1
Juri Kato: Semiconductor device having a first circuit block isolating a plurality of circuit blocks. Seiko Epson Corporation, AdvantEdge Law Group, March 15, 2011: US07906813 (91 worldwide citation)

A semiconductor device, includes: a semiconductor layer, arranged, via an insulation layer, on a region of a part of a semiconductor substrate; a first circuit block formed on the semiconductor layer; and a second and a third circuit blocks formed on the semiconductor substrate, isolated from each o ...


2
Todd K Whitehurst, James C Makous, Rafael Carbunaru, Kristen N Jaax: Systems and methods for treatment of diabetes by electrical brain stimulation and/or drug infusion. Boston Scientific Neuromodulation, AdvantEdge Law Group, October 21, 2008: US07440806 (88 worldwide citation)

Systems and methods for introducing one or more stimulating drugs and/or applying electrical stimulation to the brain to at least treat or prevent diabetes uses at least one system control unit (SCU) producing electrical pulses delivered via electrodes implanted in the brain and/or producing drug in ...


3
Todd K Whitehurst, Kristen N Jaax, Rafael Carbunaru: Methods and systems for stimulating a nerve originating in an upper cervical spine area to treat a medical condition. Boston Scientific Neuromodulation, AdvantEdge Law Group, February 17, 2009: US07493172 (78 worldwide citation)

Methods of treating a medical condition of a patient include applying at least one stimulus to a target nerve within the patient with an implanted system control unit in accordance with one or more stimulation parameters. The target nerve may include any nerve originating in an upper cervical spine ...


4
Ethan George Russell, Stephen William Cote, Erkki Ville Juhani Aikas, Brian David Marsh, John Bradley Chen: Method and system for monitoring the performance of a distributed application. Symantec Corporation, AdvantEdge Law Group, October 6, 2009: US07600014 (75 worldwide citation)

A service monitor and a browser monitor determine performance metrics on both a server and a client in connection with a distributed application running on a network. While applicable to other types of distributed application data, an example is described in which a Web page is requested by a user r ...


5
Jared Blaser, Randall Cook: Sublayered application layered system. Symantec Corporation, Advantedge Law Group, June 28, 2011: US07970789 (54 worldwide citation)

The inventions relate generally to layered computing systems that provide public access to the content of the layers. Also disclosed herein are prioritization schemes usable in a layered computing system, including prioritization by layer type, by assigned priority weights, by access type, by sub-la ...


6
Travis Emmert: Systems and methods for relocating deduplicated data within a multi-device storage system. Symantec Corporation, Advantedge Law Group, October 2, 2012: US08280854 (48 worldwide citation)

A computer-implemented method for relocating deduplicated data within a multi-device storage system. The method may include identifying a set of deduplicated data units stored on a first device of the multi-device storage system. Each data unit in the set of data units is referred to by one or more ...


7
Donald Kleinschnitz, Daniel Hardman, James Kleinschnitz: Methods and systems for providing workspace navigation with a tag cloud. Symantec Corporation, Advantedge Law Group, July 17, 2012: US08225193 (48 worldwide citation)

A computer-implemented method for providing workspace navigation with a tag cloud. The computer-implemented method may include identifying a set of launch items within a workspace. The computer-implemented method may also include displaying the tag cloud in a graphical user interface. Each tag in th ...


8
Denis Serenyi, Brian Witten: Systems and methods for securely managing access to data. Symantec Corporation, Advantedge Law Group, September 4, 2012: US08261320 (46 worldwide citation)

A computer-implemented method for securely managing access to data may comprise identifying a request to access data that is encrypted, the request being made within an insecure platform. The method may: determine that a requestor has a right to access the data, decrypt the data to provide decrypted ...


9
Daniel Buckler: Systems and methods for detecting the insertion of poisoned DNS server addresses into DHCP servers. Symantec Corporation, Advantedge Law Group, February 5, 2013: US08370933 (45 worldwide citation)

A computer-implemented method for detecting the insertion of poisoned DNS server addresses into DHCP servers may include: 1) identifying a DNS server address provided by a DHCP server, 2) determining that the DNS server address provided by the DHCP server differs from a prior DNS server address prov ...


10
Bruce Wootton, Richard Dandliker, Aleksey Tsibulya, Oskar Bruening, Dirk Kessler: Methods and systems for normalizing data loss prevention categorization information. Symantec Corporation, Advantedge Law Group, November 15, 2011: US08060596 (43 worldwide citation)

A computer-implemented method for normalizing data-loss-prevention categorization information, at least a portion of the method being performed by a computing system comprising at least one processor, may identify a data object at a first time. The method may apply a first version of a set of data-l ...