At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Contact probe pin for semiconductor test apparatus
It is an object to provide a contact probe pin for a semiconductor test apparatus, including an amorphous carbon type conductive film formed on the probe pin...
Fast-scanning SPM scanner and method of operating same
A high-bandwidth SPM tip scanner is provided that additionally includes an objective that is vertically movable within the scan head to increase the depth of...
Controlling the downloading and recording of digital data
A method and apparatus for enabling a licensed end user to record digital data as described is particularly useful to the music industry as it enables them to...
Encryption and access method and system for peer-to-peer distributed file
A system for secure distributed data storage that uses a network, where the system includes a file stored on a plurality of storage elements that are accessible...
Content distribution system, content distribution method, and client
The user of any one portable terminal sends a content information request including a user ID to a distribution server. In response, the distribution server...
Remanufacture of encrypted content using a replicated medium
Embodiments of the invention provide a method for creating a source for remanufacture of encrypted content using a replicated medium. A content encrypting...
Method and system for protecting information on a computer system
A system and method for protecting sensitive information, for example, a user's personal information, stored on a database where the information is accessible...
Security device, secure memory system and method using a security device
A security device including a first external interface; a second external interface; and a security controller connected to said first external interface and...
Remote administration of computer access settings
The present disclosure provides systems and methods for controlling computer access. Briefly described in architecture, some embodiments of such a system...
Document accessing through multiple security domains including multi-tear
wiki webpage and/or using cross...
Methods and apparatuses for accessing documents in a multi-security domain environment are described herein. The novel methods may be processor implemented...
System and method for upgrading the functionality of a controlling device
in a secure manner
Secure access to a database of upgrade data is provided by storing an encryption key value in a cable used to interconnect a first device and a second device...
Method and apparatus for dynamically providing privacy-policy information
to a user
One embodiment of the present invention provides a system that facilitates dynamically providing privacy-policy information to a user to facilitate compliance...
Information processing apparatus, information recording medium,
information processing method and computer program
An information processing apparatus that obtains pieces of content information relating to content recorded in an information recording medium, the information...
Content reproducing device and content preproducing method
When a secure counter malfunction detection unit 212 deters a malfunction in a secure counter 211, a content playability judgment unit 206 performs a content...
Secure enterprise network
What is proposed is a method of implementing a security system (Packet Sentry) addressing the internal security problem of enterprises having a generalized...
Method and apparatus for detecting unauthorized-access, and computer
An unauthorized-access detecting apparatus that detects unauthorized access to a server that provides a service via a network includes a storing unit that...
Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g.,...
Automated security manager
Systems, methods, media, and other embodiments associated with automated security management are described. One example system embodiment includes logic to...
Detection of undesired computer files in damaged archives
Systems and methods for an anti-virus detection module that can detect known undesired computer files in damaged archives that may be encrypted, compressed...
Computer system and method for scanning computer virus
According to the present invention, a timeout caused by executing a virus scan is avoided. A computer system has a first computer, a second computer coupled to...
Method, apparatus, signals, and medium for managing a transfer of data in
a data network
A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a...
Controlling computer program, controlling apparatus, and controlling
method for detecting infection by computer...
A computer program for a controlling apparatus intended to control an image forming apparatus, executes a procedure of confirming each program running on the...
Method and apparatus for detecting executable code
There are provided an apparatus and method for detecting an executable code, capable of verifying reliability of an extracted signature by determining whether...
Network-based infection detection using host slowdown
Host malware (or change) may be detected by (1) receiving baseline set of response time information for each of one or more transactions involving (A) the host...
Apparatus and method for detecting malicious file in mobile terminal
Provided is an apparatus and method for detecting a malicious file that attempts to initiate communication in a mobile terminal without a user's approval. The...
Information processing apparatus, user information managing method, and
computer program product
An information processing apparatus includes a hard disk drive (HDD) that stores therein user information, an operating unit that performs an operation of...
Information processing apparatus and data management system
It is an object to provide an information processing apparatus and a data management system which can access data and maintain security even in an environment...
Hardware password alignment system apparatus and methods
A system, apparatus, and methods are disclosed for aligning a stored scancode sequence that corresponds to a hardware password, with a password input device...
Authentication of baseboard management controller users in a blade server
User authorization and access information may be stored in a remote assistant card or chassis management module (CMM). The CMM may be in communication with each...
Unified architecture for remote network access
A unified architecture for enabling remote access to a network is provided. The network may comprise, as examples, a virtual private network (VPN) and/or a...
Service-based network access
In a telephony communication system, an operator network provides access to data networks through gateways. The gateways provide access in response to network...
Transformation of network filter expressions to a content addressable
A network device, such as a firewall, may be configured to filter network traffic. The filter may include regular expressions that are converted by the firewall...
Universal media firewall
A universal media firewall allows a parent to control filtering of multiple media providers via a single firewall policy. The firewall(s) may be a stand-alone...
Incorporating network connection security levels into firewall rules
Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security...
Method for providing media communication across firewalls
The present invention supports a method for transmitting information packets across network firewalls. A trusted entity is provisioned with an address...
Decentralized access control framework
A functional architecture is provided for decentralizing the authorization function of an access control system that incorporates user carried access devices,...
Device registration system, device registration server, device
registration method, device registration...
In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device...
Method and system for supporting portable authenticators on electronic
Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable...
Method and device for authenticating a user in a variety of contexts
The invention relates to a method and device for authenticating a user of an electronic device in usage contexts being able to use in said electronic device by...
Wireless communication system and wireless communication method
The present invention provides a technology of effectively avoiding tracing on a terminal performed with an identification number being a target and DoS attack...
Optimized security association database management on home/foreign agent
Techniques for security association management on a home and foreign agent are described. In one embodiment, in response to a first mobile network registration...
System and method for providing secure access to password-protected
A method of a wireless communication device for accessing secure resources of a resource provider or the device itself. A password associated with the wireless...
Document management system with public key infrastructure
Apparatus are provided, including a document management system and a private certificate authority. The private certificate authority is private to the document...
Method and system for the authentication of a user of a data processing
A method of authenticating a user's data processing terminal for granting the data processing terminal access to selected services provided by a data processing...
Authentication processing system, authentication processing method,
authentication device, and computer program
An authentication device that the user wears reads biometrics information and executes individual authentication by verification. Only when the individual...
Syndication methodology to dynamically place digital assets on non-related
An automated method is provided for obtaining selected content for a web page that allows for syndication of digital assets. The selected content itself is not...
Apparatus and method for monitoring communications
A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to transmit a tracking request to a...
Method and apparatus for handling invites to a multi-user communication
A method of handling Invite messages for a multi-user communication session utilizing the IP Multimedia Subsystem to set up and control the session. Two or more...
Providing mobility management using emulation
A system and method are disclosed for providing mobility management among mobile nodes in a communication network. Emulation can be provided to allow a mobile...
System and method providing session aware remote access
A computer implemented method provides remote access to a plurality of sessions at a computer. The method includes initiating a master process in a context...