Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: computer memory





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,411,964 Characterizing, detecting and healing vulnerabilities in computer code
An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location...
US-9,411,961 Extension component for authenticating game data
Disclosed are methods, apparatus and systems, including computer program products, implementing and using techniques for authenticating data for playing a game...
US-9,411,931 Method, apparatus and computer program product for receiving digital data files
A method, apparatus and computer program product are provided to efficiently receive digital imaging data files, regardless of their size. For a respective data...
US-9,411,910 Dental analysis method and system
A system for designing the dentition of a patient, comprising a first input for providing an image of the smile of the patient to the system, an output, a...
US-9,411,908 Architecture for TCAM sharing
Aspects of the disclosure provide a packet processing system. The packet processing system includes a plurality of processing units, a ternary content...
US-9,411,853 In-memory aggregation system and method of multidimensional data processing for enhancing speed and scalability
An in-memory aggregation (IMA) system having a massive parallel hardware (HW) accelerated aggregation engine uses the IMA for providing maximal utilization of...
US-9,411,838 Table organization using one or more queries
A method, system and computer program product are provided for reorganizing a database table according to a set of queries. More specifically, the table is...
US-9,411,736 System and method for an accelerator cache based on memory availability and usage
The storage processor of a data storage system such as a storage array automatically configures one or more accelerator caches ("AC") upon detecting the...
US-9,411,735 Counter-based wide fetch management
Embodiments relate to counter-based wide fetch management. An aspect includes assigning a counter to a first memory region in a main memory that is allocated to...
US-9,411,729 Salvaging lock elision transactions
A transactional memory system salvages hardware lock elision (HLE) transactions. A computer system of the transactional memory system records information about...
US-9,411,726 Low power computation architecture
An embodiment includes a system, comprising a first memory; a plurality of first circuits, wherein each first circuit is coupled to the memory; and includes a...
US-9,411,715 System, method, and computer program product for optimizing the management of thread stack memory
A system, method, and computer program product for optimizing thread stack memory allocation is disclosed. The method includes the steps of receiving source...
US-9,411,652 Runtime for automatically load-balancing and synchronizing heterogeneous computer systems with scoped...
Sharing tasks among compute units in a processor can increase the efficiency of the processor. When a compute unit does not have a task in its task memory to...
US-9,411,639 System and method for managing network navigation
A file comprising an application and data corresponding to a status of the application at a particular time is maintained in a first memory of a user device,...
US-9,411,633 System and method for barrier command monitoring in computing systems
A computing system for handling barrier commands includes a memory, an interface, and a processor. The memory is configured to store a pre-barrier spreading...
US-9,411,608 Method and apparatus for enhancing a hibernate and resume process for a computing device having an external...
Before hibernating a computing device (102), system software components (116) are notified of an upcoming hibernation process. The notifications are conveyed...
US-9,411,599 Operand fetching control as a function of branch confidence
Data operand fetching control includes a computer processor that includes a control unit for determining memory access operations. The control unit is...
US-9,411,598 Semi-exclusive second-level branch target buffer
Embodiments relate to a semi-exclusive second-level branch target buffer. An aspect includes a computer-implemented method for a semi-exclusive second-level...
US-9,411,566 System and method for removal of arraycopies in java by cutting the length of arrays
A system and method for removal of array copies in Java by reusing a source array for the target array and potentially cutting the length of the source array....
US-9,411,533 Snapshots and versioning of transactional storage class memory
A system and method enables efficient implementation of snapshots of data organized as arbitrary data structures on a byte-addressable persistent memory of a...
US-9,411,520 Method and apparatus for embedded systems reprogramming
A reprogramming device is used for reprogramming embedded systems. The reprogramming device comprises a microprocessor, a memory programmed with software to...
US-9,411,519 Implementing enhanced performance flash memory devices
A method and apparatus for implementing performance in a flash memory system in a computer system. A flash memory chip includes a function engine performing...
US-9,411,518 Method, computer program product and apparatus for accelerating responses to requests for transactions...
Responding to IO requests made by an application to an operating system within a computing device implements IO performance acceleration that interfaces with...
US-9,411,465 Systems and methods for generating a secure locking interface
Systems and methods for generating a secure locking interface on a touch-screen display of a computing device are disclosed. The system comprises a processor, a...
