Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,132,268 Apparatus and method for the detection of forces in the sub-micronewton range
A force microscope for the detection of forces in the sub-micronewton range has a measurement head which is used to carry out a relative movement with respect...
US-8,132,267 Apparatus and method to harden computer system
In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components...
US-8,132,266 Methods, systems, and computer program products for identifying and enforcing software feature limits across...
Methods, systems, and computer program products for identifying and enforcing software feature limits across different hardware platforms, software releases,...
US-8,132,265 Techniques for multilingual password challenge response, password reset, and/or password recovery
Techniques for multilingual password challenge response, password reset, and/or password recovery are presented. When a password reset or password recovery...
US-8,132,264 Access authorization across processing devices
Authentication information (125) obtained by a device (100) at one level of a transformation sequence is securely communicated to another device (200) at...
US-8,132,263 Method and system for selectively controlling access to protected media on a media storage device
A method of preventing unauthorized reproduction of media disposed on a media storage device according to one embodiment is described. The method comprises...
US-8,132,262 External memory management apparatus and external memory management method
An objective is to prevent a downloaded application from accessing data in an external memory unrelated to the application, and to achieve safer management of...
US-8,132,261 Distributed dynamic security capabilities with access controls
A method and system are disclosed for distributed dynamic security of a document. Portions of a document are associated with a plurality of member definitions....
US-8,132,260 Methods and apparatus for prioritization of remediation techniques for network security risks
A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location,...
US-8,132,259 System and method for security planning with soft security constraints
A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system...
US-8,132,258 Remote security servers for protecting customer computers against computer security threats
A client computer may be configured to perform computer security operations in conjunction with a remotely located security server. Upon detection of a computer...
US-8,132,257 Anti-virus method based on security chip
An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by...
US-8,132,256 Home networking using LTE radio
A system and methodology that facilitates management of a single identity and billing relationship for multiple UE (user equipment) associated with a subscriber...
US-8,132,255 Generating a challenge response image including a recognizable image
Provided are a method, system, and article of manufacture for generating a challenge response image including a recognizable image. A challenge image is...
US-8,132,254 Protecting system control registers in a data processing apparatus
A data processing apparatus and method for protecting system control registers is provided. Processing logic is providing for executing software routines and a...
US-8,132,253 Memory security override protection for manufacturability of information handling systems
Systems and methods are disclosed for providing memory security override protection for improved manufacturability of information handling systems. A security...
US-8,132,252 System and method for securely transmitting data using video validation
A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first...
US-8,132,251 Firewall system for interconnecting two IP networks managed by two different administrative entities
Firewall system for interconnecting a first IP network (10) to a second IP network (16), these networks belonging to two different entities having each a...
US-8,132,250 Message profiling systems and methods
Methods and systems for operation upon one or more data processors that classify communications from messaging entities. A method can include receiving a...
US-8,132,249 Method for establishing a multi-link access between a local network and a remote network, and corresponding...
The invention enables the different access links between a local network and a remote network to be used in a common and transparent manner. The invention is...
US-8,132,248 Managing configurations of a firewall
A method and system for managing multiple firewall configurations are disclosed. The method uses a pointer on a packet object representing a packet to reference...
US-8,132,247 Systems and methods for authorizing a client in an SSL VPN session failover environment
The SSL VPN session failover solution of the appliance and/or client agent described herein provides an environment for handling IP address assignment and end...
US-8,132,246 Kerberos ticket virtualization for network load balancers
An exemplary group ticket for a Kerberos protocol includes a service ticket encrypted with a dynamic group key and a plurality of enveloped pairs where each...
US-8,132,245 Local area network certification system and method
The disclosure herein relates to an improved local area network certification system, apparatus, and method. More particularly, the disclosure relates to a...
US-8,132,244 Mobile smartcard based authentication
In an authentication server, information representing a first part of a response to a challenge is received during the authentication preparation phase. The...
US-8,132,243 Extended one-time password method and apparatus
An OTP token for facilitating the authorizing of a client workstation to conduct a session with a server over the Internet is disclosed. Information at least...
