At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Power conduit, charging device, and method of charging a power storage
A power conduit for charging a power storage device of a vehicle includes an output terminal and locking mechanism operatively disposable in one of an engaged...
Method and system for generating pre-scaled images for a series of
A computer implemented method for generating a pre-scaled image for at least one mammography image of a series, the series containing a plurality of mammography...
Transmitting treatment information
A system includes a first computing device comprising a processor coupled to a memory. The processor and the memory are configured to receive at least one of...
Public safety service
The invention relates to an apparatus including: at least one processor and at least one memory including a computer program code, the at least one memory and...
Mechanism for facilitating dynamic detection and communication of
geo-locations for devices
A mechanism is described for facilitating detection and communication of geo-locations for devices according to one embodiment. A method of embodiments, as...
Image processing apparatus
An image processing apparatus includes: a processor; and memory storing computer readable instructions, when executed by the processor, causing the image...
Switching a device between a locked state and an unlocked state
A method, apparatus and a computer program is provided. The apparatus comprises: at least one processor; and at least one memory storing computer program code...
For instance, in the case of a software implementation, the terms "component" or "functionality" may refer to program code that performs specified tasks when...
Presentation of non-interrupting content items
A method for enabling a user of a computing device to designate a content item for subsequent review is provided. The computing device is coupled to a memory...
Computing device with integrated authentication token
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
Method and system for configuring and securing a device or apparatus, a
device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
System and method for varying memory size in a data stream processing
The present disclosure relates to methods, systems, and computer-readable media for varying a memory size in a data stream processing while improving a...
Adjusting content rendering for environmental conditions
A system includes a computing device that includes a memory configured to store instructions. The computing device also includes a processor to execute the...
Surveillance of a secure area
Embodiments of the invention are directed to a system, method, and computer program product for surveillance of a secure area. The present invention typically...
Systems, methods, and devices for playing wagering games with
symbol-driven expected value enhancements and...
Gaming devices, gaming systems, methods of conducting wagering games, and computer programs for executing wagering games are disclosed. A gaming system for...
Method and system for coordinated data execution using a primary graphics
processor and a secondary graphics...
A method and system for coordinated data execution in a computer system. The system includes a first graphics processor coupled to a first memory and a second...
Watermarking and scalability techniques for a virtual desktop planning
A method for measuring performance of virtual desktop services offered by a server including a processor is described. A first encoded watermark is embedded...
Data storage and access systems
Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable...
External access to memory on an RFID tag
In embodiments of the present invention improved capabilities are described for an RFID tag comprising a radio frequency (RF) network node and a communication...
Protection of state data in computer system code
Method and system are provided for protecting state data of computer system code. The computer system code may be operating system code, subsystem code or...
Automatic role tuning in a computer system
Embodiments are directed to a computer-based system for tuning roles. The system includes a memory and a processor system communicatively coupled to the memory....
Intelligent key selection and generation
A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes...
System and method providing permission based access to automotive
A Link device has a processor connected to an internal Link bus, a non-transitory memory, a digital device ID, one or both of firmware or software executing...
Method, a device and a computer program support for verification of
checksums for self-modified computer code
A function of a software program is stored in a memory during execution in a device of the software program. A processor relocates the function in a region of...
Computing system automatically generating a transactor
A computing system includes a memory device into which a design file for a predetermined intellectual property (IP) and a transactor generating tool are loaded,...
Boundary based power guidance for physical synthesis
A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a...
Massively-parallel system architecture and method for real-time extraction
of high-value information from data...
A computer system identifies high-value information in data streams. The computer system receives a receiving a plurality of data streams. Each of the data...
Data environment change notification
A method of and system for monitoring and providing notification of changes to a data environment. Parameters of interest for monitoring changes made to a...
User preference based collecting of music content
A method of operating an entertainment system includes computer-implemented steps including determining an audio/video preference profile of the user. An item...
Remote direct memory access (RDMA) high performance producer-consumer
A method, system and computer program product for remote direct memory access (RDMA) optimized producer-consumer message processing in a messaging hub is...
Remote core operations in a multi-core computer
A multi-core processor with a shared physical memory is described. In an embodiment a sending core sends a memory write request to a destination core so that...
Computer system and a computer device
A computer system is provided. The computer system includes a hub board, a common bus, and a plurality of Sibling boards. The hub board has an I/O controller...
Mitigation of cyber attacks by pointer obfuscation
A method for protecting a computer includes identifying a first pointer in a data structure used by a computer program indicating a first memory address to be...
Cache structure for a computer system providing support for secure objects
A method that protects a confidentiality and an integrity of information in a secure object from other software on the system, said secure object comprising...
System and methods for CPU copy protection of a computing device
The present disclosure relates to techniques for system and methods for software-based management of protected data-blocks insertion into the memory cache...
Maintaining command order of address translation cache misses and
A computer-implemented method includes storing commands and maintaining an order of receipt of the commands in a command processing unit. The commands include...
System and device for page replacement control between virtual and real
A virtual memory management apparatus of an embodiment is embedded in a computing machine 80 and is provided with an application program 21, an operating system...
Method and apparatus for constructing memory access model
Embodiments of the present invention provide a method and an apparatus for constructing a memory access model, and relate to the field of computers. The method...
Implementing enhanced wear leveling in 3D flash memories
A method, system and computer program product are provided for implementing enhanced wear leveling in a stack of flash memory chips. A flash memory includes...
Information processing device, information processing method, and computer
An information processing device includes: a nonvolatile memory having a program area storing a program for booting a system, and backup areas each storing a...
Global lock contention predictor
An apparatus for lock acquisition is disclosed. A method and a computer program product also perform the functions of the apparatus. The apparatus includes a...
Preemptive guest merging for virtualization hypervisors
Aspects of the present invention provide a solution for managing memory. A method according to an embodiment includes: prior to any storage of a page from a...
Optimizing computer hardware usage in a computing system that includes a
plurality of populated central...
Optimizing computer hardware usage in a computing system that includes a plurality of populated central processing unit (`CPU`) sockets, including: determining,...
Method and device for application installation to multiple memory
A method and device for installing an application to a device are provided. The method includes: receiving, at the device, application files associated with the...
Compiler optimization for many integrated core processors
Systems and methods for source-to-source transformation for compiler optimization for many integrated core (MIC) coprocessors, including identifying data...
Memory power management and data consolidation
According to embodiments of the disclosure, methods, systems and computer program products for memory power management and data consolidation are disclosed. The...
Memory consumption tracking
Systems and methods are provided for monitoring memory consumption in computing devices. Memory monitoring can be performed by tracking multiple parameters on...
Reverse copy on write for better cache utilization
Methods, systems, and computer program products for providing reverse copy-on-write for improved cache utilization are disclosed. Examples generally relate to...
Optimizing memory usage across multiple garbage collected computer
A method, information processing system, and computer readable storage medium, vary a maximum heap memory size for one application of a plurality of...
Generalized positional ordering
Implementations described and claimed herein provide a method and system for managing execution of commands for a storage device, the method comprising...