US-9,411,439 Input device with a customizable contour
Certain embodiments of the invention include an input device (e.g., a computer mouse) including a processor, a housing including a top side, the housing...
US-9,411,363 Synchronization in a computing device
One embodiment provides an apparatus. The apparatus includes a processor, a chipset, a memory to store a process, and logic. The processor includes one or more...
US-9,409,534 User configurable vehicle steering column stalks
A user-configurable steering column is made from steering column-mounted switches, each of which is coupled to a computer, which is also coupled to various...
US-9,409,230 Process scheduling system, method, and program
System, method and computer program product for combined scheduling of two different slab sequences by a rational technique. A two-dimensional grid graph having...
US-9,408,550 Evolving serial comparison system with critical alert notifications
A system for serial comparison of physiological data, including: a controller; a user interface; and a memory including instructions that, when executed by the...
US-9,408,103 Flexible measurements in unlicensed band
The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory) for implementing enhanced and...
US-9,407,921 Adaptive codec selection
A computing system is disclosed and may include a processor, a plurality of video processing tools, and memory. The plurality of video processing tools include...
US-9,407,860 System, method and computer program product for processing image data
A method for processing a first image having associated location data is provided. In one embodiment, the method comprises determining that a location alias...
US-9,407,755 Mobile communication devices collaborative power management
A mobile phone that coordinates power management across multiple communication devices. The mobile phone comprises a processor, a memory, long-range and...
US-9,407,648 System and method for detecting malicious code in random access memory
Disclosed are system and method for detecting malicious code in random access memory. An exemplary method comprises: detecting, by a hardware processor, a...
US-9,406,335 Monitoring of residual encrypted data to improve erase performance on a magnetic medium
In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to: determine a...
US-9,406,298 Method and apparatus for efficient i-vector extraction
Most speaker recognition systems use i-vectors which are compact representations of speaker voice characteristics. Typical i-vector extraction procedures are...
US-9,406,165 Method for estimation of occlusion in a virtual environment
A method for estimating occlusion in a virtual environment comprising at least two objects and observed from a viewpoint. Thereafter, a second item of...
US-9,406,133 System and method for real-time image registration
A method for image registration includes the steps of: providing a computer and an imager; acquiring and processing a reference image frame including a...
US-9,406,122 Method, apparatus and system for localizing a spine
A method and a corresponding apparatus and system localizes a spine in an image, in particular a computed tomography (CT) image, of a human or animal body,...
US-9,405,973 Method and apparatus for locating information from surroundings
An apparatus includes at least one a processor, and at least one memory including computer program code, the at least one memory and the computer program code...
US-9,405,950 External access to memory on an RFID tag
In embodiments of the present invention improved capabilities are described for an RFID tag comprising a radio frequency (RF) network node and a communication...
US-9,405,939 Data processing on a non-volatile mass storage device
A non-volatile mass storage device is provided comprising memory circuitry accessible to a host data processing device via a communication link. The...
US-9,405,913 Method for defending against cold-boot attacks on a computer in a self-service terminal
A method to defend effectively against cold-boot attacks includes checking state data stored in a state memory to which the system software has access. At least...
US-9,405,907 Method and apparatus of performing data executable integrity verification
Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application...
US-9,405,802 Database system and method
A method, computer program product, and computer system for a database system and method. In some embodiments, metadata associated with data stored in a...
US-9,405,790 System, method and data structure for fast loading, storing and access to huge data sets in real time
A computerized system including a processor and a computer-readable non-transient memory in communication with the processor, the memory storing instructions...
US-9,405,715 Host computer and method for managing SAS expanders of SAS expander storage system
In a method for managing serial attached small computer system interface (SAS) expanders using a host computer, the host computer connects to an SAS expander...
US-9,405,703 Translation lookaside buffer
The described embodiments include a translation lookaside buffer ("TLB") that is used for performing virtual address to physical address translations when...
US-9,405,699 Systems and methods for optimizing computer performance
In one embodiment, a method includes initiating execution of an application, the application utilizing a hash table data structure to map a plurality of keys to...
US-9,405,695 Cache modeling using random sampling and a timestamp histogram
A system and method for determining an optimal cache size of a computing system is provided. In some embodiments, the method comprises selecting a portion of an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.