At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dual tip atomic force microscopy probe and method for producing such a
One inventive aspect is related to an atomic force microscopy probe. The probe comprises a tip configuration with two probe tips on one cantilever arm. The...
Electro-mechanical system for non-duplication of software
A system consisting of a memory storage unit in which the licensed softwares are stored. The function of this device is to recognize the requested data and...
Compliance processing of rights managed data
Performing compliance processing is disclosed. An indication is received that compliance processing is to be performed with respect to content that is subject...
License management system, control method thereof, image processing
apparatus, and control method thereof
A license management system includes a license management server, an information processing apparatus, and an image forming apparatus. To simplify application...
Information usage control system and information usage control device
A system includes: first and second devices that each register, in response to a request from a user, control information for target information in a memory,...
Information processing apparatus, information processing method, and
Disclosed herein is an information processing apparatus including: a unit information acquisition section; an identification information acquisition section; a...
Universal resource locator verification service with cross-branding
A URL verification service is provided that is used to evaluate the trustworthiness of universal resource locators (URLs). As a user browses the world wide web,...
Malicious mobile code runtime monitoring system and methods
Protection systems and methods provide for protecting one or more personal computers ("PCs") and/or other intermittently or persistently network accessible...
Reducing false positives during behavior monitoring
A program installed on a computer system registers and is placed on an installed program list or an uninstall software list. A check of the uninstall software...
Virus co-processor instructions and methods for using such
Various embodiments of the present invention provide elements that may be utilized for improved virus processing. As one example, a computer readable medium is...
Method and system for recording network traffic and predicting potential
Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow...
Verification of software application authenticity
Various techniques are provided for verifying the authenticity of software applications. Such techniques are particularly useful for verifying the authenticity...
Systems and methods for automated log event normalization using
three-staged regular expressions
Methods and systems for normalizing log messages. Some methods include obtaining a freeform log message from one of many disparate programs. The methods can...
Method, system and computer program product for detecting security threats
in a computer network
A method, system and computer program product detect attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within...
A multimodal system that employs a plurality of sensing modalities which can be processed concurrently to increase confidence in connection with authentication....
Encryption apparatus, program for use therewith, and method for use
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of...
System and method for distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
Detecting stolen authentication cookie attacks
In one embodiment, an apparatus comprises logic for detecting stolen authentication cookie attacks. A first transport connection is established between a client...
Active reverse proxy system
A computer implemented method can include receiving a request from a user on an untrusted domain and forwarding the request to an application on a trusted...
Dynamic security shielding through a network resource
Architecture for facilitating access of remote system software functionality by a host machine for the redirection of incoming and/or outgoing host traffic...
Distributed firewall implementation and control
One or more devices on a network may be configured to provide firewall services for other devices on the network. Each of the firewall service suppliers may...
Null-packet transmission from inside a firewall to open a communication
window for an outside transmitter
A high-bandwidth direct communication path between two clients is used for voice or video calls over the Internet. An opening or a window in a firewall is made...
Methods for accessing content based on a session ticket
A method for accessing content stored on a memory device is provided. In this method, a request to access the content is transmitted and a session ticket is...
System and method for blocking unauthorized network log in using stolen
When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security...
Cardspace history validator
Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be...
Management of multiple connections to a security token access device
A system and method for automatically managing a connection between a user device and a security token access device. The access device is adapted to wirelessly...
Streaming content in guest mode
The present application relates to systems, apparatus and methods for transmitting image data from a content source to an image display in a dual mode system...
Multi-domain login and messaging
A method, a computer readable medium and a system of multi-domain login and messaging are provided. The method for multi-domain login comprises inputting a...
Indexing encrypted files by impersonating users
Methods and computer-readable media for indexing an encrypted file by impersonating a user is provided. A set of keys may be associated with a particular...
Service verifying system, authentication requesting terminal, service
utilizing terminal, and service providing...
An object is to provide a service providing method capable of curbing rise of cost. A service providing method according to the present invention is one for...
Method and apparatus for controlling home network devices using rich site
A method of controlling at least one home network device, in which a home network periodically connects to a rich site summary (RSS) server, fetches a control...
Method and system using presence information to manage network access
In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence...
Authentication system managing method
Inputted information (such as biometric information) is compared to template information (including correlation or authentication) and the result is recorded as...
Systems and methods for policy-based program configuration
Disclosed are systems, methods and computer program products for adaptive policy-based configuration of programs. An example method comprises collecting from...
Method and system for providing terminal view access of a client device in
a secure network
Methods, computer products, and systems are described for providing terminal view access of a client device in a secure enterprise network. One method includes...
Broadcasting and processing multiple data formats
Various embodiments for broadcasting and processing multiple data formats are described. In one embodiment, a method includes sending scheduling information...
Broadcast receiving apparatus and method of controlling the apparatus
A broadcast receiving apparatus determines whether a broadcast signal that is being played back and that includes print information is a broadcast signal that...
Synchronizing a media center on a correct channel
A media center and an audio visual (AV) unit may be remotely synchronized on the same remodulation channel. A system may include a media center connected to an...
User managed internet links from TV
A method of obtaining metadata associated with an element of television programming involves instructing an access device to generate and communicate a signal...
Location for secondary content based on data differential
Methods and apparatus provide for a Content Inserter to determine location(s) for secondary content in streaming video. The Content Inserter receives a set of...
System and method of deferring multimedia content delivery
Systems and methods of deferred multimedia content delivery are disclosed. In an embodiment, a method is disclosed that includes receiving a request from a...
Methods, apparatuses, and systems for presenting advertisement content
within trick files
Methods and apparatuses and systems for inserting advertisement segments into trick content. Advertisement segments present in the original video content are...
Wireless streaming media systems, devices and methods
A system includes one or more transmitter devices constructed and adapted to transmit wireless streaming media, the transmitter device connected to at least one...
System and method for performing initial setup of a device via remote
A method for configuring a device using a remote control, includes transmitting a signal from the remote control to a configuration proxy requesting...
System and method for inserting sync bytes into transport packets
The disclosed embodiments relate to a system and method for inserting sync bytes into a video transport stream. More specifically, there is provided a method...
System and method of scheduling an event related to an advertisement
A method of scheduling an event related to an advertisement includes transmitting media content to a set-top box. The media content includes an advertisement...
Program information searching system for interactive program guide
An apparatus and method for searching for television program information using a programmable television services client device that includes memory for storing...
Intelligent system and methods of recommending media content items based
on user preferences
A system and method for making program recommendations to users of a network-based video recording system utilizes expressed preferences as inputs to...
Personal video recorder and method for inserting a stored advertisement
into a displayed broadcast stream
The present invention may be regarded as personal video recorder and a method of displaying a targeted advertisement on a display in conjunction with displaying...
Systems and methods for providing parental control asset searching
Systems and methods for searching for available assets permitted by parental controls are disclosed. Search results may include assets similar to a reference...