Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,141,168 Scanning probe microscope and a method to measure relative-position between probes
A main object of the present claimed invention is to provide a scanning probe microscope that can recognize a relative position between multiple probes...
US-8,141,167 Communication device and method of transmitting data
A communication device for transmitting data to a communication partner device includes a transmitter for transmitting transmit data to the communication...
US-8,141,166 Content access rights management system which embeds restricted metadata into a picture
An apparatus comprises a content item receiver which receives a content item such as a digital photo or an audio or video clip. A user preference model...
US-8,141,165 Systems and methods for secure transaction management and electronic rights protection
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers...
US-8,141,164 Systems and methods for dynamic decentralized load balancing across multiple sites
A method for enabling decentralized dynamic load balancing among a plurality of appliances providing access to a plurality of sites, each site comprising a...
US-8,141,163 Malicious code detection
In a system where an indirect control flow instruction requires a CPU to consult a first memory address, in addition to what is encoded in the instruction...
US-8,141,162 Method and system for hiding information in the instruction processing pipeline
A system, article of manufacture and method is provided for transferring secret information from a first location to a second location. The secret information...
US-8,141,161 System and method for managing trace of certifications
A certificate server 10, in response to a request from a client 131, extracts certificate data from a certificate database 102 to create a certificate file...
US-8,141,160 Mitigating and managing privacy risks using planning
System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is...
US-8,141,159 Method and system for protecting confidential information
A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b)...
US-8,141,158 Measuring coverage of application inputs for advanced web application security testing
A computer implemented method, a data processing system, and a computer usable recordable-type medium having a computer usable program code monitor a black box...
US-8,141,157 Method and system for managing computer security information
A security management system includes a fusion engine which "fuses" or assembles information from multiple data sources and analyzes this information in order...
US-8,141,156 Method and apparatus for mitigating routing misbehavior in a network
Method and apparatus for mitigating routing misbehavior in a network is described. In one example, routing protocol traffic is received from a remote router...
US-8,141,155 Predictive assessment of network risks
In certain implementations, systems and methods for predicting technology vulnerabilities in a network of computer devices are based on software characteristics...
US-8,141,154 System and method for inspecting dynamically generated executable code
A method for protecting a client computer from dynamically generated malicious content, including receiving at a gateway computer content being sent to a client...
US-8,141,153 Method and apparatus for detecting executable software in an alternate data stream
A method and apparatus of detecting executable software in alternate data streams to secure operation of a computer comprises processing information regarding a...
US-8,141,152 Method to detect spam over internet telephony (SPIT)
The present invention provides methods, devices, and systems for detecting and filtering SPam over Internet Telephony (SPIT). The invention includes a two level...
US-8,141,151 Non-intrusive monitoring of services in a service-oriented architecture
A method for monitoring a service provided in a service-oriented architecture may include submitting a subscription request to a plurality of intermediaries in...
US-8,141,150 Method and apparatus for automatic identification of phishing sites from low-level network traffic
A module is configured to identify a phishing Web site. The module identifies email associated with a Web site and transmitted to a plurality of recipients. The...
US-8,141,149 Keyword obfuscation
Embodiments of the invention provide novel systems, methods and software for searching and/or analyzing text, based on a list of one or more keywords of...
US-8,141,148 Method and system for tracking machines on a network using fuzzy GUID technology
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality...
US-8,141,147 System, method and apparatus for use in monitoring or controlling internet access
An apparatus, method and system for use in categorizing Uniform Resource Locators (URLs) when controlling or monitoring access to the Internet from a client. A...
US-8,141,146 Authentication server, authentication method and authentication program
Upon receipt of a service use request from a client, an authentication server device reads one or more image information pieces from an image information...
US-8,141,145 Method to control the execution of a program by a microcontroller
The aim of the present invention is to propose a method and a device with the aim of avoiding problems which could ensue following the de-synchronization of a...
US-8,141,144 Security policy management for network devices
The present invention provides a system and method for use within a computer network that allows for automated provisioning, configuration, and maintenance of...
US-8,141,143 Method and system for providing remote access to resources in a secure data center over a network
Methods, computer products, and systems are described for providing remote access to resources in a secure data center protected by at least one firewall. One...
