Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,024,816 Approach method for probe and sample in scanning probe microscope
In detecting a displacement of a cantilever (2) by a displacement detecting mechanism (5) and allowing a probe (1) and a sample (8) to approach each other by at...
US-8,024,815 Isolation environment-based information access
In an embodiment of isolation environment-based information access, programs--including operating systems and applications--running on a computing-based device...
US-8,024,814 Information display device
An information display device allowing a memory property display screen that continuously displays displayed content as it is even when a power supply is shut...
US-8,024,813 Task initiated account presentation for rights elevation
Systems and/or methods are described that enable a user to elevate his or her rights. In one embodiment, these systems and/or methods detect a task which is not...
US-8,024,812 Apparatus and method for processing digital document and computer program
A digital document processing apparatus stores a digital document, an application program used for editing the digital document, where the application program...
US-8,024,811 System and method for secure PIN exchange
A system and method for wirelessly exchanging an encryption key between a first device and a second device. The system generally includes: a transmitter,...
US-8,024,810 Method and apparatus for protecting digital data by double re-encryption
A method and an apparatus ensuring protection of digital data are provided. In addition to re-encrypting the data using an unchangeable key, the data is double...
US-8,024,809 System and method for deleting confidential information
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same...
US-8,024,808 Arrangement for controlling content distribution by dynamically controlling bandwidth for transfer of the...
A broadband network device is configured, in a broadband network, for dynamically controlling an upstream link bandwidth of a user node configured for...
US-8,024,807 Probabilistic mechanism to determine level of security for a software package
A mechanism for determining a probabilistic security score for a software package is provided. The mechanism calculates a raw numerical score that is...
US-8,024,806 Method, apparatus and system for enabling a secure location-aware platform
A method, apparatus and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing...
US-8,024,805 Method and equipment for verifying propriety of system management policies to be used in a computer system
A policy verification method in an information processing system for verifying whether the policy rule operates correctly. The method verifies the policy in an...
US-8,024,804 Correlation engine for detecting network attacks and detection method
A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on...
US-8,024,803 Methods and systems for filtering electronic messages
A computer-implemented method for filtering electronic messages. The method may include identifying a first time period during which a user accesses electronic...
US-8,024,802 Methods and systems for using state ranges for processing regular expressions in intrusion-prevention systems
Methods and systems are provided for using state ranges for processing regular expressions in intrusion-prevention systems. In an embodiment, in an...
US-8,024,801 Networked computer system with reduced vulnerability to directed attacks
An attacker is prevented from obtaining information about the configuration of a computer system. Each of one or more revealing content elements that may be...
US-8,024,800 File attachment processing method and system
A file attachment processing method and system. The method comprises generating by a first computing system, a configurable list comprising valid computer file...
US-8,024,799 Apparatus and method for facilitating network security with granular traffic modifications
An apparatus that facilitates network security for input network traffic includes microcode controlled state machines, each of which includes a computation...
US-8,024,798 Method and apparatus for protecting against buffer overrun attacks
A method and an apparatus are disclosed for monitoring and protecting a program system against buffer overrun attacks. The method includes identification of...
US-8,024,797 Method, apparatus and system for performing access control and intrusion detection on encrypted data
A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a...
US-8,024,796 System and method for storing events to enhance intrusion detection
Storing events to enhance intrusion detection in networks is described. In one exemplary implementation, an event is received. The event includes a data section...
US-8,024,795 Network intelligence system
A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network...
US-8,024,794 Dynamic role based authorization system and method
A system, method and computer program product are provided for role based authorization. Included is a plurality of resources and roles associated with an...
US-8,024,793 Password generator, system and use thereof
A password generator for use with a detector and a verifier in an encapsulated system is provided, as is a system for generating and verifying passwords. The...
US-8,024,792 Methods and systems for imaging device credential submission
Embodiments of the present invention comprise systems, methods and devices for imaging device credential submission wherein credentials are extracted by...
US-8,024,791 Providing hints while entering protected information
One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as...
US-8,024,790 Portable secured computing environment for performing online confidential transactions in untrusted computers
A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be...
US-8,024,789 Communication apparatus, program and method
A communication apparatus comprises a storage unit for storing a first network list indicating plural networks; a receiving unit for receiving a second network...
US-8,024,788 Method and apparatus for reliable, high speed data transfers in a high assurance multiple level secure environment
A method and apparatus for passing data from a first application at a first security level to a second application in a second security level higher than the...
US-8,024,787 Packet firewalls of particular use in packet switching devices
One or more firewalls are used to perform firewall functionality on packets based on the entry and exit accesses of each of the one or more firewalls being...
US-8,024,786 System and methods for secure service oriented architectures
Provided is a method for intercepting a message between a requesting web service and a source web service, validating the message, logging the result of the...
US-8,024,785 Method and data processing system for intercepting communication between a client and a service
A method and data processing system for intercepting communication between a user and a service. An authentication component receives, from the user, a user...
US-8,024,784 Method and system for providing remote secure access to a peer computer
A method and system for allowing a user to access a peer from a remote system are described. The method and system include authenticating the user for the peer...
US-8,024,783 Modular agent architecture
An agent architecture may be provided with base functionality that allows it to run without executing any applications. The base application need not have any...
US-8,024,782 Cumulative login credit
Login credit is monitored over a credit time period. Continuous invalid login attempts decrease the login credit for the duration of the credit time period....
US-8,024,781 Signing-in to software applications having secured features
The present invention automatically signs or logs a user in to access secured features within a software application without prompting manual intervention when...
US-8,024,780 System and method for authenticating components in wireless home entertainment system
Configuration information is exchanged between a home entertainment system server and various wireless components by pushing a button on the server and a random...
US-8,024,779 Verifying user authentication
A solution for transparently verifying the authentication of a real user includes a monitor that receives network packets and a collector. The monitor...
US-8,024,778 System and method for defining attributes, decision rules, or both, for remote execution, claim set I
A system of the invention comprises a design module, execution engine, and performance management module. A first computer hosts the design module which enables...
US-8,024,777 Domain based authentication scheme
In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary...
US-8,024,776 Relay device, authentication server, and authentication method
A relay device includes a security information reception unit, a security information processing unit, and a security information transmission unit. The...
US-8,024,775 Sketch-based password authentication
A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of...
US-8,024,774 System and method for crawl policy management utilizing IP address and IP address range
The present invention relates to a method for configuring a policy management protocol for a web crawler, the method further comprising the steps of determining...
US-8,024,773 Integrated guidance and validation policy based zoning mechanism
A mechanism is provided to automatically retrieve zoning best practices from a centralized repository and to ensure that automatically generated zones do not...
US-8,024,772 Application service policy compliance server
In a large network, it can be difficult to pinpoint and track down the causes of breaches of established policies. A compliance policy server allows traversal...
US-8,024,771 Policy-based method for configuring an access control service
A system and method for processing a request by a first control service using a first control specification language, and a second control service using a...
US-8,024,770 Techniques for managing security contexts
Techniques for managing security contexts may be described. An apparatus may comprise a processor and a security management module. The security management...
US-8,024,769 Identity-based encryption system for secure data distribution
A system is provided that allows encrypted content to be distributed to users over a communications network. A policy enforcement service may use an...
US-8,024,768 Broadcasting video content to devices having different video presentation capabilities
Frames of broadcast video received at a device are cropped to produce rendered frames on a display of the device, the cropping being based on both (a) a...
US-8,024,767 Method and apparatus for receiving digital video signals
A method and apparatus for storing a compressed video stream or an uncompressed video stream is disclosed. The uncompressed video stream may be ZOOM VIDEO data....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.