1
Alec Main, Harold J Johnson: Secure method and system for biometric verification. Cloakware Corporation, Leslie A Kinsman, Borden Ladner Gervais, September 14, 2010: US07797549 (26 worldwide citation)

There is a need in the computer software and data industries to protect content from unauthorized access to private information. Alphanumeric passwords have been shown to offer very weak protection. Biometrics (personal traits such as fingerprints and hand-written signatures) offer superior protecti ...


2
Keith Shaw, Heng Liao, Larrie Simon Carr, Nicolas Kuefler: Command switching for multiple initiator access to a SATA drive. PMC Sierra, Leslie A Kinsman, Borden Ladner Gervais, June 15, 2010: US07739432 (20 worldwide citation)

A multi-port switch and a method of command switching using such a switch. Multiple virtual targets provide multiple hosts with access to the physical target device attached to the target interface of the switch. The switch intelligently dispatches operations received by the virtual targets to the p ...


3
Stanley T Chow, Harold J Johnson, Alexander Main, Yuan Gu: Secure method and system for computer protection. Irdeto Canada Corporation, Leslie A Kinsman, Borden Ladner Gervais, June 7, 2011: US07958554 (17 worldwide citation)

Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of th ...


4
Hosein Nikopour Deilami, Amir Keyvan Khandani, Aladdin Saleh: Parallel soft spherical MIMO receiver and decoding method. BCE, University of Waterloo, Leslie A Kinsman, Border Ladner Gervais, July 26, 2011: US07986752 (13 worldwide citation)

A method and system for detecting and decoding multiple signals. A low-complexity MIMO detector that combines sphere decoding and m-algorithm approaches, while accounting for the effect of channel condition on the decoding operation, is provided. Taking into account the channel condition effectively ...


5
Harold J Johnson, Philip A Eisen: System and method for protecting computer software from a white box attack. Cloakware Corporation, Leslie A Kinsman, Borden Ladner Gervais, October 5, 2010: US07809135 (12 worldwide citation)

Methods and systems related to increasing the cryptographic security of keys used by software with cryptographic functions. This is done by increasing the mathematical complexity of the software. The components and functions used by the software are first determined and, using these components, func ...


6
Matthew Robert Williams: System and method for higher throughput through a transportation network. IPEAK Networks Incorporated, Leslie A Kinsman, Borden Ladner Gervais, June 22, 2010: US07742501 (11 worldwide citation)

Systems and methods for transporting data from a source network to a destination network by way of a transport network. Data transmission units (DTUs) from the source network are received at a server logically located between the source and the transport networks. These first DTUs are subdivided int ...


7
Gordon Kerr, John F Pillar, Allen W Lengacher: Stream processing node. Avaya, Leslie A Kinsman, Borden Ladner Gervais, February 1, 2011: US07882257 (7 worldwide citation)

In a stream processing node, a producer of properly ordered portions of a data stream, hereinafter referred to as substreams, is coupled to a stream fabric that is further coupled to a series of potential consumers for the data stream, one of the potential consumers being a content processing elemen ...


8
Arun Narayanan Kandanchatha, Yongxin Zhou: System and method for obscuring bit-wise and twos complement integer computations in software. Irdeto Canada Corporation, Leslie A Kinsman, Borden Ladner Gervais, June 21, 2011: US07966499 (6 worldwide citation)

Systems and methods related to concealing mathematical and logical operations in software. Mathematical and logical operations are disguised by replacing them with logically equivalent expressions. Each equivalent expression has at least two expression constants whose values are based on scaling and ...


9
Predrag Acimovic: Loaded parallel stub common mode filter for differential lines carrying high rate digital signals. PMC Sierra US, Leslie A Kinsman, Borden Ladner Gervais, June 7, 2011: US07956704 (6 worldwide citation)

The present invention provides a novel structure that can be used to filter certain selected frequencies of common mode signals. The structure comprises a stub connected in parallel to a transmission line with termination at the end. It is suitable for implementation on printed circuit boards or bac ...


10
Shuji Sumi: Apparatus and method for identifying device type of serially interconnected devices. MOSAID Technologies Incorporated, Leslie A Kinsman, Borden Ladner Gervais, August 30, 2011: US08010710 (5 worldwide citation)

A memory controller is unaware of device types of a plurality of memory devices in a serial interconnection configuration. Possible device types include, e.g., random access memories (DRAM, SRAM, MRAM) and NAND-, NOR- and AND-type Flash memories. Each device has device type information on its device ...