Patents

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,161,568 Self displacement sensing cantilever and scanning probe microscope
A cantilever has a probe portion and a cantilever portion having a free end portion from which the probe portion extends. A displacement detecting portion...
US-8,161,567 Accessory authentication for electronic devices
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches...
US-8,161,566 Transmission/reception system, recording apparatus and method, providing apparatus and method, and program
A transmission/reception system includes a providing apparatus and a recording apparatus. The providing apparatus has a generating section which generates...
US-8,161,565 Key release systems, components and methods
Systems, methods, components are provided all for the purpose of controlling access to decryption keys needed to decrypt ciphertext. A key release agent is...
US-8,161,564 Methods and apparatus for protecting digital content
A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control...
US-8,161,563 Running internet applications with low rights
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege...
US-8,161,562 Method and system for controlling access of media on a media storage device
A method of preventing unauthorized reproduction of protected media disposed on a media storage device according to one embodiment is described. The method is...
US-8,161,561 Confidential data protection through usage scoping
Methods, apparatuses, and computer-readable media for protecting confidential data on a network. An embodiment of the inventive method comprises the steps of:...
US-8,161,560 Extensible framework for system security state reporting and remediation
A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health...
US-8,161,559 Methods, computer networks and computer program products for reducing the vulnerability of user devices
Methods, computer networks, and computer program products that reduce the vulnerability of network user devices to security threats include scanning a user...
US-8,161,558 Network management and administration
Method and arrangements are provided for use in managing a network having one more user computing entities and one or more administrative computing entities....
US-8,161,557 System and method of caching decisions on when to scan for malware
In accordance with this invention, a system, method, and computer-readable medium that selectively scans files stored on a computing device for malware is...
US-8,161,556 Context-aware real-time computer-protection systems and methods
A computer-implemented method for determining, in response to an event of interest, whether to perform a real-time file scan by examining the full context of...
US-8,161,555 Progressive wiretap
Disclosed is a method and system for identifying a controller of a first computer transmitting a network attack to an attacked computer. To identify an attacker...
US-8,161,554 System and method for detection and mitigation of network worms
An intrusion detection system for a computer network includes a knowledge database that contains a baseline of normal host behavior, and a correlation engine...
US-8,161,553 System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless...
A system for determining the validity of a received cryptographic message while ensuring for out-of-order messages is utilized to provide for secure...
US-8,161,552 White list creation in behavior monitoring system
A white list (or exception list) for a behavior monitoring system for detecting unknown malware on a computing device is maintained automatically without human...
US-8,161,551 System, method, and computer program product for enabling communication between security systems
A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a...
US-8,161,550 Network intrusion detection
Apparatus and systems, as well as methods and articles, may operate to monitor communications between network nodes coupled to each other via at least one...
US-8,161,549 Method for defending against denial-of-service attack on the IPV6 neighbor cache
A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries...
US-8,161,548 Malware detection using pattern classification
A malware classifier uses features of suspect software to classify the software as malicious or not. The classifier uses a pattern classification algorithm to...
US-8,161,547 Monitoring traffic to provide enhanced network security
A communication system includes a traffic monitoring element that monitors network traffic between network components. The network traffic monitoring element...
US-8,161,546 Partitioning data on a smartcard dependent on entered password
In one embodiment, an apparatus and method for partitioning data on a smartcard dependent on an entered password are disclosed. In one embodiment, the method...
US-8,161,545 Keyboard with programmable username and password keys and system
A computer input system and method that includes a plurality of username keys and a plurality of password keys that can be selectively programmed by the user....
US-8,161,544 Trusted communications with child processes
A method to identify a child process to a parent process in an operating system includes obtaining a token and login identifier from the operating system. The...
US-8,161,543 VLAN tunneling
According to one embodiment of the invention, a method for establishing multiple tunnels for each virtual local area network is described. Upon receiving...
US-8,161,542 Wireless perimeter security device and network using same
A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily...
US-8,161,541 Ethernet connectivity fault management with user verification option
An access node (e.g., DSLAM, OLT/ONT) is described herein that implements a trust verification method comprising the steps of: (a) filtering an up-stream...
US-8,161,540 System and method for unified communications threat management (UCTM) for converged voice, video and...
A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for...
US-8,161,539 IPSec network adapter verifier
A data processing system that supports verifiable IPSec network communication. The data processing system comprises an IPSec network adapter that connects the...
US-8,161,538 Stateful application firewall
A method and system to protect web applications from malicious attacks is described. A stateful means of distinguishing between valid (e.g., harmless) and...
US-8,161,537 Forensic toolkit and method for accessing data stored on electronic smart cards
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card,...
US-8,161,536 Authenticating sessions in queryable caches
Techniques for authenticating users when an operation requested by a user in one of the systems of a distributed system is redirected to another system of the...
US-8,161,535 Control system and method
A control system includes a user management server or server group, a Service Policy Decision Function (SPDF) server, an Access-Resource and Admission Control...
US-8,161,534 Authenticating users with memorable personal questions
One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially...
US-8,161,533 Just-in-time authentication of users of a digital home network
A network has network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system,...
US-8,161,532 Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
US-8,161,531 System and method for managing electronic communications
A method and system are provided for allowing a user to efficiently manage communications. A system for allowing a user having a unique identity is provided,...
US-8,161,530 Behaviormetrics application system for electronic transaction authorization
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other...
US-8,161,529 High-assurance architecture for routing of information between networks of differing security level
The present invention is directed to routing information between networks of differing security level. Communication to/from each network is handled by a...
US-8,161,528 Detecting wireless interlopers
In an exemplary apparatus implementation, an apparatus includes: at least one processor; and one or more media including processor-executable instructions that...
US-8,161,527 Security Enhanced Data Platform
The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document...
US-8,161,526 Protecting sensitive information on a publicly accessed data processing system
The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on...
US-8,161,525 Method and system for architecting a secure solution
A system and method of designing a secure solution which meets the needs of a customer but which is appropriate and repeatable and may use components which are...
US-8,161,524 Method and portable storage device for allocating secure area in insecure area
A method for extending a secure area in a portable storage device and the portable storage device therefore are provided. The method includes allocating a...
US-8,161,523 Method and apparatus for network access control (NAC) in roaming services
The present invention discloses a method and apparatus for network access control (NAC) in roaming services. In embodiments of the present invention, roaming...
US-8,161,522 Method and apparatus for using expiration information to improve confidential data leakage prevention
A method and apparatus for using expiration information to improve confidential data leakage prevention is described. In one embodiment, a method for protecting...
US-8,161,521 Controlling network access by applying super security policies
A device may monitor a security policy that governs a user access to a zone in a private network, propagate a change in status of the security policy to one or...
US-8,161,520 Methods and systems for securing a system in an adaptive computer environment
An automated method for securing a target system is provided. In this method, a request to change an entity in the target system is detected. The target system...
US-8,161,519 Video multiplexer system providing low-latency VCR-like effects and program changes
An advanced multiplexer designed and optimized for next generation on-demand video distribution is described. Features and capabilities include low-latency...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →