At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Self displacement sensing cantilever and scanning probe microscope
A cantilever has a probe portion and a cantilever portion having a free end portion from which the probe portion extends. A displacement detecting portion...
Accessory authentication for electronic devices
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches...
Transmission/reception system, recording apparatus and method, providing
apparatus and method, and program
A transmission/reception system includes a providing apparatus and a recording apparatus. The providing apparatus has a generating section which generates...
Key release systems, components and methods
Systems, methods, components are provided all for the purpose of controlling access to decryption keys needed to decrypt ciphertext. A key release agent is...
Methods and apparatus for protecting digital content
A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control...
Running internet applications with low rights
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege...
Method and system for controlling access of media on a media storage
A method of preventing unauthorized reproduction of protected media disposed on a media storage device according to one embodiment is described. The method is...
Confidential data protection through usage scoping
Methods, apparatuses, and computer-readable media for protecting confidential data on a network. An embodiment of the inventive method comprises the steps of:...
Extensible framework for system security state reporting and remediation
A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health...
Methods, computer networks and computer program products for reducing the
vulnerability of user devices
Methods, computer networks, and computer program products that reduce the vulnerability of network user devices to security threats include scanning a user...
Network management and administration
Method and arrangements are provided for use in managing a network having one more user computing entities and one or more administrative computing entities....
System and method of caching decisions on when to scan for malware
In accordance with this invention, a system, method, and computer-readable medium that selectively scans files stored on a computing device for malware is...
Context-aware real-time computer-protection systems and methods
A computer-implemented method for determining, in response to an event of interest, whether to perform a real-time file scan by examining the full context of...
Disclosed is a method and system for identifying a controller of a first computer transmitting a network attack to an attacked computer. To identify an attacker...
System and method for detection and mitigation of network worms
An intrusion detection system for a computer network includes a knowledge database that contains a baseline of normal host behavior, and a correlation engine...
System for efficiently handling cryptographic messages containing nonce
values in a wireless connectionless...
A system for determining the validity of a received cryptographic message while ensuring for out-of-order messages is utilized to provide for secure...
White list creation in behavior monitoring system
A white list (or exception list) for a behavior monitoring system for detecting unknown malware on a computing device is maintained automatically without human...
System, method, and computer program product for enabling communication
between security systems
A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a...
Network intrusion detection
Apparatus and systems, as well as methods and articles, may operate to monitor communications between network nodes coupled to each other via at least one...
Method for defending against denial-of-service attack on the IPV6 neighbor
A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries...
Malware detection using pattern classification
A malware classifier uses features of suspect software to classify the software as malicious or not. The classifier uses a pattern classification algorithm to...
Monitoring traffic to provide enhanced network security
A communication system includes a traffic monitoring element that monitors network traffic between network components. The network traffic monitoring element...
Partitioning data on a smartcard dependent on entered password
In one embodiment, an apparatus and method for partitioning data on a smartcard dependent on an entered password are disclosed. In one embodiment, the method...
Keyboard with programmable username and password keys and system
A computer input system and method that includes a plurality of username keys and a plurality of password keys that can be selectively programmed by the user....
Trusted communications with child processes
A method to identify a child process to a parent process in an operating system includes obtaining a token and login identifier from the operating system. The...
According to one embodiment of the invention, a method for establishing multiple tunnels for each virtual local area network is described. Upon receiving...
Wireless perimeter security device and network using same
A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily...
Ethernet connectivity fault management with user verification option
An access node (e.g., DSLAM, OLT/ONT) is described herein that implements a trust verification method comprising the steps of: (a) filtering an up-stream...
System and method for unified communications threat management (UCTM) for
converged voice, video and...
A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for...
IPSec network adapter verifier
A data processing system that supports verifiable IPSec network communication. The data processing system comprises an IPSec network adapter that connects the...
Stateful application firewall
A method and system to protect web applications from malicious attacks is described. A stateful means of distinguishing between valid (e.g., harmless) and...
Forensic toolkit and method for accessing data stored on electronic smart
A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card,...
Authenticating sessions in queryable caches
Techniques for authenticating users when an operation requested by a user in one of the systems of a distributed system is redirected to another system of the...
Control system and method
A control system includes a user management server or server group, a Service Policy Decision Function (SPDF) server, an Access-Resource and Admission Control...
Authenticating users with memorable personal questions
One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially...
Just-in-time authentication of users of a digital home network
A network has network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system,...
Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
System and method for managing electronic communications
A method and system are provided for allowing a user to efficiently manage communications. A system for allowing a user having a unique identity is provided,...
Behaviormetrics application system for electronic transaction
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other...
High-assurance architecture for routing of information between networks of
differing security level
The present invention is directed to routing information between networks of differing security level. Communication to/from each network is handled by a...
Detecting wireless interlopers
In an exemplary apparatus implementation, an apparatus includes: at least one processor; and one or more media including processor-executable instructions that...
Security Enhanced Data Platform
The security enhanced data platform is comprised of two primary subsystems and a host of supporting subsystems. The first primary subsystem is a document...
Protecting sensitive information on a publicly accessed data processing
The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on...
Method and system for architecting a secure solution
A system and method of designing a secure solution which meets the needs of a customer but which is appropriate and repeatable and may use components which are...
Method and portable storage device for allocating secure area in insecure
A method for extending a secure area in a portable storage device and the portable storage device therefore are provided. The method includes allocating a...
Method and apparatus for network access control (NAC) in roaming services
The present invention discloses a method and apparatus for network access control (NAC) in roaming services. In embodiments of the present invention, roaming...
Method and apparatus for using expiration information to improve
confidential data leakage prevention
A method and apparatus for using expiration information to improve confidential data leakage prevention is described. In one embodiment, a method for protecting...
Controlling network access by applying super security policies
A device may monitor a security policy that governs a user access to a zone in a private network, propagate a change in status of the security policy to one or...
Methods and systems for securing a system in an adaptive computer
An automated method for securing a target system is provided. In this method, a request to change an entity in the target system is detected. The target system...
Video multiplexer system providing low-latency VCR-like effects and
An advanced multiplexer designed and optimized for next generation on-demand video distribution is described. Features and capabilities include low-latency...