Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,086,892 Microcode configurable frequency clock
A microcode configurable frequency clock that may be used to control the speed of high speed comparison in an operational optical transceiver. The frequency...
US-8,086,891 Power management of components having clock processing circuits
A method and system for managing power consumption of a component that employs a clock processing circuit to produce a processed clock signal used by the...
US-8,086,890 Virtual machine monitor, virtual machine system and clock distribution method thereof
A virtual machine monitor, a virtual machine system and a clock distribution method thereof. The clock distribution method includes: distributing real clock...
US-8,086,889 Semiconductor integrated circuit device for scan testing
A scan chain group structure in which a group of scan chains formed for each clock tree system in an LSI is subjected to a reconnection process so that the scan...
US-8,086,888 Storage management server and storage configuration relocating method
A storage management server collects, stores and displays positions, temperatures and temperature threshold values of physical storage devices from a storage...
US-8,086,887 Apparatus, system and method for power management
An apparatus which communicates with another apparatus includes a control unit which monitors a power consumption of the apparatus, supplies a power to the...
US-8,086,886 Group power management of network devices
A method and apparatus for group power management of network devices. Some embodiments of an apparatus include a power management module, where the power...
US-8,086,885 Runtime control of system performance
An apparatus includes a hardware unit having an interface to a clock generator, an interface to a power supply and an interface to a software unit. The...
US-8,086,884 System and method for implementing an integrated circuit having dynamically variable power limit
An integrated circuit having a dynamically variable power limit is provided. The integrated circuit comprises power management logic operable to receive...
US-8,086,883 Hardware driven processor state storage prior to entering a low power
A data processing apparatus includes a processor for processing data and having memory interface logic for controlling transfer of data to a memory. Also...
US-8,086,882 Energy measurement techniques for computing systems
An energy measurement system ("EMS") and techniques for correlating energy consumption to computing system activity. The EMS includes a data acquisition module,...
US-8,086,881 Power control of secondary copy storage based on journal storage usage and accumulation speed rate
A second storage system comprises a restore control unit for controlling restoration processing, in which a data element in a journal stored in a journal...
US-8,086,880 Information processing apparatus, information processing method, and computer program
An information processing apparatus includes a first information processor, a plurality of second information processor, and a plurality of temperature...
US-8,086,879 Powering on devices via intermediate computing device
Methods and apparatus relating to powering on devices via an intermediate computing device are described. In an embodiment, a request for data by a first device...
US-8,086,878 Methods and apparatus for provisioning phantom power to remote devices
An apparatus provisions power from a power budget to remote devices configured to obtain phantom power. The apparatus includes, among other things, a controller...
US-8,086,877 Storage device and control method for the same
A storage device is provided with: a first management section that manages a storage area provided by one or more hard disk drives on a basis of a predetermined...
US-8,086,876 Static and dynamic power management for a memory subsystem
In one embodiment, an information handling system may include a processor, a power supply coupled to the processor, a memory device communicatively coupled to...
US-8,086,875 Starting device
A starting device includes a first transform device that restores a first transfer signal, which is converted from an input signal supplied from an input...
US-8,086,874 Method and system for controlling an array of point-of-load regulators and auxiliary devices
A power control system comprises at least one POL regulator, at least one auxiliary device, a serial data bus operatively connecting the POL regulator and the...
US-8,086,873 Method for controlling file access on computer systems
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response...
US-8,086,872 Method for setting security channel based on MPCP between OLT and ONUs in EPON, and MPCP message structure for...
Provided is a method for setting a security channel between an OLT and at least one ONU in an EPON. In detail, a channel is generated by which the OLT makes a...
US-8,086,871 Method for fast decryption of processor instructions in an encrypted instruction power architecture
A method and apparatus for an independent operating system that prevents certain classes of computer attacks. Instruction decryption is performed on an existing...
US-8,086,870 Methods and apparatus for hardware normalization and denormalization
Methods and apparatus are provided for efficiently normalizing and denormalizing data for cryptography processing. The normalization and denormalization...
