Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,132,017 Method and apparatus for securely synchronizing password systems
A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and...
US-8,132,016 Method, system, and computer program product for the authentication of multiple users in a common session
A first information handling system ("IHS") receives identification information of a first user of a second IHS. The first IHS initiates a network session in...
US-8,132,015 Method and system for loading a secure firmware update on an adapter device of a computer system
One embodiment of the present invention sets forth a method for loading a secure firmware update onto an adapter device in a computer system. The method...
US-8,132,014 Image archiver
An archiver system for tracking the exchange of personally identifiable information in document production systems includes a document production device and a...
US-8,132,013 Long-term authenticity proof of electronic documents
Systems, methods and computer program products are disclosed for providing long-term authenticity proof of an electronic document having a digital signature,...
US-8,132,012 Method and apparatus for the secure identification of the owner of a portable device
An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device...
US-8,132,011 System and method for authenticating at least a portion of an e-mail message
A system and method allows some or all of an e-mail message, such as the sender or its contents, to be authenticated, for example, to identify a message as...
US-8,132,010 Authentication system
An authentication system determines if a counterfeit ineligible unit is installed in a main device. When connected with a battery pack, a notebook PC generates...
US-8,132,009 Authentication system
An authentication system determines if a counterfeit ineligible unit is installed in a main device. When connected with a battery pack, a notebook PC generates...
US-8,132,008 Method and apparatus for communicating information between a security panel and a security server
A security panel includes a processor, memory, and a network interface having a unique MAC address, and is configured to communicate over a network with a...
US-8,132,007 PANA authentication method and system
A Protocol for carrying Authentication for Network Access (PANA) authentication system is provided. The system includes: a PANA client (PaC) which establishes,...
US-8,132,006 Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to,...
A server (120) uses a password (.pi.) to construct a multiplicative group (Z.sub.N*) with a (hidden) smooth order subgroup (<x'>), where the group order...
US-8,132,005 Establishment of a trusted relationship between unknown communication parties
The present invention provides an establishment of a trusted relationship between two mutually unknown communication parties in a communication system without...
US-8,132,004 Multiple independent levels of security containing multi-level security interface
Methods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an...
US-8,132,003 Secure platform voucher service for software components within an execution environment
Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are...
US-8,132,002 Fast system call method
A method of a fast system call is provided. First, a logical operation to compute a kernel service routine is used. Then the logical operation result is...
US-8,132,001 Secure telephony service appliance
Secure telephony service appliances are created from computing devices. The computing devices have restricted access to their hardware and software. The...
US-8,132,000 Secure transport of multicast traffic
Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join...
US-8,131,999 Distance-preserving anonymization of data
An embodiment includes a system with a processing unit and a communication unit. The processing unit is configured: to compute a first reference point of a data...
US-8,131,998 Transparent authentication of continuous data streams
A system, apparatus and method for transparently authenticating continuous data streams. A continuous data stream is divided into data blocks. Block...
US-8,131,997 Method of mutually authenticating between software mobility device and local host and a method of forming...
A method of mutually authenticating between a local host and a software mobility device including an operating system virtualization layer, and a method of...
US-8,131,996 Distributed management of a certificate revocation list
In a method for managing a Certificate Revocation List (CRL), a first device (31, 61) receives the CRL (33, 67) which comprises at least one revoked certificate...
US-8,131,995 Processing feature revocation and reinvocation
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with...
US-8,131,994 Dual cryptographic keying
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security...
US-8,131,993 System and method for a commercial multimedia rental and distribution system
A system and method for securing intellectual property rights in distributed intellectual property. Rights are granted and policed in electronically distributed...
US-8,131,992 Methods and apparatus for identifying the impact of changes in computer networks
The impact of device configuration changes on operational issues and policy compliance in a computer network can be discerned from a visual data presentation...
US-8,131,991 System and method for configuring plural software profiles
A computer with multiple software applications has defined for it plural software profiles for selection of one of the profiles in response to a system and/or...
