparatus. Thus, unnecessary electric power will be...
Power supply controlling system
A power supply controlling system includes a receiving device, a power supply device, and a transmitting device connected to an information processing...
Electronic circuit and electronic device
An electronic circuit according to the present invention has one or more circuit sections which operate according to a variable power supply voltage and a...
Configuring processors and loads for power management
Controlling processors and processor hardware components in a computing device based on execution load and a power saving preference. The power saving...
Circuit and method for dynamic in-rush current control in a power
Disclosed are a circuit and a method for controlling dynamic in-rush current in a power management circuit. The circuit includes a current limiting unit having...
Method for controlling the power supply from a power source to a power
A system and method for controlling power supply of a power source to at least one power consumer to a desired value in the range of from 0 and 100% in which...
Powered device classification in a wired data telecommunications network
In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to...
Controlling download and playback of media content
Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server...
An anti-tamper module is provided for protecting the contents and functionality of an integrated circuit incorporated in the module. The anti-tamper module is...
Method for replacing contents of a data storage unit
A data storage device includes a plurality of data storage units, a physical random number generator with a noise source based on a physical noise process, for...
System and method for generating and utilizing organically grown content
in a directory assistance environment
A method is provided for updating a contact listing. The method includes receiving a request from a requestor for a contact listing corresponding to a desired...
Anti-attacking method for private key, controller, storage device and
computer readable recording medium having...
An anti-attacking method for a private key is provided. The method includes using a plurality of storage areas for storing the same security information. The...
System and method for remote reset of password and encryption key
A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a...
Securing circuit designs within circuit design tools
A method of securing a circuit design can include generating a string including a plurality of elements. The plurality of elements can include elements of...
Method to protect a cryptographic assembly by homographic masking
This invention relates to a method to protect an assembly implementing a cryptographic calculation process which uses a homographic function f of type:...
To provide an authentication technology making it compatible to facilitate inputting of authentication information and to ensure the security. An authentication...
Compressed data scrambled distribution device and playback device thereof
The present invention provides a scrambled compressed data distribution device that can perform a high-resistance scrambled compressed data distribution by...
Certificate-based encryption and public key infrastructure
A digital message is sent from a sender to a recipient in a public-key based cryptosystem comprising an authorizer. The authorizer can be a single entity or...
Challenge response-based device authentication system and method
A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the...
Reproducing apparatus, recording apparatus and display apparatus
A system effecting a data reproducing method for a plurality of devices, for sending and receiving data by authenticating the plurality of devices with each...
Method for fast, secure 802.11 re-association without additional
authentication, accounting, and authorization...
A method wherein an access point authenticates itself with neighboring access points and establishes secure and mutually authenticated communication channels...
Reading a locked windows NFTS EFS encrypted computer file
Embodiments of the invention relate to reading at least one locked, encrypted computer file encrypted by an encryption filter driver running on an operating...
Secret sharing device, method, and program
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial...
Member certificate acquiring device, member certificate issuing device,
group signing device, and group...
It is an object of the present invention to enhance the security and reduce the data amount of data to be handled in a group signing system, in which when the...
System and method for sending secure messages
Electronic messages are sent from a sending system to an identified recipient and are encoded using information contained in a certificate. A key store is...
Method and system for displaying information on installed units
An exemplary embodiment of the present invention provides a method for providing information about units installed in a computing device. The method includes...
Testing and alert device and method for power leakages
A testing and alert device for power leakages of a computer includes a basic input/output system (BIOS) chip located on a motherboard of the computer, a south...
Enhanced capabilities in provisioning
Some embodiments of enhanced capabilities in provisioning on computing machines in a networked system have been presented. In one embodiment, a software vendor...
Method and system for using a server management program for an error
Methods and systems are disclosed for using a server management program for an error configuration table, wherein a user loads the management program, which...
Executing micro-code instruction with delay field and address of next
instruction which is decoded after...
A microsequencer is disclosed that controls the order in which microcode instructions are fetched from a microcode ROM. Each microcode instruction includes an...
Out-of-order execution microprocessor that selectively initiates
instruction retirement early
A microprocessor for improving out-of-order superscalar execution unit utilization with a relatively small in-order instruction retirement buffer. A plurality...
System and method for performing deterministic processing
A system and method is provided for performing deterministic processing on a non-deterministic computer system. In one example, the system forces execution of...
Providing extended precision in SIMD vector arithmetic operations
The present invention provides extended precision in SIMD arithmetic operations in a processor having a register file and an accumulator. A first set of data...
Systems and methods for controlling instruction throughput
Systems and methods for controlling instruction throughput are disclosed. One embodiment of a system may comprise a comparator that determines a difference...
Variable length pipeline processor architecture
In one implementation, a pipeline processor is provided having a base architecture that includes one or more decoders operable to decode program instructions...
Altering data storage conventions of a processor when execution flows from
first architecture code to second...
A computer. A processor pipeline alternately executes instructions coded for first and second different computer architectures or coded to implement first and...
Processing system having multiple engines connected in a daisy chain
A processing system includes a group of processing units ("PUs") arranged in a daisy chain configuration or a sequence capable of parallel processing. The...
Dynamic instruction and data updating architecture
A memory update engine provides flexible modification of data in memory. A processor may employ the update engine to update filter coefficients, special effects...
System and method for assigning tags to control instruction processing in
a superscalar processor
A tag monitoring system for assigning tags to instructions embodied in software on a tangible computer-readable storage medium. A source supplies instructions...
Multithreaded processor with multiple concurrent pipelines per thread
A multithreaded processor comprises a plurality of hardware thread units, an instruction decoder coupled to the thread units for decoding instructions received...
Electronic device and address space expansion method
An address space expansion method implemented by the electronic device which includes a storage unit, wherein the storage unit includes a first storage unit and...
Online backup system with global two staged deduplication without using an
An encryption for a distributed global online backup system with global two-stage deduplication in the absence of an indexing database where data blocks are...
Data storage device
A storage device includes a memory for storing data in a plurality of logical volumes; a controlling unit for controlling an access to data in accordance with a...
System and method for content replication detection and elimination in
A system and method for effectively increasing the amount of data that can be stored in the main memory of a computer, particularly, by a hardware enhancement...
Semiconductor memory device and operation method thereof
A semiconductor memory device comprises an input unit inputting an address and data; a storage unit storing data and a FAT; an address conversion unit...
Virtualization with fortuitously sized shadow page tables
In a computing system having virtualization software including a guest operating system (OS), a method for providing page tables that includes: providing a...
System and method for dynamic memory allocation
A method for managing the allocation of memory to one or more applications. The method includes allocating a variety of fixed size memory blocks to a requesting...
Method and apparatus to recover from interrupted data streams in a
Detection and proper deduplication of a re-started data stream in a segmentation analysis-based deduplication system are provided by retaining information about...