Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,020,216 Tapered probe structures and fabrication
Probe structures and fabrication techniques are described. The described probe structures can be used as probes for various applications such as conductance...
US-8,020,215 Anti keylog editor of activex base
A security program has an ActiveX format for web browsers and application programs, and comprises a software security input window for preventing leakage of...
US-8,020,214 Transmitter, receiver, and content transmitting and receiving method
According to one embodiment, a transmitter is configured to transmit content to a receiver. Available dubbing count is set in advance for the content such that...
US-8,020,213 Access control method and a system for privacy protection
A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a...
US-8,020,212 Information processing apparatus and method, content management system, information recording medium, and...
An information processing apparatus including a data processor and a communication unit is provided. For a content management unit provided with corresponding...
US-8,020,211 Network security system having a device profiler communicatively coupled to a traffic monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess...
US-8,020,210 System and method for assessing risk to a collection of information resources
A system and method for assessing the risk to information resources that may include the generation and/or use of a security risk index. The security risk index...
US-8,020,209 System and method of monitoring and controlling application files
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to...
US-8,020,208 Intrusion management system and method for providing dynamically scaled confidence level of attack detection
An Intrusion Management System detects computer attacks and automatically adjusts confidence that an attack was correctly detected. When the Intrusion...
US-8,020,207 Containment mechanism for potentially contaminated end systems
A malware detection and response system based on traffic pattern anomalies detection is provided, whereby packets associated with a variety of protocols on each...
US-8,020,206 System and method of analyzing web content
A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web...
US-8,020,205 Unauthorized information detection system and unauthorized attack source search system
A system for detecting and tracing a (D)DoS attack and identifying the attack source, which system simplifies the judgment reference to determine whether a...
US-8,020,204 Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the...
A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted...
US-8,020,203 Techniques for high availability of virtual private networks (VPN's)
Techniques for high availability of virtual private networks (VPN's) are provided. VPN gateways are organized as a virtual ring of VPN gateways. A client...
US-8,020,202 Firewall interface configuration to enable bi-directional VoIP traversal communications
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
US-8,020,201 Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...
US-8,020,200 Stateful firewall protection for control plane traffic within a network device
A network device receives control plane packets and data plane packets from a network. The network device includes a forwarding component that forwards the data...
US-8,020,199 Single sign-on system, method, and access device
A system, method, and access device enabling a user to securely access a plurality of password-protected servers with a single entry of the user's User ID and...
US-8,020,198 Network device management apparatus and network device management method
A network device management apparatus according to this invention is directed to a network device management apparatus, which is connected to a network and...
US-8,020,197 Explicit delegation with strong authentication
Systems and methods for performing explicit delegation with strong authentication are described herein. Systems can include one or more clients, one or more end...
US-8,020,196 Secure transmission and exchange of standardized data
Standardized transmission of digital data with trusted and untrusted connections by translating non-native requests and or non-native responses to and from a...
US-8,020,195 Systems and methods for user login
Systems and methods for login a user into a computing system are shown and described. The method can include receiving a request for an anonymous user login,...
US-8,020,194 Analyzing cross-machine privilege elevation pathways in a networked computing environment
A privilege elevation flaw detection analysis is performed on a host system on a network. In addition, accounts on the host system are identified that have...
US-8,020,193 Systems and methods for protecting web based applications from cross site request forgery attacks
Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204)...
US-8,020,192 Administration of protection of data accessible by a mobile device
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing...
US-8,020,191 Method and system for determining policy similarities
A method for determining similarity of two policies includes providing a first policy with n rules and a second policy with m rules, wherein each rule is...
US-8,020,190 Enhanced browser security
A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply...
US-8,020,189 Fast adaptive channel converting method and apparatus, and computer readable recording medium for executing the...
A fast adaptive channel converting method and apparatus, and a computer readable recording medium having recorded thereon a program to execute the fast adaptive...