US-8,131,990 Data processing apparatus and method of mounting logical drive
A data processing apparatus and a method of mounting a logical drive are provided which reduce the time required for completing start-up of an application. A...
US-8,131,989 Method and apparatus for establishing safe processor operating points
A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores...
US-8,131,988 Secure boot device
An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for...
US-8,131,987 Virtual appliance pre-boot authentication
A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system...
US-8,131,986 System and method for boot loading of programs within a host operating environment having one or more linked...
A system and method for loading programs during a system boot using stored configuration data in a predetermined file system from a prior session and providing...
US-8,131,985 Semiconductor memory device having processor reset function and reset control method thereof
A semiconductor memory device for use in a multiprocessor system includes a shared memory area and a reset signal generator. The shared memory area is...
US-8,131,984 Pipelined microprocessor with fast conditional branch instructions based on static serializing instruction state
A microprocessor includes a control register that stores a control value that affects operation of the microprocessor. An instruction set architecture includes...
US-8,131,983 Method, apparatus and article of manufacture for timeout waits on locks
Embodiments of the invention provide techniques for performing timeout waits of process threads. Generally, a thread requesting access to locked resource sends...
US-8,131,982 Branch prediction instructions having mask values involving unloading and loading branch history data
A method for branch prediction, the method comprising, receiving a load instruction including a first data location in a first memory area, retrieving data...
US-8,131,981 SIMD processor performing fractional multiply operation with saturation history data processing to generate...
A data processing system, apparatus and method for performing fractional multiply operations is disclosed. The system includes a memory that stores instructions...
US-8,131,980 Structure for dynamic livelock resolution with variable delay memory access queue
A design structure for resolving the occurrence of livelock at the interface between the processor core and memory subsystem controller. Livelock is resolved by...
US-8,131,979 Check-hazard instructions for processing vectors
The described embodiments provide a system that determines data dependencies between two vector memory operations or two memory operations that use vectors of...
US-8,131,978 Restoring plural instructions for same cycle execution from partial instructions and combined supplementing...
An original first instruction word (I1) to an original third instruction word (I3) include a bit field (L11) and a bit field (L12) to a bit field (L31) and a...
US-8,131,977 Microprocessor inhibiting instruction storage in cache and not decoding based on pre-analysis information to...
A microprocessor includes: a processor core that performs pipeline processing; an instruction analyzing section that analyzes an instruction to be processed by...
US-8,131,976 Tracking effective addresses in an out-of-order processor
Mechanisms, in a data processing system, are provided for tracking effective addresses through a processor pipeline of the data processing system. The...
US-8,131,975 Matrix processor initialization systems and methods
In some embodiments, an integrated circuit comprises a microprocessor matrix including a plurality of mesh-interconnected matrix processors, wherein each matrix...
US-8,131,974 Access speculation predictor implemented via idle command processing resources
An access speculation predictor is provided that may be implemented using idle command processing resources, such as registers of idle finite state machines...
US-8,131,973 Priority determination when dumping files
A computer dumps information stored in a storage space used by a program, into a file when the program ends abnormally, by determining a priority representative...
US-8,131,972 Method and apparatus for improving memory coalescing in a virtualized hardware environment
The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for managing memory in a shared...
US-8,131,971 Methods and systems for push-to-storage
Methods and systems for storing a plurality of content fragments in a plurality of storage-and-computing elements according to a plurality of storage element...
US-8,131,970 Compiler based cache allocation
Techniques a generally described for creating a compiler determined map for the allocation of memory space within a cache. An example computing system is...
US-8,131,969 Updating system configuration information
A data storage system and associated method comprising system configuration information; a first processor adapted for identifying a portion of the system...
US-8,131,968 Information processing device
An information processing device in which memory bands can be significantly cut. In the present device, an access determining/managing portion (105) determines...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.