At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for design-for-manufacturability data encryption
An encryption and decryption interface for integrated circuit (IC) design with design-for-manufacturing (DFM). The interface includes a decryption module...
Systems and methods for providing image feedback
A computer-implemented method may include receiving, over a network, an image from an image capture device, determining an image adjustment to the image, and...
Installation of black box for trusted component for digital rights
management (DRM) on computing device
To install a black box on a computing device, an administrator has access to the computing device and queries same for machine properties thereof. The...
Securing a data transmission channel
A method of establishing a secure communication channel between end nodes of an IP communication network via one or more intermediate nodes using the Secure...
Manual operations in an enterprise security assessment sharing system
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different...
Method, apparatus and program storage device for providing automated
tracking of security vulnerabilities
A method, apparatus and program storage device for providing automated tracking of security vulnerabilities is disclosed. Security problems are reported, aged...
Intelligent network interface controller
A network interface device includes a security database and a security services engine. The security database is configured to store patterns corresponding to...
3-prong security/reliability/real-time distributed architecture of
information handling system
The present invention is directed to a distributed architecture of an information handling system, including a buried nucleus inaccessible for inspection...
System and method to select monitors that detect prefix hijacking events
Method, system and computer-readable medium to select monitors that increase the likelihood of detecting prefix hijacking events of a destination prefix are...
Method and system for detecting suspicious frame in wireless sensor
A method and system for detecting a suspicious frame in a wireless sensor network that includes: a plurality of sensor nodes, for sending sensed data and data...
User-level segmentation mechanism that facilitates safely executing
untrusted native code
A system that uses segmentation to safely execute native code. This system includes a processing element that executes the native code and a memory which stores...
Program providing device, storage medium, and vehicle-mounted information
A program providing device include an emulation means for emulating a hardware environment and a software environment of a vehicle-mounted information system, a...
Module with a controller for a chip card
In a module with a controller for a chip card, the controller having first and second I/O pads for data input and output, and the module having one I/O pad....
Security system with methodology for interprocess communication control
A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication...
Hidden markov model ("HMM")-based user authentication using keystroke
Hidden Markov Models ("HMMs") are used to analyze keystroke dynamics measurements collected as a user types a predetermined string on a keyboard. A user enrolls...
Securing CPU affinity in multiprocessor architectures
In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a...
Method and system for securely scanning network traffic
A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with...
Systems and methods for remotely maintaining virtual private networks
Systems and methods are disclosed for automatically configuring, managing, and maintaining a network device or VPN using a public network such as the Internet....
User role mapping in web applications
Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate...
Security system with methodology providing verified secured individual end
A security system with methodology providing verified secured individual end points is described. In one embodiment, for example, a method of the present...
Reusable authentication experience tool
A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The...
A computer implemented method, apparatus, and computer program product for managing privileges on a data processing system. The process initiates a privilege...
Secure audit log access for federation compliance
A computer implemented method, data processing system, and computer program product for allowing limited access to a federation partner's audit logs in a...
Network authentication for accessing social networking system information
by a third party application
Exemplary systems and methods for network authentication are provided. Exemplary systems include an application program interface configured for receiving a...
Apparatus and method for controlling communication through firewall, and
computer program product
An authenticating unit authenticates an external terminal and stores the result of authentication in an authentication state table. A receiving unit receives a...
Generalized policy server
A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to...
Centralized content management system for managing distribution of
packages to video service providers
A centralized Content Management System ("CCMS") facilitates management of packages comprising assets comprising meta-data and associated content of video...
Method and system for allocating bandwidth based on transmission power of
devices transmitting over...
A method performed by a central network device, such as a network edge device, or a CMTS, determines whether some of a plurality of user devices coupled to a...
Methods and apparatus for generating metadata utilized to filter content
from a video stream using text data
Various embodiments of apparatus, systems and/or methods are described for generating metadata utilized by a DVR to filter content from a video stream. A video...
Receiving over-the-air licenses to high-quality media content
A method, system, and medium are provided for enabling playback of licensed media content. The depicted embodiments provide a method to enable users to play a...
Display replication and control of a portable device via a wireless
interface in an automobile
A system for displaying video data in a vehicle. The system intelligently replicates one or more portable device displays on one or more vehicle displays. Each...
Program searching in digital multimedia terminal
A digital multimedia terminal comprises a receiving unit to receive a broadcasting signal. The digital multimedia terminal also comprises an input unit adapted...
Recording multi-stream interactive television
Detailed herein is a technology which, among other things, allows recording and playback of multi-stream interactive television. In one approach to this...
Methods, systems, and products for blocking content
Methods, systems, and products block objectionable content and substitute alternative content. Multiple fields of a preferred tag are retrieved from memory....
System and method for dynamically transmitting network alert system (NAS)
information from television network...
A system for dynamically transmitting network alert system (NAS) information from a television network to an affiliate station using information embedded in an...
Methods and systems for broadcasting modified live media
Methods and systems are presented for broadcasting a modified live media feed of an event. In an embodiment, the method includes receiving a live media feed at...
Optical disk drive with rotary load/eject mechanism and related computer
An optical disk drive includes a bracket, and a mecha module installed on the bracket. The mecha module includes a mounting plate fixed on the bracket, an...
Optical pickup and production method thereof
An optical pickup includes an actuator having an objective lens and an optical base on which the actuator is supported. The actuator includes a yoke having an...
Portable media player
The present invention provides a portable media player, such as a portable DVD player. The portable media player has a clamshell type design, including a base...
The invention provides a disc changer including a plurality of trays which can be moved respectively in a horizontal direction, a tray driving gear unit capable...
Optical disc apparatus
An optical disc apparatus for enabling reduction of fluid noises accompanying with disc rotation, effectively, comprises a tray 5 provided to be able to comes...
System and method for linearly managing client-server communication
Representative embodiments are disclosed of a system and method for linearly exposing client-server interaction comprising interpreting a function command...
Overriding potential competing optimization algorithms within layers of
A method, system, and computer program product for managing data optimization routines in device drivers in a data transmission path. In a data transmission...
Prioritization for online contact status updates
Communicating information about a contact, such as presence status, may be regulated in accordance with priority values associated with contacts. Various...
Method and apparatus for synthesizing hardware counters from performance
A system and method for performance monitoring may use data collected from a hardware event agent comprising a hardware sampling mechanism and/or one or more...
System and computer program product for performing bulk operations on
Bulk operations on a large number of items may be processed by a computer with a reduced likelihood of exceeding a timing or hardware limitation of a system. An...
Systems and/or methods for providing feature-rich proprietary and
standards-based triggers via a trigger subsystem
The example embodiments disclosed herein relate to application integration techniques and, more particularly, to application integration techniques built around...
Graphical message format builder
A graphical message format builder facilitates a user in building message formats by using format elements from a format editor palette which are inserted into...
Methods and systems of reconciling sources of print job processing
information in a print processing environment
A method of processing a print job in a document production environment includes receiving a job ticket having job ticket parameters, identifying a process plan...
Method, apparatus and media for managing information model jobs
Methods, apparatus and media for managing jobs of an object-oriented information model. Managing includes maintaining and updating job status information...