At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Adding or replacing disks with re-key processing
In a network of multiple storage devices, a storage device may become faulty and need to be replaced or additional capacity may need to be added through...
Protection of memory areas
A method for loading a program, contained in at least a first memory, into a second memory accessible by an execution unit, in which the program is in a...
Risk adaptive information flow based access control
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the...
Separation of duties checks from entitlement sets
A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access...
Encrypted file storage
Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. The client device may obtain at least one...
Security and data privacy for lighting sensory networks
In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key...
Data storage device and data scrambling and descrambling method
A data scrambling and descrambling technology based on logical addresses. A data storage device with the data scrambling and descrambling technology includes a...
Systems and methods for detecting discrepancies in automobile-network data
The disclosed computer-implemented method for detecting discrepancies in automobile-network data may include (1) receiving data that indicates at least one...
Quantifying the risks of applications for mobile devices
Quantifying the risks of applications ("apps") for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes...
Detecting vulnerability to resource exhaustion
In an aspect of managing resource exhaustion, a method includes receiving a program code that is configured for generating a random number. The generating is...
Computer system for improved security of server computers interacting with
A computer system is configured to improve security of server computers interacting with client computers, and comprises: a memory, a processor coupled to the...
Technologies for protecting systems and data to prevent cyber-attacks
Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from...
Detection of fault injections in a random number generator
A method for detecting a fault injection in a random number generation circuit, wherein a bit pattern is mixed to a bit stream originating from a noise source...
Detection of return oriented programming attacks
In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine...
Sensor based rules for responding to malicious activity
Systems and techniques are provided for creating sensor based rules for detecting and responding to malicious activity. Evidence corresponding to a malicious...
Isolated program execution environment
Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer...
Dynamic master data management
A computer-implemented method includes, in a master data management system, receiving a persistent modification request affecting a master data attribute,...
Implementing extent granularity authorization and deauthorization
processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization and deauthorization processing for a Coherent...
Screen unlocking method
A screen unlocking method applied to an electronic device including a touch screen and storing graphic patterns and a plurality of text data is provided. Each...
Prevention of pirate products in an elevator control using ID
A system and a method to prevent the use of pirate products in an elevator control are provided. The system includes at least one elevator control, an updating...
Systems for validating hardware devices
A computing environment in which devices interoperate with a plurality of hardware components. Inconsistencies in user experience when operating devices that...
Electronic device, system for pairing electronic devices and method for
pairing electronic devices
An electronic device includes: a data acquiring unit configured to detect an encryption apparatus in a preset distance range and to read preset data in the...
Mobile device, and authentication program
A mobile device includes a housing, a sensor and a deformation detecting IC which detect deformation of the housing, a memory which stores a pattern database in...
Graphical user passwords
A method includes a computer device receiving a set of images for at least one user; the computer device receiving unique visual clue inputs from the at least...
Federation among services for supporting virtual-network overlays
Computerized methods, systems, and computer-readable media for promoting cooperation between a first and second virtual network overlay ("overlay") are...
Implementing extent granularity authorization processing in CAPI adapters
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
Security of program executables and microprocessors based on
A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a...
Processing data stored in external storage device
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data...
Method for using a multi-function computer for testing
A system and method facilitate the use of a multi-function computer for an examination. An application implementing the method receives a hash input from a user...
Attribute combination discovery for predisposition determination
A method and system are presented in which a query attribute is used as the basis for accessing stored attribute combinations and their frequencies of...
Connected patient monitoring system and method to provide patient-centric
intelligent monitoring services
A medical system (10) including a remote patient monitoring system (40) and an medical body area network (MBAN) system. The remote patient monitoring system...
Networked dialysis system
A dialysis system includes (i) a first home dialysis machine located at a first patient's home; (ii) a second home dialysis machine located at a second...
A system and method is described for printing a label with an RFID tag. The system includes an RFID reader that queries a first RFID tag coupled to a first...
Managing user information--source prioritization
Systems, methods, and computer-readable medium are provided for managing user information. For example, data of a particular data type may be received from a...
Managing user information--background processing
Systems, methods, and computer-readable medium are provided for managing user information. For example, subscription information may be received from an...
Distributed healthcare database system and method
A system and method distributing healthcare database access is disclosed. The system and method interpose a data mapping server (DMS) between a data request...
Methods for obtaining a single molecule consensus sequence
Methods obtaining a single molecule consensus sequence for a single template molecule, and for obtaining a plurality of single molecule consensus sequences for...
Method and apparatus for mobile disaster victim identification
Mobile telecommunications or personal computing apparatus may be specially programmed for predicting whether an unknown biological specimen of an individual to...
Pharmaco-genomic mutation labeling
Electronic label processor compares bioinformatic values to determine pharmaco-genomic mutation associated with host. Label display indicates pharmaco-genomic...
Method of constructing a behavior model of an airplane engine
A method of constructing a behavior model (32) of an airplane engine, in particular in order to track the operation of the engine, the method comprising a...
Optimizing IC performance using sequential timing
A method of optimizing timing performance of an IC design is provided. The IC design is expressed as a graph that includes several nodes that represent IC...
Optimizing IC design using retiming and presenting design simulation
results as rescheduling optimization
A method of optimizing timing performance of an IC design is provided. The IC design is expressed as a graph that includes a plurality of paths. Each path...
3D device modeling for FinFET devices
Among other things, techniques and systems for 3D modeling of a FinFET device and for detecting a variation for a design layout based upon a 3D FinFET model are...
Wiring topology method and information processing device
A wiring topology display method, includes: obtaining layout information indicating positions of components and wiring coupling the components; dividing first...
Method and system for template pattern optimization for DSA patterning
A method for design template pattern optimization, comprises receiving a design for a fin field effect transistor (FinFET) device, wherein the design includes a...
System and method for creating hybrid resistance and capacitance (RC)
netlist using three-dimensional RC...
One or more systems and methods for a cell based hybrid resistance and capacitance (RC) extraction are provided. The method includes generating a layout for a...
Methods of generating circuit layouts using self-alligned double
patterning (SADP) techniques
At least one method disclosed herein involves creating an overall pattern layout for an integrated circuit that is to be manufactured using a self-aligned...
Method and apparatus for performing automatic decoupling capacitor
selection for power distribution networks
A method for designing a power distribution network (PDN) for a system implementing a target device includes computing a target PDN impedance value for the PDN....
Enhanced parameter tuning for very-large-scale integration synthesis
A method and system are provided for tuning parameters of a synthesis program for a design description. The method includes (a) ranking individual parameter...
Using waveform propagation for accurate delay calculation
Accurate timing analysis during STA is performed using detailed waveform information in addition to the traditional slew information. A waveform memory system...