At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Tapered probe structures and fabrication
Probe structures and fabrication techniques are described. The described probe structures can be used as probes for various applications such as conductance...
Anti keylog editor of activex base
A security program has an ActiveX format for web browsers and application programs, and comprises a software security input window for preventing leakage of...
Transmitter, receiver, and content transmitting and receiving method
According to one embodiment, a transmitter is configured to transmit content to a receiver. Available dubbing count is set in advance for the content such that...
Access control method and a system for privacy protection
A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a...
Information processing apparatus and method, content management system,
information recording medium, and...
An information processing apparatus including a data processor and a communication unit is provided. For a content management unit provided with corresponding...
Network security system having a device profiler communicatively coupled
to a traffic monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess...
System and method for assessing risk to a collection of information
A system and method for assessing the risk to information resources that may include the generation and/or use of a security risk index. The security risk index...
System and method of monitoring and controlling application files
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to...
Intrusion management system and method for providing dynamically scaled
confidence level of attack detection
An Intrusion Management System detects computer attacks and automatically adjusts confidence that an attack was correctly detected. When the Intrusion...
Containment mechanism for potentially contaminated end systems
A malware detection and response system based on traffic pattern anomalies detection is provided, whereby packets associated with a variety of protocols on each...
System and method of analyzing web content
A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web...
Unauthorized information detection system and unauthorized attack source
A system for detecting and tracing a (D)DoS attack and identifying the attack source, which system simplifies the judgment reference to determine whether a...
Method and apparatus for migrating a virtual TPM instance and preserving
uniqueness and completeness of the...
A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted...
Techniques for high availability of virtual private networks (VPN's)
Techniques for high availability of virtual private networks (VPN's) are provided. VPN gateways are organized as a virtual ring of VPN gateways. A client...
Firewall interface configuration to enable bi-directional VoIP traversal
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
Selecting a security format conversion for wired and wireless devices
A selection system and method to receive an indication of a security format from a network and to select one of a plurality of security format conversions based...
Stateful firewall protection for control plane traffic within a network
A network device receives control plane packets and data plane packets from a network. The network device includes a forwarding component that forwards the data...
Single sign-on system, method, and access device
A system, method, and access device enabling a user to securely access a plurality of password-protected servers with a single entry of the user's User ID and...
Network device management apparatus and network device management method
A network device management apparatus according to this invention is directed to a network device management apparatus, which is connected to a network and...
Explicit delegation with strong authentication
Systems and methods for performing explicit delegation with strong authentication are described herein. Systems can include one or more clients, one or more end...
Secure transmission and exchange of standardized data
Standardized transmission of digital data with trusted and untrusted connections by translating non-native requests and or non-native responses to and from a...
Systems and methods for user login
Systems and methods for login a user into a computing system are shown and described. The method can include receiving a request for an anonymous user login,...
Analyzing cross-machine privilege elevation pathways in a networked
A privilege elevation flaw detection analysis is performed on a host system on a network. In addition, accounts on the host system are identified that have...
Systems and methods for protecting web based applications from cross site
request forgery attacks
Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204)...
Administration of protection of data accessible by a mobile device
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing...
Method and system for determining policy similarities
A method for determining similarity of two policies includes providing a first policy with n rules and a second policy with m rules, wherein each rule is...
Enhanced browser security
A machine-executable method implementable in a system operable to execute a browser application having at least one security-context zone and operable to apply...
Fast adaptive channel converting method and apparatus, and computer
readable recording medium for executing the...
A fast adaptive channel converting method and apparatus, and a computer readable recording medium having recorded thereon a program to execute the fast adaptive...
Frame specifying method
To provide a technology of properly specifying a process target frame in a dynamic image in accordance with a user's instruction. A frame specifying device...
Identifying works, using a sub linear time search or a non exhaustive
search, for initiating a work-based...
An electronic document, such as an image and a text file for example, may be associated with an action by (1) electronically extracting within a client device...
Methods and systems for distributing on-demand programming
Methods and systems are provided for distributing programming. A fixed linear programming schedule identifying an order of transmission for multiple programs is...
System and method for retrieving digital multimedia content from a network
A scheme for retrieving digital multimedia content from a network node. A message is provided to the network node by a client application executing on a digital...
Channel control system for exiting from an interactive program guide
An apparatus and method for browsing and viewing television programs while viewing a television program guide. In other words, a user is able to remain inside...
Audiovisual management system
A system for structuring usage history for audiovisual materials.
Interactive optical cards and other hand-held devices with increased
A system for deriving benefits from the reception and processing of composite video signals by a hand-held device, such as a smart card. Video signals are...
Digital video signature apparatus and methods for use with video program
Digital video signature apparatus and methods for use with video program identification systems are disclosed. The disclosed apparatus and methods identify a...
Methods and apparatus to adaptively select sensor(s) to gather audience
measurement data based on a variable...
Methods and apparatus to adaptively gather audience information data are disclosed. The disclosed methods and apparatus monitor system factor(s) and select one...
Optical disk device having supported rotating arm
An optical disk device has superior vibration characteristics by preventing vibration of a rotating arm. A desired optical disk is selected from the plurality...
Contained command invocation middleware framework
An object-oriented middleware framework for use in a network having a plurality of hosts including a first host having an associated first memory and first...
Virtual machine interface for hardware reconfigurable and software
A virtual machine interface for a separate reconfigurable wireless network communication apparatus comprising a plurality of software objects, wherein each...
Data processing device for renaming virtual device
A data processing device including a registering unit, a display unit, a usage frequency recording unit, and a virtual device renaming unit. The registering...
Method for making user-system interaction independent from the application
of interaction media
The method of the invention consists, in a system of the type with three "tiers" , in inserting a fourth "tier" which is the business interaction and which...
Method and system for associating parameters of containers and contained
A system and method for establishing associative relationships between properties of a contained object and corresponding parameters of a container application...
Using status models having status derivations in a computer system
A design-time status schema model describes the progress of a data object through a computing process. The status schema model includes status variables,...
System and method for creating and deploying applications with new
In accordance with one embodiment of the present invention applications are configured with custom modules. A deployment descriptor of an application includes a...
Information processing apparatus, method of operating it, and computer
readable information recording medium
A display part receives an input from a user and display a message to the user, a constraint processing part processes constraints among functions of a printer...
Context switching system having context cache and a register file for the
save and restore context operation
In an application in which context switching often occurs such as in a real time OS, it is possible to significantly reduce the overhead caused by the context...
Dynamic virtual software pipelining on a network on chip
A NOC for dynamic virtual software pipelining including IP blocks, routers, memory communications controllers, and network interface controllers, each IP block...
System and method for automatic throttling of resources in an information
handling system chassis
Systems and methods for automatic throttling of resources in an information handling system are disclosed. A method may include determining whether a first...
Dynamically controlling the number of busy waiters in a synchronization
An embodiment of the invention provides an apparatus and a method of dynamically controlling the number of busy waiters in for a synchronization object. The...