At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Semiconductor memory device having processor reset function and reset
control method thereof
A semiconductor memory device for use in a multiprocessor system includes a shared memory area and a reset signal generator. The shared memory area is...
Operation method and device for integrated modem having plurality of
An operation method and device for an integrated modem having a plurality of modems is provided. The method includes connecting the integrated modem to a mobile...
Method and apparatus for providing seamless file system encryption from a
pre-boot environment into a firmware...
Methods and apparatus for providing seamless functionality in a computer are disclosed. For example, an encrypted file system manager is included to layer an...
Tool-free adjustable binding for sports board
A binding is adapted for coupling footwear, such as a boot, to a sports board. The binding permits easy adjustment of the binding's position on the board, while...
Apparatus and process for treating a hydrocarbon stream
One exemplary embodiment can be an apparatus for treating a hydrocarbon stream having one or more compounds with a boiling point of about 140-about 450.degree....
Method and apparatus for booting a processing system
Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether to launch an open operating...
Transparent trust validation of an unknown platform
A transparent trust validation of an unknown platform can be performed by communicationally coupling it to a trusted device, such as a portable peripheral...
Method and system for migrating information between information handling
A system for migrating information includes a first information handling system (IHS). The first IHS is for, in response to a first boot event, booting from a...
Selection of boot drive in a computer system
A boot drive of a computing system is identified during at least two runtime environment of the computer system. The computer system includes at least two...
File server which conducts a memory test upon boot up
Provided is a file server providing a file service to a host computer, including an interface coupled to the host computer; a processor; a memory; and an...
Method and system for dynamic redistribution of remote computer boot
service in a network containing multiple...
A method and a system are presented for facilitating a PXE-compliant (Preboot Execution Environment) remote boot process between clients and multiple servers....
Method for enabling secure usage of computers using a mechanism lockdown
A computer-implemented method for selectively enabling and disabling at least one of a plurality of functions of a host operating system and for selectively...
Boot with heel spikes and method of use thereof
A shoe with retractable metal spikes on a heel area is herein disclosed. A bottom portion of a shoe heel comprises a plurality of metal spikes that retract in...
A firmware bundle is download to a non-operational storage area without changing a live copy of firmware in a device. The firmware bundle is downloaded in order...
System and method for secure operating system boot
There is provided a method for operating a basic input/output system (BIOS) of a pay-as-you go computer system. In one example embodiment, the method includes...
Flash memory backup system for network devices
A device includes a first memory with first and second memory segments. The first memory segment stores a full image file. A second memory segment stores a...
Information processing device
An information processing device, including: a processing unit; a peripheral circuit module; and a boot address register, wherein the information processing...
Electronically addressed non-volatile memory-based kernel data cache
An operating system on a computer system can comprise a user space, which can comprise a persistent data store, and a kernel space, which can be extended by...
Bus enumeration in a system with multiple buses
Enumerating an expanded bus system in a system. The expanded bus system may include a first bus, a bridge coupled to the first bus, and a second bus coupled to...
Security system for portable computer
A portable computer searches for preprogrammed wireless stations when it boots, and if it does not recognize any, stops booting the O.S. so that data cannot be...
Reprogrammable subscriber terminal
A reprogrammable subscriber terminal of a subscription television service which can have the control program code of its control processor modified by...
Method for controlling boot sequence of server
A method for controlling a boot sequence of a server includes the following steps. A boot image is created, and a first proxy server program is placed into the...
Method for loading system locked pre-installation certification
A method is used for loading a System Locked Pre-installation (SLP) certification from a basic input output system (BIOS) of a computer. The BIOS includes a...
Boot test system and method thereof
A boot test system applied to test a cold boot in a target computer is provided. The boot test system includes a host computer and an autorun module. The host...
System and method for a distributed and flexible configuration of a TCG
TPM-based local verifier
An improved system and method for efficiently implementing a remotely manageable secure boot on a Trusted Computing Group defined Trusted Platform Module....
Motherboard, storage device and controller thereof, and booting method
A motherboard, a storage device and a controller thereof and a booting method are provided. In the present invention, when powered on, an unfetch signal is...
System and method for securely initializing and booting a security
A system and method provides for secure initialization and booting of a security appliance. The security appliance cooperates with a "smart" system card to...
Communications module integrated boot and release slide
One embodiment includes an integrated boot and release slide having a release slide and a boot. The release slide includes a main body, a plurality of arms, and...
Canine wound boot
A canine wound boot is fabricated using a breathable substrate having two layers of generally open weave and a fibrous material spacing and bonding the two...
Method for resisting pivoting movement between an outer member and an
inner member of a universal joint
A method for resisting pivoting movement between an outer member and an inner member of a universal joint includes engaging the outer member with the inner...
Infant car seat boot
Method and system for discovery of a root file system
A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader,...
Systems and methods for accelerated loading of operating systems and
Systems and methods for providing accelerated loading of operating system and application programs upon system boot or application launch are disclosed. In one...
Less-secure processors, integrated circuits, wireless communications
apparatus, methods and processes of making
An integrated circuit (122) includes an on-chip boot ROM (132) holding boot code, a non-volatile security identification element (140) having non-volatile...
A goalie skate having a skate boot comprising a thermoformed outer shell with a sole and an ankle portion for receiving the ankle of the foot, the ankle portion...
A dog boot is provided comprising a generally vertical and cylindrical elongated tubular legging portion ending in and connected to a toe-box portion both of...
Protective cover device for a skate boot
A protective cover device for a skate boot comprises a panel member including a central portion spanning part of the skate tongue and two side portions...
A grommet assembly includes a retainer including a sleeve, and a boot secured to the retainer, including a first and a second series of pleats aligned with the...
Preventing unauthorized poaching of set top box assets
To prevent poaching of an Internet Protocol (IP) set top box (STB) asset or similar network computing device from one system operator to another, code executing...
System and method for configuring option ROM
A method of configuring an information handling system includes operating a management controller to obtain device configuration data from a management server,...
Binding for ski
A system for alpine touring, a low-profile, selectively pivotal riser, and a method of releasably locking a ski boot heel. In an embodiment, the system for...
Fluid dispensing apparatus and method
A fluid dispenser hose module includes a housing adapted to enclose the fluid nozzle and at least a portion of a fluid hose within an interior volume of the...
Ripper boot including a high tensile tip
A ripper boot to cleave through hard ground. A carrier portion is connected to a shank of a vehicle. A tooth portion is integral or removably engaged with the...
Trusted operating environment for malware detection
Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a...
Automatic hardware-based recovery of a compromised computer
In general, techniques are described for hardware-based detection and automatic restoration of a computing device from a compromised state. Moreover, the...
Method and system for recovery of a computing environment during pre-boot
and runtime phases
A method and system for recovery of a computing environment includes monitoring during a pre-boot phase and a runtime phase of a computing device for selection...
To provide boots which have hygienic and health advantages such as the ability to effectively deodorize the inside of the boots. The entire outer surface...
System-on-a-chip (SoC) test interface security
Apparatus having corresponding methods and computer programs comprise: a processor; a test interface that is in communication with the processor only when the...