At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Polyurethane injected boot assembly and associated manufacturing method
A footwear assembly having an upper that comprises a neoprene sock with a foot portion integrally connected to a leg portion. The foot portion has heel, vamp...
Boots having an appearance indicative of a particular style or construction can be constructed with portions of the boot that have an appearance and...
Processing a request to mount a boot volume
A mechanism is provided for providing access to mainframe-based data in a non-mainframe format. A host computer system receives a request from a client system...
Secure provisioning of integrated circuits at various states of
deployment, methods thereof
An integrated circuit is provisioned after the integrated circuit has been sold and integrated into a customer's product. During provisioning, the integrated...
The semiconductor device includes a power control signal generator, a fuse controller and a fuse array portion. The power control signal generator generates a...
Security enclave processor boot control
An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the...
Method for secure self-booting of an electronic device
The present invention relates to a method for a self-boot of an electronic device, wherein an external component is accessible through an interface of the...
Methods, systems, and apparatuses for managing a hard drive security
A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region,...
Root volume encryption mechanism in para-virtualized virtual machine
Techniques to perform root volume encryption in a para-virtualized virtual machine are described. A disk layout supports the root volume encryption, set key...
MBR infection detection using emulation
Emulation software executes upon an operating system of a computer and creates an emulated computer. Bootstrapping code is read into this emulated computer from...
Multiple destination live migration
A method for fast migrating of a source virtual machine located on a source host to one or more destination hosts is provided. The source migration manager...
System and method for pre-operating system memory map management to
minimize operating system failures
A method includes booting an information handling system, providing by an EFI of the information handling system a memory segment for a first EFI type memory...
Booting method and electronic device
A booting method is provided. In the booting method, a basic input/output system (BIOS) is activated to check a first set value. When the first set value...
Spark ignition internal combustion engine having intake valves with
variable actuation and delayed closure
A spark-ignition supercharged internal-combustion gasoline engine is equipped with a system for variable actuation of the intake valves including a pressurized...
Gathered boot cuff with straight insert
Methods and apparatuses for securely operating shared host computers with
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
Semiconductor memory device and operating method thereof
A semiconductor memory device includes a fuse array block including a plurality of fuses programmed with state information, an operation direction control block...
System and method for providing access to original routines of boot
Disclosed are systems and methods for detecting access of boot driver routines by malware. An example method includes identifying, by the driver interceptor,...
A user-provided keystore may be utilized in a boot process to verify a boot image as disclosed herein. A device may be determined to be in a locked or verified...
System and method for unattended computer system access
A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local...
Host device and method for testing booting of servers
In a method for testing a booting of servers, the servers are controlled to boot to perform a booting test, and are controlled to quit the booting test. A...
Self-healing using an alternate boot partition
Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to...
Self-healing using an alternate boot partition
Apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal...
System and method for booting up a computer based on data captured in a
non-volatile semiconductor memory...
A system includes a timer and a control module. The control module: in response to a first request for first data, determines whether the first data is stored...
Network apparatus and method in a computer system operating a boot-strap
or a work period
The present invention discloses a network apparatus and enabling method thereof. During the procedure of voltage biasing or host booting, an enabling signal...
Upgrade of software images based on streaming technique
Migrating a data-processing entity from a source software image installed on a mass memory of the data-processing entity to a target software image stored on an...
Security device with a magnet-based release mechanism
A security device for securing a male contact of a cable plug within a female port. A base has a receptacle configured to receive a boot. The base and the boot...
The present invention relates to a ski binding (1) with ski brake (50), particularly a touring and telemark binding, comprising a front retaining element (11)...
Graphical element laminate for use in forming a skate boot
A method of manufacturing a skate boot, including providing a first sheet of thermoplastic material, the thermoplastic material being at least one of...
Selective sub-net filtering in a pre-boot execution environment (PXE)
Embodiments of the invention address deficiencies of the art in respect to PXE processing and provide a method, system and computer program product for...
Software-based trusted platform module
A "Firmware-Based TPM" or "fTPM" ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional...
Methods and apparatus for re-provisioning a server of a data center
In a computer-implemented method for re-provisioning a server of a data center, and while the server is provisioned to a first virtual network of the data...
Method to perform instant restore of physical machines
A method of performing data restore includes connecting, using a boot capable network communication interface, to a backup server over a data network, the...
Secure recovery apparatus and method
A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a...
Specialized boot path for speeding up resume from sleep state
A specialized boot path for speeding up resume from a sleep state is discussed. In a UEFI-compliant system, a specially constructed alternate firmware volume is...
Method and apparatus to support separate operating systems in partitions
of a processing system
A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a...
Method and apparatus for activating device
Method and apparatus for activating a slave device are provided. The method including: receiving communication medium scan signals comprising a slave device...
In-line roller skate
An in-line roller skate has a boot for accommodating a person's foot, a frame connected to the boot, and at least two wheels connected to the frame at a mutual...
Ski exersize apparatus
A foot pad for a ski exercise apparatus has a heel retainer plate across a width of the foot pad proximate one end of a length of the foot pad, the heel...
Equine ice boot
Boot cuff with tapered insert
Malware analysis methods and systems
Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a...
Multisensor system for the blind
The multisensor system for the blind includes a cane, a boot, a headband, and a central control device. The cane, the boot, and the headband may each include...
Regulating access using information regarding a host machine of a portable
Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host...
Memory controller and memory device including the memory controller
A memory controller includes a security key and parameter storage unit and a security engine. The security key and parameter storage unit stores at least one...
Protecting secure software in a multi-security-CPU system
A computing system includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. In response to a...
Replication of a write-back cache using a placeholder virtual machine for
Exemplary methods, apparatuses, and systems include a first host system configuring storage of the first host to serve as a primary cache for a virtual machine...
Reintialization of a processing system from volatile memory upon resuming
from a low-power state
Boot configuration information is stored to a volatile memory of a processing system during a low-power state. When resuming from the low-power state, a...