Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,146,168 Program control apparatus, method and program
An activation restriction confirmation processing unit concatenates the basic portion of the name of an activation-restricted program and constituent...
US-8,146,167 Use management method for peripheral device, electronic system and component device thereof
Managing the use of an optical disc drive by a program at high security. An OS of a host apparatus 100 sends one user certificate incorporating the policy...
US-8,146,166 System and method for providing content in two formats on one DRM disk
A DRM disk such as a Blu-ray stores content in a high resolution version for playing by a disk player. The disk also stores the same content in a lower...
US-8,146,165 Method and apparatus for providing a data masking portal
An approach is provided for de-personalizing data. A request is received from an application for retrieval of data. An end user associated with the request is...
US-8,146,164 Method and apparatus for thwarting spyware
A trusted apparatus including an input filter, security mode indicator working with a proxy node thwart the possibility of spyware being able to observe user...
US-8,146,163 Method and system for securing personal computing devices from unauthorized data copying and removal
A method for securing personal computing devices from unauthorized data copying and removal includes detecting an attachment of a device to a client included...
US-8,146,162 System and method for acceleration of malware detection using antivirus cache
Disclosed are systems, methods and computer program products for acceleration of computer malware detection system using antivirus cache. The system provides an...
US-8,146,161 Multi-network virus immunization with separate physical path
An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and...
US-8,146,160 Method and system for authentication event security policy generation
A method and system allows for the deployment of security policies into the higher layers of the OSI model. Specifically, it allows for the establishment of...
US-8,146,159 Methods for inspecting security certificates by network security devices to detect and prevent the use of...
Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a...
US-8,146,158 Extensible activation exploit scanner
An extensible activation exploit scanner may have a modular structure, such that capabilities of the activation exploit scanner may be updated easily. The...
US-8,146,157 Method and apparatus for secure transport and storage of surveillance video
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network...
US-8,146,156 Archive of text captures from rendered documents
A facility for storing a text capture data structure for a particular user is described. The data structure comprises a number of entries. Each entry...
US-8,146,155 Controlling access to content on an object addressable storage system
Embodiments of the invention relate to controlling access to a content unit stored on an object addressable storage (OAS) system. In one embodiment, the content...
US-8,146,154 Method and system for using shared secrets to protect access to testing keys for set-top box
Certain aspects of a method and system for using shared secrets to protect the access of testing keys for a set-top box may comprise receiving within a security...
US-8,146,153 Method and system for creating and accessing a secure storage area in a non-volatile memory card
In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification...
US-8,146,152 Image processing apparatus, processing flow control method, image forming system, and storage medium
An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired...
US-8,146,151 Safe file transmission and reputation lookup
Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made...
US-8,146,150 Security management in multi-node, multi-processor platforms
Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node...
US-8,146,149 Apparatus and method for protecting a medical device and a patient treated with this device against harmful...
Apparatus for interacting with a medical device which is suitable for connection into a communication network which comprises at least one insecure area and a...
US-8,146,148 Tunneled security groups
A method for providing security groups based on the use of tunneling is disclosed. The method includes assigning a security group identifier (SGI) to a packet...
US-8,146,147 Combined firewalls
A method of providing a firewall to protect a set of virtual machines on a host node that is one of multiple host nodes that host virtual machines. The method...
US-8,146,146 Method and apparatus for integrated network security alert information retrieval
A method and apparatus are disclosed whereby databases containing information related to an IP address are accessed directly from within a threat management...
US-8,146,145 Method and apparatus for enabling enhanced control of traffic propagation through a network firewall
A distributed firewall system is used to implement a network firewall with enhanced control over network traffic to allow policy to be implemented on a per-user...
US-8,146,144 Method and system for the transparent transmission of data traffic between data processing devices,...
The invention relates to a method and a system for the transparent transmission of data traffic between data processing devices, a corresponding program...
US-8,146,143 Fraud detection
In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is...