US-8,141,142 Secure authentication of service users of a remote service interface to a storage media
A pair of servers are employed to provide a secure low-overhead authentication of a user. A certificate server of the pair receives personal information of the...
US-8,141,141 System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate verification of an authorized user. The initial processing is performed by...
US-8,141,140 Methods and systems for single sign on with dynamic authentication levels
Method and systems for single sign on with dynamic authentication levels is described. The method include receiving a data request for access to a second...
US-8,141,139 Federated single sign-on (F-SSO) request processing using a trust chain having a custom module
Federated single sign on (F-SSO) uses a token service that fulfills requests by executing a module chain comprising a set of modules. F-SSO runtime processing...
US-8,141,138 Auditing correlated events using a secure web single sign-on login
Systems, methods, and machine-readable media are disclosed to provide for auditing of events or access of resources in a distributed system. In one embodiment,...
US-8,141,137 Authentication vector generation device, subscriber identity module, mobile communication system,...
Authentication of a subscriber identity module issued by IMT-2000 network operator is performed with no decrease in the confidentiality of calculation...
US-8,141,136 Method and system of replacing smart card
The present invention disclosed a method and system of replacing smart cards. It uses a new identification device (a new SIM) to replace an old one (an old SIM)...
US-8,141,135 Information processing system, terminal, information processing apparatus, and management server
An information processing system has an information processing apparatus and a terminal coupled to each other through a network. The terminal has an address...
US-8,141,134 Authentication engine for enrollment into a computer environment
Embodiments of the invention are generally directed to a system and method for enrolling a user into an authentication system. In some embodiments of the...
US-8,141,133 Filtering communications between users of a shared network
Methods, systems, and products are provided for filtering communications between users of a shared network. Embodiments include receiving a communication from a...
US-8,141,132 Determining an invalid request
A method of determining an indication of an invalid request, the method including the steps of, in a processing system: receiving data at step 100, comparing at...
US-8,141,131 Security policy generation
The invention provides security policy generation methods and devices for generating a security policy that is set up for an information processing apparatus...
US-8,141,130 Automated dissemination of enterprise policy for runtime customization of resource arbitration
A system and method for disseminating policies to multiple policy-based components includes a policy producer which generates a group of policies to be...
US-8,141,129 Centrally accessible policy repository
The present invention extends to methods, systems, and computer program products for a centrally accessible policy repository. Protection policies for...
US-8,141,128 Methods and apparatus for building and executing natural language workflow functions
The present disclosure provides methods and apparatuses for building and executing natural language policies. Using the methods and apparatus herein, users can...
US-8,141,127 High granularity reactive measures for selective pruning of information
Some embodiments of high granularity reactive measures for selective pruning of information have been presented. The system and apparatus embody algorithms to...
US-8,141,126 Selective IPsec security association recovery
Embodiments of the present invention address deficiencies of the art in respect to IPsec SA recovery and provide a novel and non-obvious method, system and...
US-8,141,125 Orchestration of policy engines and format technologies
Policies can combine the efficiency of rule sets with the flexible expression power of workflow engines, as well as advantages of other programming languages...
US-8,141,124 Managing community provided in information processing system
Provided is a system which manages a user community provided in an information processing system, in which user community information provided by a user is made...
US-8,141,123 Method and apparatus for recording and rendering programs that cross SDV force tune boundaries
A method is provided for recording a switched digital video (SDV) program received over a content delivery system. The method includes receiving a single...
US-8,141,122 RF terminate/permit system
There is provided a terminate or permit device that includes an internal circuitry, which discriminates between noise and non-noise transmissions. In one...
US-8,141,121 Method and system for communicating information between a point of distribution and a plurality of subscriber...
A communication system for distributing information via a network to one or more subscribers includes a multi-port switch, one or more radio frequency (RF)...
US-8,141,120 Adaptive scheduling of streaming video over wireless networks
An adaptive scheduling process is disclosed which dynamically decides which frames need to be transmitted and which ones need to be dropped at any transmission...
US-8,141,119 Digital broadcasting system and method of processing data in digital broadcasting system
A digital broadcast receiver and a control method thereof are disclosed. The control method of the digital broadcast receiver includes receiving a broadcast...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.