At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Keyboard with shortcut keys
Bottle cap with oversized lip
Using a digital fingerprint to commit loaded data in a device
Committing data loaded on a device includes computing a program unit storage commitment fingerprint over a program unit if the program unit is finally loaded in...
Mechanism for lossless, lock-free buffer switching in an arbitrary-context
A method for tracing on a processor including executing an executing control block on the processor to obtain data, wherein an interrupt on the processor is...
Run-time verification of annotated software code
Verification of a software program may be automated by receiving a program source file comprising program source code and at least one formal specification...
Method and apparatus of selecting local or remote processing
A user is provided with the choice of selecting either a client or a server for providing either local or remote services on a data file, respectively, if both...
Method and system for detecting and correcting data errors using data
A method for correcting an error in a first block including detecting an error in the first block, generating a first permutation of the first block, calculating...
User-customizable input error handling
A programmer to set his own input error handler after examining the context where the error occurs by utilizing a set error handler subroutine. The context may...
Authenticating legacy service via web technology
A system and method for authenticating a legacy service using internet technology is disclosed. An authentication module is associated with the legacy server....
Using token-based signing to install unsigned binaries
The present invention provides for token based signing of an unsigned binary which may be a stream of bits (e.g., 0's and 1's). The unsigned binary is signed...
Method of installing an image on a client over a network securely using a
wanboot binary and a kernel to...
A method for installing an image on a client including obtaining a wanboot binary from the boot server, determining whether the wanboot binary is valid,...
Method for storing long-term performance data in a computer system with
finite storage space
One embodiment of the present invention provides a system that systematically monitors and records performance information in a computer system. During...
System and method for block write to memory
A hardware implemented method for writing data to a cache is provided. In this hardware implemented method, a Block Initializing Store (BIS) instruction is...
Computer-based presentation manager and method for individual user-device
Access to external service providers is provided through portlets, where each portlet accessible by a user is represented on the display of the user device....
Distributed token manager with transactional properties
A system and method for controlling access to data in a distributed computer system. Distributed Token Manager (DTM) is a system-level service that coordinates...
Source synchronous I/O bus retimer
A device configured to recover and repeat source synchronous data. The device is configured to receive source synchronous data via a first interface and recover...
There is provided a drive carrier. The drive carrier is configured to receive a media drive and is also configured to be removably receivable in a receiving...
Sub-sampling of weakly-driven nodes
A method and apparatus for performing on-chip voltage sampling of a weakly-driven node of a semiconductor device are disclosed. In some embodiments, the node is...
Hardware security module (HSM) chip card
Processing circuitry is integrated within a hardware security module (HSM) chip card. The processing circuitry is configured to operate in accordance with a set...
FM scanner radio
Mechanism for automatic synchronization of scripting variables
The present invention defines a mechanism for automatic synchronization of scripting variables in an action tag extension facility. Attached to each action,...
IBIST test for synchronous lines at multiple frequencies
A system for testing a synchronous link utilizing a single test pattern sequence. Components coupled via a link are each configured to generate and check test...
Selectively performing fetches for store operations during speculative
One embodiment of the present invention provides a processor which selectively fetches cache lines for store instructions during speculative-execution. During...
Persistent queuing for distributed file systems
Disclosed are novel methods and apparatus for persistent queuing in distributed file systems. In an embodiment, an apparatus is disclosed. The apparatus includes...
Method for adaptive sub-gridding for power/ground plane simulations
An adaptive subgridding method for power/ground plane simulations. The method includes superimposing a grid of cells onto a circuit plane. For each cell, the...
Arbitration of communication channel bandwidth
A method for arbitrating channel bandwidth among a plurality of logical connections desiring access over a communication channel to transmit data is provided....
Compression apparatus for applying localized pressure to the venous system
of the leg
An apparatus is provided for applying compression therapy to an extremity of the human body, such as a portion of the human leg. The device includes a flexible...
Enhanced privacy protection in identification in a data communications
A method for enhanced privacy protection in identification in a data communications network includes enrolling for a service on the data communications network,...
Mobile download system
Methods and systems are provided for adapting software applications for download and execution on a variety of different mobile devices which employ different...
Trust mechanisms for a peer-to-peer network computing platform
Embodiments of a decentralized, distributed trust mechanism that may be used in various networking platforms including peer-to-peer platforms, to implement trust...
Method, system, and program for managing access to a device
Provided are a method, system, and program for managing access to a device. An I/O request directed toward the device is received and a determination is made of...
Secure photo carrying identification device, as well as means and method
for authenticating such an...
Means and a method for authenticating a photographic image (3) on an identification device (1), the identification device (1) being provided with: a photographic...
Panel for integrated multi-function optical disk drive module
Ordering program data for loading on a device
Optimized loading of program data on a device comprises receiving a program including multiple program units, at least one of which is a main program unit. A use...
Factored assert chains
Factored assert chains allow for improved tracking of implicit information in a computer program. The compiler may generate assert statements at various points...
Method and apparatus for software metrics immediate feedback mechanism
A method of providing software metrics attribute feedback involves setting a metrics attribute threshold value for a software component, generating a plurality...
Hot-card caching to avoid excessive remembered-set updating
An incremental collector that employs remembered sets to identify the locations where a mutator has modified references to objects in respective heap regions...
Dynamic network session redirector
A dynamic session redirector provides the ability to receive requests for network accessible storage resources and redirect them to the appropriate resources as...
Peer group name server
A system and method for providing a name service in a peer-to-peer environment is described. A peer group name server may be a standalone name server that may be...
Migrating large data sets for products upgrades
A mechanism is disclosed for migrating large data sets for product upgrades. In one embodiment, an identifier is received as a parameter of a first method of an...
Electric hair curling apparatus
An electric hair curler is disclosed as including a handle; and a heating tube engaged with the handle and having a longitudinal axis, and the heating tube is...
Metal complexes for catalytic carbon-carbon bond formation
The present invention relates to a complex comprising a novel and stable ligand and a metal center. The ligand contains a ring, particularly a phenyl group, or a...
This invention relates to a composition that contains quercetin, vitamin B1, vitamin B2, vitamin B3, vitamin B6, vitamin B12, vitamin C, caffeine, ...
The invention is a recharging unit having an efficiently designed recharging base and at least one rechargeable implement, which also serve as an advertising...
Magnifying lens cover for combination padlocks
By providing a magnifying member which is securely affixed to the housing of a combination padlock in cooperating association with the rotating dials thereof, an...