US-8,146,142 Device introduction and access control framework
In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band...
US-8,146,141 Method and system for secure authentication of a user by a host system
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction...
US-8,146,140 Mobile IP bulk registration revocation
Techniques for Mobile IP bulk registration revocation are described herein. According to one embodiment, a first mobile agent of a mobile IP network sends a...
US-8,146,139 System and method of user authentication using handwritten signatures for an MFP
The invention relates to the authentication of users for a multi-function peripheral (MFP) device using handwritten signatures. Systems and methods are...
US-8,146,138 Access unit switching through physical mediation
A plurality of access units may be established with varying levels of privilege and access rights, such that the user may perform tasks carrying with them a...
US-8,146,137 Dynamic internet address assignment based on user identity and policy compliance
In embodiments of the present invention, improved capabilities are described for a method presenting a client, providing client information and requesting an IP...
US-8,146,136 Automated acceptance or rejection of consumer correction submissions
Systems and methods for generating a score for use in automated processing of correction submissions are presented. In one embodiment, a submission value from a...
US-8,146,135 Establishing and enforcing security and privacy policies in web-based applications
Method, system, and computer code for implementing privacy protection in a web application, wherein the web application is executed in a web application...
US-8,146,134 Scalable firewall policy management platform
Securing large networks having heterogeneous computing resources including provision of multiple services both to clients within and outside of the network,...
US-8,146,133 Apparatus and method for managing P2P traffic
The invention relates to a P2P traffic management apparatus and method. A P2P flow agent monitors an executed application program to extract a P2P application...
US-8,146,132 Device registration using a wireless home entertainment hub
A method of managing a power state of devices in a home entertainment system using a wireless home entertainment hub comprises obtaining a registration of a...
US-8,146,131 Unique production forum
A method of producing an audio/video format recording in a venue includes correlating multiple unique viewing position in the venue to viewers. An event is then...
US-8,146,130 In-band data recognition and synchronization system
A method and apparatus for recognizing and synchronizing to in-band data at a multimedia device is provided. A content stream includes in-band data. The in-band...
US-8,146,129 Apparatus and method for providing video content and supplemental information to a client over a switched...
Video content is transmitted from a head end, over a switched digital video content-based network, to a client. The head end obtains a first group of program...
US-8,146,128 Download execution apparatus
There is provided a download execution apparatus that can prevent, at least, sudden interruption of the viewing or recording by a user when a program is...
US-8,146,127 Apparatus and method for providing data for a carousel
An apparatus and method of providing data for a carousel from which iTV pages may be obtained including defining a plurality of information templates, each...
US-8,146,126 Request for information related to broadcast network content
A request for information (RFI) system is provided for use in communications networks including broadcast networks and the internet. In one implementation, a...
US-8,146,125 Computerized device and method for analyzing signals in a multimedia over coax alliance (MOCA) network and...
The present invention relates to testing signals on a coaxial home network that carries a digital video signal. It has direct application to testing so-called...
US-8,146,124 Camera adapter for remote controlling a camera, control method thereof, and storage medium
An adapter connected to a device and also connected to a client terminal via a network displays an operation window corresponding to the process mode of the...
US-8,146,123 System to provide set top box configuration for content on demand
A content on demand system includes logic to compose set top box configuration information into an audio and/or video stream format, and to communicate the...
US-8,146,122 Receiving apparatus
A receiving apparatus includes a receiving unit configured to receive television broadcasting to generate an output signal, a signal processing unit configured...
US-8,146,121 Systems and methods for processing program content and information in a video broadcast
Embodiments of the present invention significantly decrease the processing requirements as well as the cost of digital television receivers. In an embodiment,...
US-8,146,120 Multi-criteria rating and searching system
A method and apparatus to provide a multi-criteria rating and search system is described. Users can provide ratings along multiple axes, which can then be used...
US-8,146,119 Apparatus and method for managing media content
A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to generate a playlist that...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.