Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,079,093 Dual tip atomic force microscopy probe and method for producing such a probe
One inventive aspect is related to an atomic force microscopy probe. The probe comprises a tip configuration with two probe tips on one cantilever arm. The...
US-8,079,092 Electro-mechanical system for non-duplication of software
A system consisting of a memory storage unit in which the licensed softwares are stored. The function of this device is to recognize the requested data and...
US-8,079,091 Compliance processing of rights managed data
Performing compliance processing is disclosed. An indication is received that compliance processing is to be performed with respect to content that is subject...
US-8,079,090 License management system, control method thereof, image processing apparatus, and control method thereof
A license management system includes a license management server, an information processing apparatus, and an image forming apparatus. To simplify application...
US-8,079,089 Information usage control system and information usage control device
A system includes: first and second devices that each register, in response to a request from a user, control information for target information in a memory,...
US-8,079,088 Information processing apparatus, information processing method, and program
Disclosed herein is an information processing apparatus including: a unit information acquisition section; an identification information acquisition section; a...
US-8,079,087 Universal resource locator verification service with cross-branding detection
A URL verification service is provided that is used to evaluate the trustworthiness of universal resource locators (URLs). As a user browses the world wide web,...
US-8,079,086 Malicious mobile code runtime monitoring system and methods
Protection systems and methods provide for protecting one or more personal computers ("PCs") and/or other intermittently or persistently network accessible...
US-8,079,085 Reducing false positives during behavior monitoring
A program installed on a computer system registers and is placed on an installed program list or an uninstall software list. A check of the uninstall software...
US-8,079,084 Virus co-processor instructions and methods for using such
Various embodiments of the present invention provide elements that may be utilized for improved virus processing. As one example, a computer readable medium is...
US-8,079,083 Method and system for recording network traffic and predicting potential security events
Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow...
US-8,079,082 Verification of software application authenticity
Various techniques are provided for verifying the authenticity of software applications. Such techniques are particularly useful for verifying the authenticity...
US-8,079,081 Systems and methods for automated log event normalization using three-staged regular expressions
Methods and systems for normalizing log messages. Some methods include obtaining a freeform log message from one of many disparate programs. The methods can...
US-8,079,080 Method, system and computer program product for detecting security threats in a computer network
A method, system and computer program product detect attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within...
US-8,079,079 Multimodal authentication
A multimodal system that employs a plurality of sensing modalities which can be processed concurrently to increase confidence in connection with authentication....
US-8,079,078 Encryption apparatus, program for use therewith, and method for use therewith
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of...
US-8,079,077 System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-8,079,076 Detecting stolen authentication cookie attacks
In one embodiment, an apparatus comprises logic for detecting stolen authentication cookie attacks. A first transport connection is established between a client...
US-8,079,075 Active reverse proxy system
A computer implemented method can include receiving a request from a user on an untrusted domain and forwarding the request to an application on a trusted...
US-8,079,074 Dynamic security shielding through a network resource
Architecture for facilitating access of remote system software functionality by a host machine for the redirection of incoming and/or outgoing host traffic...
US-8,079,073 Distributed firewall implementation and control
One or more devices on a network may be configured to provide firewall services for other devices on the network. Each of the firewall service suppliers may...
US-8,079,072 Null-packet transmission from inside a firewall to open a communication window for an outside transmitter
A high-bandwidth direct communication path between two clients is used for voice or video calls over the Internet. An opening or a window in a firewall is made...
US-8,079,071 Methods for accessing content based on a session ticket
A method for accessing content stored on a memory device is provided. In this method, a request to access the content is transmitted and a session ticket is...
US-8,079,070 System and method for blocking unauthorized network log in using stolen password
When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security...
US-8,079,069 Cardspace history validator
Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be...
US-8,079,068 Management of multiple connections to a security token access device
A system and method for automatically managing a connection between a user device and a security token access device. The access device is adapted to wirelessly...
