Dismiss
IP.com applications will be updated on Sunday, March 5, from 11 am to 2 pm ET, to add new functionality and content. You may experience brief service interruptions during this period. We apologize for any inconvenience.
Showing 1 - 10 of 295 from May 2004
Browse Prior Art Database
  1. 1.
    Disclosed is a system which has double password. One is genuine, the other is fake. This system is secure from illegal access.
    IPCOM000028789D | Original Publication Date: 2004-May-31
  2. 2.
    Disclosed is a mechanism for real-time session control on a reverse proxy server. The real-time session control on a reverse proxy server supervises each session state between a browser and a reverse proxy and between a reverse proxy and a Web server. And the real-time session control cuts a specific session which is...
    IPCOM000028788D | Original Publication Date: 2004-May-31
  3. 3.
    A program is disclosed that invents messaging HUB system satisfies two conflicting requirements, (1) High volume transaction processing, (2) Synchronized transaction processing. Synchronized transactions are plural transactions that are waiting for each other , in order to be processed at the same time. This invented...
    IPCOM000028787D | Original Publication Date: 2004-May-31
  4. 4.
    IPCOM000028774D | Original Publication Date: 2004-May-29
  5. 5.
    IPCOM000028755D | 2004-May-28
  6. 6.
    IPCOM000028754D | 2004-May-28
  7. 7.
    IPCOM000028753D | 2004-May-28
  8. 8.
    Embedded microprocessors usually have their boot program in a ROM, which has the advantage to keep its contents without requiring any power source. The immediate drawback being that specific mechanisms are necessary to correct bugs in ROM programs as the ROM contents cannot be modified once the chip has been...
    IPCOM000028752D | Original Publication Date: 2004-May-28
  9. 9.
    This paper describes a method to implement the (soft decision output) Viterbi Algorithm in a limited number of instructions and with a minimal modification to the normal hard-ware used in General Pupose Programmable Cores. A relatively low MIPS count and a minimal change to hardware and software to execute the...
    IPCOM000028751D | Original Publication Date: 2004-May-28
  10. 10.
    "Control ODCS IT Security" is a tactical methodology which provides the appropriate security protection of logical and physical assets that are associated with the delivery of On Demand services. The method defines the security strategies, policies, and procedures for managing the implementation and use by other...
    IPCOM000028746D | Original Publication Date: 2004-May-28