US-8,132,242 Automated authentication of software applications using a limited-use token
In general, the invention is directed to techniques of automated authentication of network-enabled software applications launched by a web browser. For example,...
US-8,132,241 Method for device insertion into a community of network devices
A method for performing at least one evolution operation in a dynamic, evolutive community of devices in a network comprising at least a first device. The...
US-8,132,240 Electric field unit and method for executing a protected function of an electric field unit
In order to develop a method for carrying out a protected function of an electrical field device in such a manner that a high degree of security against...
US-8,132,239 System and method for validating requests in an identity metasystem
An information processing system in a computer network comprising an edge system, an identity provider, a relying party and a tracing service, in which the...
US-8,132,238 System and method for identity authentication for service access without use of stored credentials
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in...
US-8,132,237 System of electronic document repository which guarantees authenticity of the electronic document and issues...
Provided are an electronic document repository system which guarantees authenticity of electronic document and issues certificates and methods of registering,...
US-8,132,236 System and method for providing secured access to mobile devices
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the...
US-8,132,235 Method, system, and computer program product for providing e-token based access control for virtual world spaces
A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW...
US-8,132,234 Unauthorized terminal inferring system, unauthorized terminal inferring device, and communications terminal device
There is provided an unauthorized terminal inferring device (100) device that is connected to a plurality of communications terminal devices (IDi) by a...
US-8,132,233 Dynamic network access control method and apparatus
A method of network access control identifies, in response to a request by an end node to access a network, attributes of the end node and of a device receiving...
US-8,132,232 Controlling access privileges in a wireless domain
Various systems, methods, and programs executable on a computer readable medium are provided for providing secure communications in a wireless domain. In one...
US-8,132,231 Managing user access entitlements to information technology resources
A computer implemented method, data processing system, and computer program product for logical management and provisioning of business applications within the...
US-8,132,230 Image processor
A procedure for login in a case where a prescribed job is executed in an image processor is simplified. An image processor includes: input unit accepting an...
US-8,132,229 Governing the transfer of physiological and emotional user data
Apparatus and articles of manufacture are provided for governing the transfer of data characterizing a user's behavior, physiological parameters and/or...
US-8,132,228 Electronic document conversion device and electronic document conversion method
Based on the security policy set in the original document and the security policy supported by the format of conversion destination, it is judged whether or not...
US-8,132,227 Data management in a computer system
Embodiments of the invention generally provide methods, systems, and articles of manufacture that facilitate classification of a data access authority of...
US-8,132,226 System, method and computer program product for an authentication management infrastructure
A system, method and computer program product that utilizes measurements for the authentication of users to enterprise resources. The system includes an...
US-8,132,225 Scalable and flexible information security for industrial automation
A security system that relates to industrial automation security comprises a component that receives a request to modify security relating to a zone of a...
US-8,132,224 Transmitting and receiving multimedia SMIL documents
An apparatus and method for transmitting and receiving multimedia broadcasting in order to provide multimedia broadcasting services and interactive broadcasting...
US-8,132,223 Display of enhanced content
A method for controlling presentation of items of enhanced content in an interactive television system comprising at least one distribution unit and a plurality...
US-8,132,222 Addressable tap units for cable television networks and related methods of remotely controlling bandwidth...
Addressable tap units for a cable television network include a radio frequency input and a radio frequency output. These tap units may further include a radio...
US-8,132,221 Methods, computer program products, and systems for packaging livecast electronic content for distribution
Packaging live broadcast electronic content for delivery on a content delivery network is provided. A first live program broadcast on a first channel is...
US-8,132,220 Method and apparatus for facilitating toggling between internet and TV broadcasts
A TV-Internet Integration Box allows display of first data broadcast over a TV subscriber channel simultaneously together with second data broadcast over a...
US-8,132,219 Intelligent peer-to-peer system and method for collaborative suggestions and propagation of media
In a network-based system for recommending media content items based on user preferences, clients contact a server on a periodic basis, independent of the user....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.