US-8,020,188 Frame specifying method
To provide a technology of properly specifying a process target frame in a dynamic image in accordance with a user's instruction. A frame specifying device...
US-8,020,187 Identifying works, using a sub linear time search or a non exhaustive search, for initiating a work-based...
An electronic document, such as an image and a text file for example, may be associated with an action by (1) electronically extracting within a client device...
US-8,020,186 Methods and systems for distributing on-demand programming
Methods and systems are provided for distributing programming. A fixed linear programming schedule identifying an order of transmission for multiple programs is...
US-8,020,185 System and method for retrieving digital multimedia content from a network node
A scheme for retrieving digital multimedia content from a network node. A message is provided to the network node by a client application executing on a digital...
US-8,020,184 Channel control system for exiting from an interactive program guide
An apparatus and method for browsing and viewing television programs while viewing a television program guide. In other words, a user is able to remain inside...
US-8,020,183 Audiovisual management system
A system for structuring usage history for audiovisual materials.
US-8,020,181 Interactive optical cards and other hand-held devices with increased connectivity
A system for deriving benefits from the reception and processing of composite video signals by a hand-held device, such as a smart card. Video signals are...
US-8,020,180 Digital video signature apparatus and methods for use with video program identification systems
Digital video signature apparatus and methods for use with video program identification systems are disclosed. The disclosed apparatus and methods identify a...
US-8,020,179 Methods and apparatus to adaptively select sensor(s) to gather audience measurement data based on a variable...
Methods and apparatus to adaptively gather audience information data are disclosed. The disclosed methods and apparatus monitor system factor(s) and select one...
US-8,020,178 Optical disk device having supported rotating arm
An optical disk device has superior vibration characteristics by preventing vibration of a rotating arm. A desired optical disk is selected from the plurality...
US-8,020,177 Contained command invocation middleware framework
An object-oriented middleware framework for use in a network having a plurality of hosts including a first host having an associated first memory and first...
US-8,020,176 Virtual machine interface for hardware reconfigurable and software programmable processors
A virtual machine interface for a separate reconfigurable wireless network communication apparatus comprising a plurality of software objects, wherein each...
US-8,020,175 Data processing device for renaming virtual device
A data processing device including a registering unit, a display unit, a usage frequency recording unit, and a virtual device renaming unit. The registering...
US-8,020,174 Method for making user-system interaction independent from the application of interaction media
The method of the invention consists, in a system of the type with three "tiers" , in inserting a fourth "tier" which is the business interaction and which...
US-8,020,173 Method and system for associating parameters of containers and contained objects
A system and method for establishing associative relationships between properties of a contained object and corresponding parameters of a container application...
US-8,020,172 Using status models having status derivations in a computer system
A design-time status schema model describes the progress of a data object through a computing process. The status schema model includes status variables,...
US-8,020,171 System and method for creating and deploying applications with new container types
In accordance with one embodiment of the present invention applications are configured with custom modules. A deployment descriptor of an application includes a...
US-8,020,170 Information processing apparatus, method of operating it, and computer readable information recording medium
A display part receives an input from a user and display a message to the user, a constraint processing part processes constraints among functions of a printer...
US-8,020,169 Context switching system having context cache and a register file for the save and restore context operation
In an application in which context switching often occurs such as in a real time OS, it is possible to significantly reduce the overhead caused by the context...
US-8,020,168 Dynamic virtual software pipelining on a network on chip
A NOC for dynamic virtual software pipelining including IP blocks, routers, memory communications controllers, and network interface controllers, each IP block...
US-8,020,167 System and method for automatic throttling of resources in an information handling system chassis
Systems and methods for automatic throttling of resources in an information handling system are disclosed. A method may include determining whether a first...
US-8,020,166 Dynamically controlling the number of busy waiters in a synchronization object
An embodiment of the invention provides an apparatus and a method of dynamically controlling the number of busy waiters in for a synchronization object. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.