US-8,086,869 System for software source code comparison
A system for analyzing similarities between a first and second corpus or between a set of concepts and a corpus uses natural language processing and machine...
US-8,086,868 Data communication method and system
Public-key cryptography is realized by means of PKI in which biometrics data, in which biological information of users is converted to numerical values, are...
US-8,086,867 Secure identity and privilege system
A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the...
US-8,086,866 Methods and apparatus for efficient computation of one-way chains in cryptographic applications
Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way...
US-8,086,865 Supplying cryptographic algorithm constants to a storage-constrained target
The present invention provides for authenticating a message, A security function is performed upon the message, The message is sent to a target. The output of...
US-8,086,864 Low power HMAC encryption apparatus
There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile...
US-8,086,863 Method and a system for protecting path and data of a mobile agent within a network system
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure...
US-8,086,862 Program data file storage method in broadcast receiver and broadcast receiver
Conventionally, when the version of a program has been upgraded, the whole of a currently stored program needs to be deleted to be replaced by a new program,...
US-8,086,861 Information processing terminal and status notification method
The present invention aims at providing an information processing terminal, a status notification system, and a status notification method that can protect both...
US-8,086,860 Method for preventing and detecting hash collisions of data during the data transmission
A means for avoiding hash collisions by means of message pre-processing function to increase randomness and reduce redundancy of an input message whereby hash...
US-8,086,859 Generation of electronic signatures
A generator uses a robust programming framework to create an electronic signature in association with a data item, wherein the electronic signature includes...
US-8,086,858 Secure method of termination of service notification
A method for notifying a client device of termination of at least one service provided to the client device by a server system within an enterprise network is...
US-8,086,857 Identity-based-encryption messaging system
A system is provided that uses identity-based encryption to support secure communications between senders and recipients over a communications network. Private...
US-8,086,856 Disabling on/off capacity on demand
Apparatus and article of manufacture for disabling on-demand access to computerized resources on a computerized apparatus are disclosed. The method comprises...
US-8,086,855 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and...
Interface device for interfacing between a PLMN network and a non-PLMN network, the PLMN network being configured to recognize cellular base stations as nodes...
US-8,086,854 Content protection information using family of quadratic multivariate polynomial maps
A computer based method and apparatus to tie content protection information to recipient devices via a family of deterministic permutations of quadratic...
US-8,086,853 Automatic centralized authentication challenge response generation
A centralized challenge response verification server such as a RADIUS server is used to generate challenge responses as well as to verify challenge responses....
US-8,086,852 Providing a trusted platform module in a hypervisor environment
A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing...
US-8,086,851 Methods for broadcasting and receiving a scrambled multimedia programme, network head, terminal, receiver and...
A method of broadcasting a scrambled multimedia program, by way of a broadcast network, in which before transmitting a license key; a network head carries out a...
US-8,086,850 Secure group communication among wireless devices with distributed trust
In one embodiment, a method of forming a secure group from a plurality of nodes for communicating with a user A comprises performing a discover protocol,...
US-8,086,849 Secure internet-scale eventing
A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event...
US-8,086,848 Automated process for a web site to receive a secure socket layer certificate
The present invention provides systems and methods for enabling encrypted communication capabilities for a Subscriber's Web Site, thereby allowing Customers to...
US-8,086,847 Computer program product and computer system for peer-to-peer communications
An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security...
US-8,086,846 Providing non-proxy TLS/SSL support in a content-based load balancer
Methods and systems for providing non-proxy Secure Sockets Layer and Transport Layer Security (SSL/TLS) support in a content-based load balancer are described....
US-8,086,845 Secure tunnel over HTTPS connection
Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them...
US-8,086,844 Online trusted platform module
An online trusted platform module (TPM) in communication with a security module that can be located elsewhere in the network in a server machine. In an...
US-8,086,843 Performing cryptographic provider failover
Cryptographic provider failover is performed. Upon receipt of a first security request, an integrated cryptographic provider constructs a table including a list...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.