Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,151,368 Dynamic mode AFM apparatus
A dynamic mode AFM apparatus for allowing high-speed identification of atoms of a sample surface, which comprises a scanner for performing three-dimensional...
US-8,151,367 Information processing system
An information processing system includes a management apparatus having a transmission preventing part preventing transmission of a predetermined usage allowing...
US-8,151,366 Secure optical media storage
An optical recording medium is provided for distributing content through a portable medium which can be transported by hand from one media player to another...
US-8,151,365 Filtering access to data objects
In one embodiment, a code server and edit server are provided. The code server stores the source code. Users do not access the code server directly. Rather, an...
US-8,151,364 Authentication device and/or method
A method of authenticating a remote service (104) to a user (102) via a communications network (106) is disclosed. The remote service (104) obtains a service...
US-8,151,363 Approach for securely processing an electronic document
A method and apparatus for processing an electronic document in a secure manner is provided. A client may verify that the configuration state of a standalone...
US-8,151,362 Image forming apparatus, function extending method and user authentication system
An image forming apparatus includes an user authentication part 31 for executing authentication of a user, a function enabling part 32 for enabling at least one...
US-8,151,361 Image-processing system enabling user to use a plurality of communicably connected image-processing...
In order to facilitate the setting of functions executable in each of a plurality of image-processing apparatuses that are communicably connected to one...
US-8,151,360 System and method for administering security in a logical namespace of a storage system environment
A system and method administers security in a logical namespace of a storage system environment. A remote agent performs an integral security-related role...
US-8,151,359 System for managing proprietary data
A content distribution system (300) has access control according to a predefined data access format. A studio (32) provides content data and related proprietary...
US-8,151,358 Annotation of digital items in a shared list
Techniques are described for user-controlled annotation and sharing of one or more digital items. Examples of digital items that may be shared with other users...
US-8,151,357 Information processing apparatus, information recording medium manufacturing method, and computer program
An information recording medium manufacturing method includes the steps of: determining an encryption mode of each sector, which serves as an encrypt processing...
US-8,151,356 Method of transmitting and reproducing content processed by various DRM systems
Provided is a method of transmitting content processed according to first digital rights management (DRM) to a device that uses second DRM. The method includes...
US-8,151,355 Detection of undesired computer files in archives
Systems and methods that can detect known undesired computer files in protected archives are provided. According to one embodiment, an archive file in transit...
US-8,151,354 Detecting and addressing network attacks
A method and system are provided for preventing network service shutdowns resulting from denial of service (DOS) attacks. First, parameters are monitored...
US-8,151,353 Multi-network virus immunization with trust aspects
An apparatus, device, methods, computer program product, and system are describe that determine a virus associated with a communications network, and distribute...
US-8,151,352 Anti-malware emulation systems and methods
In some embodiments, antivirus/malware behavior-based scanning (emulation) is accelerated by identifying known code sequences and executing pre-stored...
US-8,151,351 Apparatus, method and computer program product for detection of a security breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
US-8,151,350 Method and device for detecting unknown network worms
A method and device for detecting a network worm on the network allows early detection of an unknown network worm with less computational quantity based on a...
US-8,151,349 Masking mechanism that facilitates safely executing untrusted native code
This disclosure presents a system that uses masking to safely execute native code. This system includes a processing element that executes the native code and a...
US-8,151,348 Automatic detection of reverse tunnels
Presently disclosed are methods and apparatus for analyzing packets and packet flows to detect covert communications channels (including reverse tunnels) in...
US-8,151,347 Clustered file system for mix of trusted and untrusted nodes
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted...
US-8,151,346 Unauthorized usage prevention system and information processing apparatus
A disclosed unauthorized usage prevention system enables execution of at least one software item including an identification information item uniquely...
US-8,151,345 Self-authorizing devices
Self-authorizing cards and cellular network adapters for authorization of financially payments and other secure transactions. In some embodiments a smart card...
US-8,151,344 Method and apparatus to authenticate a user
One embodiment provides a system that uses an authenticated channel to authenticate a user. The system can register a user by storing an association between a...
US-8,151,343 Method and system for providing authentication credentials
A method for authenticating a user, that includes receiving an account identifier from the user, obtaining a media prompt from an account based on the account...
US-8,151,342 Contents execution device equipped with independent authentication means and contents re-distribution method
The present invention particularly relates to a digital content providing service method and a content execution device for the same, for maximizing user...
US-8,151,341 System and method for reducing false positives during detection of network attacks
Disclosed are systems, methods and computer program products for reduction of false positives during detection of network attacks on a protected computer. In...
US-8,151,340 Data relay device and data relay method
A data relay device has a plurality of security functions sequentially executes security functions on inputted data based on a predetermined rule, to determine...
US-8,151,339 Method and apparatus for implementing filter rules in a network element
Multiple non-conflicting actions associated with filter rules may be located and applied to a packet using a single ACL lookup by causing action records to be...
US-8,151,338 Method and system for continuously serving authentication requests
A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are...
US-8,151,337 Applying firewalls to virtualized environments
Each virtualized environment on a computer has its own set of firewall rules. The virtualized environments share a single instance of the operating system...
US-8,151,336 Devices and methods for secure internet transactions
Devices and methods are disclosed which provide a mobile communications device with multiple methods of wireless communication which can use one method, such as...
US-8,151,335 Proxy authentication methods and apparatus
A proxy authentication method and apparatus is described for use in user authentication, e.g. for payment transactions. The authentication is carried out before...
US-8,151,334 Communication card for mobile network devices and authentication method for users of mobile network devices
A removable communication card for mobile network devices, respectively a corresponding authentication method, which communication card includes a network...
US-8,151,333 Distributed single sign on technologies including privacy protection and proactive updating
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
US-8,151,332 Digital identity management
One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for...
US-8,151,331 Information providing system and design information providing server
A design information providing system, which does not allow continuation of manufacturing of products unless a patent license contract is concluded, includes a...
US-8,151,330 System and method of using personal data
A particular method includes receiving a request for a portion of user data from a data repository. The user data is associated with a user. The method includes...
US-8,151,329 Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
US-8,151,328 Accessing secure network areas by utilizing mobile-device authentication
One or more media is provided for granting a user access to a secured portion of a website. Initially, a request to access is received from a user, where the...
US-8,151,327 Systems and methods for detection of session tampering and fraud prevention
The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a...
US-8,151,326 Using audio in N-factor authentication
A multi-factor authentication solution implements a recognizable voice in conjunction with a user address to increase login security and reduce user...
US-8,151,325 Optimizing device authentication by discovering internet protocol version authorizations
Methods and computer-readable media are provided to enable an Internet protocol (IP) data session to be established between a mobile device and a...
US-8,151,324 Remotable information cards
An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can "manage" personal (i.e., self-asserted)...
US-8,151,323 Systems and methods for providing levels of access and action control via an SSL VPN appliance
The present invention relates to systems and methods to identify a level of access for a resource being accessed via a secure socket layer virtual private...
US-8,151,322 Systems and methods for user access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
US-8,151,321 Modular network-assisted policy resolution
The present invention relates to a policy resolution method and system, access network and terminal device for enabling modular network-assisted policy...
US-8,151,320 Remote access system, method and program
A remote access system comprises a remote terminal, an access server accommodating a connection from the remote terminal, and first and second logical channels...
US-8,151,319 Authentication of devices in a wireless network
A method for authentication of devices (D1, D2, D3) in a wireless network, wherein--a device (D1, D2, D3) periodically switches its mode from a read mode, in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.