At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
From polymorphic executable to polymorphic operating system
A method, capable of being implemented in executable instructions or programmes in device(s), including computer system(s) or computer-controlled device(s) or...
Digital broadcast receiver and booting method of digital broadcast
A digital broadcast receiver and a booting method of the digital broadcast receiver are disclosed herein. A method of secure booting of a system in a digital...
Enhanced network and local boot of Unified Extensible Firmware Interface
Techniques and architectures to provide high assurance image invocation in a pre-boot environment. These techniques may augment implementations of the Unified...
Electronic device having an alterable configuration and methods of
manufacturing and configuring the same
An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition,...
Recording medium, drive device, and mounting method
A recording medium coupled to a drive device includes a management information storage area and a master boot record. Management information used for a mounting...
System and method for creating and managing virtual services
A method of creating and managing virtual servers utilizes separate master copies of information such as operating systems, configuration files, and application...
Dual-port ethernet traffic management for protocol conversion
At least two communications cards are utilized to communicate with at least two Ethernet ports, each having unique MAC and IP addresses, and at least two...
Display case lighting comprising a lens with integrally formed features on its interior to mechanically retain LED units therein, at least one LED unit...
Binding for a boot on a gliding board
The invention is directed to a binding for retaining a boot on a gliding board, such as a ski, which includes a retaining device, a lower abutment surface, and...
Method for downloading software to an electronics product
A method for updating software on an electronics system that includes a processor switchable between modes and non-volatile memory includes over-writing...
Universal microcode image
Systems and methods for creating universal microcode images and for reconstructing a microcode image from a universal microcode image are described in the...
Providing a backup service from a remote backup data center to a computer
through a network
A technique provides a backup service to a computer over a network. The technique involves connecting the computer to the network, and providing a backup data...
Power lock-up setting method performed by baseboard management controller
and electronic apparatus using the same
A power lock-up setting method and an electronic apparatus using the same are provided. The power lock-up setting method includes following steps. A trigger...
Computing device booting utilizing dispersed storage
A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module...
Systems and methods for booting a bootable virtual storage appliance on a
virtualized server platform using a...
One embodiment is a method for booting a bootable virtual storage appliance on a virtualized server platform. One such method comprises: providing a virtual...
Port throttling across an operating system restart during a hot upgrade
A processor, executing a first operating system kernel, tags a region of volatile memory used by a first storage area network (SAN) adapter driver coupled to a...
Partial hibernation restore for boot time reduction
Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored...
User-based wide area network optimization
An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and...
Apparatus for treating fuel and method of starting the same
A fuel processing apparatus includes a reformer, raw material supply section, moisture supply section, heating section, reforming temperature detection section,...
Field terminable optical fiber connector with splice element
An optical fiber connector includes a housing configured to mate with a receptacle, a collar body that includes a fiber stub and a mechanical splice device, a...
Device for receiving a foot or a boot on a gliding apparatus
A device for receiving a foot or a boot on a gliding apparatus, the receiving device including a base plate that extends along a longitudinal direction, from a...
A grommet configured to seal an insertion hole formed in a panel into which a pipe is inserted may include a base that is configured to be connected to the...
Working end of a boot cleaning tool
Detecting and repairing master boot record infections
Security is provided for a client by replacing a volume boot module adapted to execute during a boot process of the client with a repair module. The client is...
Method for updating firmware of sensor nodes on the wireless sensor
A method for updating firmware of a plurality of nodes constituting a wireless sensor network is disclosed. The wireless sensor network includes a server, a...
Method and system for upgrading software in a computing device
A method and system for upgrading a software component in a computing device are disclosed. Specifically, one embodiment of the present invention sets forth a...
Security and safety manager implementation in a multi-core processor
A system includes a multi-core computer processor. One or more cores of the multi-core computer processor are configured as a security co-processor for the...
Method and apparatus for booting from a flash memory
Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one...
Coupling an FPGA unit to a memory using a digital potentimeter
There is provided an electronic device comprising an FPGA unit (100), a first and a second memory (210, 220) for storing boot data for the FPGA unit and a...
Waterproof/breathable moisture transfer liner for snowboard boots, alpine
boots, hiking boots and the like
The waterproof/breathable moisture transfer liner for a snowboard boot includes an inner liner selected from technically advanced fabrics which are carefully...
Frame structure for skates
A skate frame comprises a lower frame portion comprising gliding means for running on a gliding surface and an upper frame portion comprising one or more...
A dog boot is provided comprising a generally vertical and cylindrical elongated tubular legging portion ending in and connected to a toe-box portion both of...
Construction site fence panel foot boot
Method and system for protecting a computer system during boot operation
A method for protecting a computer system from malicious network traffic is provided using a driver which inspects network packets. A security profile...
Apparatus and method for performing trusted computing integrity
An apparatus and methods that use trusted platform modules (TPM) to perform integrity measurements of multiple subsystems are disclosed. The state of platform...
Password management outside of a BIOS
In accordance with at least one presently preferred embodiment of the present invention, there is broadly contemplated herein the managing of a POP not solely...
Computer apparatus and method for charging portable electronic device
using the computer apparatus
A computer apparatus and a method for charging a portable electronic device are provided. The method is implemented in a computer apparatus including a...
Secure encrypted boot with simplified firmware update
An approach is provided in which a security module, such as a TPM, identifies a change to a boot configuration used in a secure boot operation. This...
Method, device and non-transitory computer readable storage medium for
masking the end of life transition of a...
A method of masking the end-of-life transition of a microprocessor electronic device including reprogrammable non-volatile memory containing an end-of-life...
Pre-boot securing of operating system (OS) for endpoint evaluation
Methods and apparatus involve evaluating endpoint computing assets. The endpoint has both a traditional operating system for applications, and the like, and...
Method and apparatus for managing user time on a rental computer
Hacking a rental computer to use it beyond purchased rental time is prevented by plugging a time card with internal counter into a DIMM socket of the...
Line consolidation unit spacer circular with channel to center
Line consolidation unit spacer triangular
Line consolidation unit spacer round
Line consolidation unit spacer hexagonal
System and method for tamper-resistant booting
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for booting a computing device having an encrypted storage medium...