At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Defective product inspection apparatus, probe positioning method and probe
For adjusting a positional relationship between a specimen and a probe to measure an electric characteristic of the specimen through a contact therebetween, a...
High resolution wide angle tomographic probe
The present invention concerns the enhancing of the mass resolution of wide angle tomographic atom probes. The invention consists of an atom probe also...
Harmonic correcting controller for a scanning probe microscope
A scanning probe microscope and method for operating the same to correct for errors introduced by a repetitive scanning motion are disclosed. The microscope...
System, apparatus, method and computer program for transferring content
A content transfer system for transferring content between a source device transmitting the content and a sink device receiving the content, includes a content...
Access to content addressable data over a network
Access to content addressable data on a network is facilitated using digital information storing devices or data repositories ("silos") that monitor broadcast...
Isolation of application-specific data within a user account
A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables...
Renewable and individualizable elements of a protected environment
Systems and methods for providing a protected computing environment comprising separating out a protected environment management component from a kernel of a...
Secure media path system and method
Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media...
Copy protection method for digital data stored on a medium
A method of protection against the copying of digital data stored on an information carrier envisages, on the basis of a first identification of an encryption...
Device provided with rewritable circuit, updating system, updating method,
updating program and integrated circuit
A problem to be solved is that a conventional device is not equipped with a unit that enables efficient circuit update taking into consideration an unconfigured...
Method and system for securely protecting data during software application
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a...
System, method, and computer program product for conveying a status of a
plurality of security applications
A system, method and computer program product are provided for displaying a status of a security application. A status of at least one security application is...
Malware detection with taint tracking
Malware may be identified based on attempts to use tainted data in certain ways, such as by attempting to execute the tainted data, by attempting to modify...
Detection of undesired computer files in archives
Systems and methods for an anti-virus detection module that can detect known undesired computer files in archives that may be encrypted, compressed and/or...
Detecting rogue access points in a computer network
Detecting an unauthorized wireless access point in a network uses a detector. A rogue access point detector receives an incoming data packet which is scanned...
Apparatus and methods for intrusion protection in safety instrumented
process control systems
Apparatus and methods for intrusion protection in safety instrumented process control systems are disclosed. An example method of protecting a safety...
System and methodology for intrusion detection and prevention
System and methodology for intrusion detection and prevention is described. In one embodiment, for example, a method is described for detecting and preventing...
Method and system for administration of security services within a virtual
execution environment (VEE)...
A system and method for managing administration of security services provided to users includes a computer system and an operating system running on the...
Preventing network denial of service attacks by early discard of
A method of preventing network denial of service attacks by early discard of out-of-order segments comprises creating a reassembly queue for a connection...
User-level privilege management
In one embodiment, the present invention includes a method for receiving a request from a user-level agent for programming of a user-level privilege for at...
Security management system, medical device and method for managing
A security management system, comprising: an authentication unit for authenticating an operator of an operating terminal in order to determine whether the...
Browser security notification
Tools are described that notify a user of a security risk in a network browser. The tools can determine that a security setting of a network browser poses a...
Method and apparatus for making a decision on a card
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and...
Automatic configuration of network tunnels
Techniques are described for establishing network tunnels that allow communication according to one or more routing protocols. The techniques allow for the...
System and method for controlling devices at a location
A system and method for controlling, by an outside entity, one or more devices associated with a location. A representative embodiment of the system...
Computer communications monitor
A method for monitoring computer communications is disclosed. A packet sent from a sending node to a destination node is received at a monitoring node. It is...
Memory card, data exchange system, and data exchange method
By enabling to write information which is readable only by an IC card owner on an IC card without inputting a PIN and to authenticate a creator of the written...
Methods and systems for verifying a location factor associated with a
A server, method and/or computer-readable medium verifies a location factor associated with a token. The server generates a challenge and encrypts the challenge...
Secure key distribution to internet clients
A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide...
Systems and methods for increased security during logging in to web site
A user at a computing device interacts with a networked site so that the user can log in thereto. The site receives a selection to log in and in response...
Method and apparatus for migrating virtual trusted platform modules
A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual trusted platform module (TPM),...
Methods and systems for internet security via virtual software
A method for providing internet security includes providing a storage medium including a first executable application module. In response to inputting the...
Interactively authorizing access control method
An interactively authorizing access control method applicable to an access control center is disclosed. According to the present invention, an effective time...
Authentication mark-up data of multiple local area networks
An authentication mark-up data of multiple local area networks is disclosed. In one embodiment of a system, the system includes a wide area network, an update...
Obtaining digital identities or tokens through independent endpoint
A federated identity provisioning system includes relying parties, identity providers, and clients that obtain tokens from identity providers for access to a...
Framework and technology to enable the portability of information cards
When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store...
Pdstudio design system and method
A policy developer studio comprising: a meta-policy core of network objects, a policy developer graphical user interface (GUI) tool for providing a front end to...
Analog video signal transmission over twisted-pair wires
A video transmitting system may be configured to transmit, over extended length twisted-pair cables, video signals encoded in the Y/C video space. The system...
Recording device, playback device, recording method and playback method
A data transmission device transmits a data broadcast using a narrow unused broadcasting band in a digital broadcast, and to record the data broadcast, which...
Audiovisual reproduction system
Audiovisual reproduction system comprising a central unit managing a sound control circuit, and a telecommunications modem connected to a distribution network...
Communication system, data processing device, data processing method, data
providing device, data providing...
This invention relates to a communication system, a data processing apparatus, a data processing method, a data providing apparatus, a data providing method,...
Limited social TV apparatus
One aspect of the disclosed technology is a limited social television system that provides a light-weight process that allows multiple audience members to close...
High frequency tuner
A tuner for receiving a satellite broadcast signal via an antenna means, said tuner being coupled to a control unit. The tuner is characterized in that it...
Content storage control apparatus and control method therefor
If there are program-related associated Web pages, a TV receiver 1000 acquires the content information of the associated Web pages from a Web server 2000 and...
System and method for providing video content associated with a source
image to a television in a communication...
A system and method for providing video content associated with a source image to a television that is part of a communication network is provided. At least a...
Visual improvement of video stream transitions
Four techniques which result in the visual improvement of transitions between video streams with a same packet identifier (PID). All four techniques are...
Broadcast receiving apparatus
An appropriate direction and gain value of a smart antenna are efficiently searched for. The MPU 11 of the set top box functionally has the condition setting...
Program reservation system and program reserving method
In a receiving device, a receiver receives extended program information. A user selects a program to be reserved by a selection operation using an operation...
Receiving apparatus and method
Partial data related to information data is received, image data corresponding to the received partial data is generated by sequentially processing the received...
System and method for generating electronic program guides
A method and system for generating electronic program guides is provided. The method comprises: sharing Electronic Program Guides (EPG) data among at least one...