US-8,079,067 Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
US-8,079,066 Multi-domain login and messaging
A method, a computer readable medium and a system of multi-domain login and messaging are provided. The method for multi-domain login comprises inputting a...
US-8,079,065 Indexing encrypted files by impersonating users
Methods and computer-readable media for indexing an encrypted file by impersonating a user is provided. A set of keys may be associated with a particular...
US-8,079,064 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing...
An object is to provide a service providing method capable of curbing rise of cost. A service providing method according to the present invention is one for...
US-8,079,063 Method and apparatus for controlling home network devices using rich site summary service
A method of controlling at least one home network device, in which a home network periodically connects to a rich site summary (RSS) server, fetches a control...
US-8,079,062 Method and system using presence information to manage network access
In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence...
US-8,079,061 Authentication system managing method
Inputted information (such as biometric information) is compared to template information (including correlation or authentication) and the result is recorded as...
US-8,079,060 Systems and methods for policy-based program configuration
Disclosed are systems, methods and computer program products for adaptive policy-based configuration of programs. An example method comprises collecting from...
US-8,079,059 Method and system for providing terminal view access of a client device in a secure network
Methods, computer products, and systems are described for providing terminal view access of a client device in a secure enterprise network. One method includes...
US-8,079,058 Broadcasting and processing multiple data formats
Various embodiments for broadcasting and processing multiple data formats are described. In one embodiment, a method includes sending scheduling information...
US-8,079,057 Broadcast receiving apparatus and method of controlling the apparatus
A broadcast receiving apparatus determines whether a broadcast signal that is being played back and that includes print information is a broadcast signal that...
US-8,079,056 Synchronizing a media center on a correct channel
A media center and an audio visual (AV) unit may be remotely synchronized on the same remodulation channel. A system may include a media center connected to an...
US-8,079,055 User managed internet links from TV
A method of obtaining metadata associated with an element of television programming involves instructing an access device to generate and communicate a signal...
US-8,079,054 Location for secondary content based on data differential
Methods and apparatus provide for a Content Inserter to determine location(s) for secondary content in streaming video. The Content Inserter receives a set of...
US-8,079,053 System and method of deferring multimedia content delivery
Systems and methods of deferred multimedia content delivery are disclosed. In an embodiment, a method is disclosed that includes receiving a request from a...
US-8,079,052 Methods, apparatuses, and systems for presenting advertisement content within trick files
Methods and apparatuses and systems for inserting advertisement segments into trick content. Advertisement segments present in the original video content are...
US-8,079,051 Wireless streaming media systems, devices and methods
A system includes one or more transmitter devices constructed and adapted to transmit wireless streaming media, the transmitter device connected to at least one...
US-8,079,050 System and method for performing initial setup of a device via remote control
A method for configuring a device using a remote control, includes transmitting a signal from the remote control to a configuration proxy requesting...
US-8,079,049 System and method for inserting sync bytes into transport packets
The disclosed embodiments relate to a system and method for inserting sync bytes into a video transport stream. More specifically, there is provided a method...
US-8,079,048 System and method of scheduling an event related to an advertisement
A method of scheduling an event related to an advertisement includes transmitting media content to a set-top box. The media content includes an advertisement...
US-8,079,047 Program information searching system for interactive program guide
An apparatus and method for searching for television program information using a programmable television services client device that includes memory for storing...
US-8,079,046 Intelligent system and methods of recommending media content items based on user preferences
A system and method for making program recommendations to users of a network-based video recording system utilizes expressed preferences as inputs to...
US-8,079,045 Personal video recorder and method for inserting a stored advertisement into a displayed broadcast stream
The present invention may be regarded as personal video recorder and a method of displaying a targeted advertisement on a display in conjunction with displaying...
US-8,079,044 Systems and methods for providing parental control asset searching
Systems and methods for searching for available assets permitted by parental controls are disclosed. Search results may include assets similar to a reference...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.