At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dynamic mode AFM apparatus
A dynamic mode AFM apparatus for allowing high-speed identification of atoms of a sample surface, which comprises a scanner for performing three-dimensional...
Information processing system
An information processing system includes a management apparatus having a transmission preventing part preventing transmission of a predetermined usage allowing...
Secure optical media storage
An optical recording medium is provided for distributing content through a portable medium which can be transported by hand from one media player to another...
Filtering access to data objects
In one embodiment, a code server and edit server are provided. The code server stores the source code. Users do not access the code server directly. Rather, an...
Authentication device and/or method
A method of authenticating a remote service (104) to a user (102) via a communications network (106) is disclosed. The remote service (104) obtains a service...
Approach for securely processing an electronic document
A method and apparatus for processing an electronic document in a secure manner is provided. A client may verify that the configuration state of a standalone...
Image forming apparatus, function extending method and user authentication
An image forming apparatus includes an user authentication part 31 for executing authentication of a user, a function enabling part 32 for enabling at least one...
Image-processing system enabling user to use a plurality of communicably
In order to facilitate the setting of functions executable in each of a plurality of image-processing apparatuses that are communicably connected to one...
System and method for administering security in a logical namespace of a
storage system environment
A system and method administers security in a logical namespace of a storage system environment. A remote agent performs an integral security-related role...
System for managing proprietary data
A content distribution system (300) has access control according to a predefined data access format. A studio (32) provides content data and related proprietary...
Annotation of digital items in a shared list
Techniques are described for user-controlled annotation and sharing of one or more digital items. Examples of digital items that may be shared with other users...
Information processing apparatus, information recording medium
manufacturing method, and computer program
An information recording medium manufacturing method includes the steps of: determining an encryption mode of each sector, which serves as an encrypt processing...
Method of transmitting and reproducing content processed by various DRM
Provided is a method of transmitting content processed according to first digital rights management (DRM) to a device that uses second DRM. The method includes...
Detection of undesired computer files in archives
Systems and methods that can detect known undesired computer files in protected archives are provided. According to one embodiment, an archive file in transit...
Detecting and addressing network attacks
A method and system are provided for preventing network service shutdowns resulting from denial of service (DOS) attacks. First, parameters are monitored...
Multi-network virus immunization with trust aspects
An apparatus, device, methods, computer program product, and system are describe that determine a virus associated with a communications network, and distribute...
Anti-malware emulation systems and methods
In some embodiments, antivirus/malware behavior-based scanning (emulation) is accelerated by identifying known code sequences and executing pre-stored...
Apparatus, method and computer program product for detection of a security
breach in a network
A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address,...
Method and device for detecting unknown network worms
A method and device for detecting a network worm on the network allows early detection of an unknown network worm with less computational quantity based on a...
Masking mechanism that facilitates safely executing untrusted native code
This disclosure presents a system that uses masking to safely execute native code. This system includes a processing element that executes the native code and a...
Automatic detection of reverse tunnels
Presently disclosed are methods and apparatus for analyzing packets and packet flows to detect covert communications channels (including reverse tunnels) in...
Clustered file system for mix of trusted and untrusted nodes
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted...
Unauthorized usage prevention system and information processing apparatus
A disclosed unauthorized usage prevention system enables execution of at least one software item including an identification information item uniquely...
Self-authorizing cards and cellular network adapters for authorization of financially payments and other secure transactions. In some embodiments a smart card...
Method and apparatus to authenticate a user
One embodiment provides a system that uses an authenticated channel to authenticate a user. The system can register a user by storing an association between a...
Method and system for providing authentication credentials
A method for authenticating a user, that includes receiving an account identifier from the user, obtaining a media prompt from an account based on the account...
Contents execution device equipped with independent authentication means
and contents re-distribution method
The present invention particularly relates to a digital content providing service method and a content execution device for the same, for maximizing user...
System and method for reducing false positives during detection of network
Disclosed are systems, methods and computer program products for reduction of false positives during detection of network attacks on a protected computer. In...
Data relay device and data relay method
A data relay device has a plurality of security functions sequentially executes security functions on inputted data based on a predetermined rule, to determine...
Method and apparatus for implementing filter rules in a network element
Multiple non-conflicting actions associated with filter rules may be located and applied to a packet using a single ACL lookup by causing action records to be...
Method and system for continuously serving authentication requests
A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are...
Applying firewalls to virtualized environments
Each virtualized environment on a computer has its own set of firewall rules. The virtualized environments share a single instance of the operating system...
Devices and methods for secure internet transactions
Devices and methods are disclosed which provide a mobile communications device with multiple methods of wireless communication which can use one method, such as...
Proxy authentication methods and apparatus
A proxy authentication method and apparatus is described for use in user authentication, e.g. for payment transactions. The authentication is carried out before...
Communication card for mobile network devices and authentication method
for users of mobile network devices
A removable communication card for mobile network devices, respectively a corresponding authentication method, which communication card includes a network...
Distributed single sign on technologies including privacy protection and
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
Digital identity management
One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for...
Information providing system and design information providing server
A design information providing system, which does not allow continuation of manufacturing of products unless a patent license contract is concluded, includes a...
System and method of using personal data
A particular method includes receiving a request for a portion of user data from a data repository. The user data is associated with a user. The method includes...
Secure handling of stored-value data objects
An approach to managing stored-value data objects, such as electronic tickets, comprises secure systems and procedures for ticket issuing, storage, and...
Accessing secure network areas by utilizing mobile-device authentication
One or more media is provided for granting a user access to a secured portion of a website. Initially, a request to access is received from a user, where the...
Systems and methods for detection of session tampering and fraud
The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a...
Using audio in N-factor authentication
A multi-factor authentication solution implements a recognizable voice in conjunction with a user address to increase login security and reduce user...
Optimizing device authentication by discovering internet protocol version
Methods and computer-readable media are provided to enable an Internet protocol (IP) data session to be established between a mobile device and a...
Remotable information cards
An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can "manage" personal (i.e., self-asserted)...
Systems and methods for providing levels of access and action control via
an SSL VPN appliance
The present invention relates to systems and methods to identify a level of access for a resource being accessed via a secure socket layer virtual private...
Systems and methods for user access authentication based on network access
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
Modular network-assisted policy resolution
The present invention relates to a policy resolution method and system, access network and terminal device for enabling modular network-assisted policy...
Remote access system, method and program
A remote access system comprises a remote terminal, an access server accommodating a connection from the remote terminal, and first and second logical channels...
Authentication of devices in a wireless network
A method for authentication of devices (D1, D2, D3) in a wireless network, wherein--a device (D1, D2, D3) periodically switches its mode from a read mode, in...