At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Tracing traitor coalitions and preventing piracy of digital content in a
broadcast encryption system
A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence...
Apparatus and method to limit access to selected sub-program in a software
A method includes receiving at a sub-program a request from an external entity the request comprising at least one parameter and a return address, utilizing the...
Information distribution device, method and storage medium storing
program, and data signal for information...
An information distribution device including a storage section, a reception section, a selection section and a distribution section. The storage section stores,...
Information processing apparatus, information processing method, and
An information processing apparatus is provided. The information processing apparatus includes a cryptographic processor configured to generate encrypted data...
Special PC mode entered upon detection of undesired state
A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing...
Data security system and method with editor
The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in...
Privacy protection during remote administration
A remote access manager protects the privacy of identified local file system content while a local computer is being accessed by a remote administrator. A local...
Assessing network security risk using best practices
A method and appertaining system for implementing the method are provided that utilize predefined Best Practice Templates that are rules/criteria for assessing...
Evaluation of tamper resistant software system implementations
According to one embodiment of the present invention, a method for evaluating a software system includes defining a rating of the tamper resistance of a...
Obfuscated malware detection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obfuscated malware. In one aspect, a method includes...
Anti-virus method, computer, and recording medium
In one computer system, causing the second virtual machine, which executes antivirus software for detecting and removing the virus, to monitor at least one...
Remote collection of computer forensic evidence
The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence...
Methods and systems for tracing web-based attacks
A computer-implemented method for tracing attacks. The method may include identifying a first website and determining that the first website loads an attack...
Systems and methods for detecting malicious processes by analyzing process
names and process characteristics
A computer-implemented method for detecting a malicious process using file-name heuristics may comprise: 1) identifying a process, 2) identifying a process name...
Malware detection through symbol whitelisting
A security module identifies symbols within an executable file. The security module compares these identified symbols to a set of symbols expected to be present...
Secure gateway with firewall and intrusion detection capabilities
A system, method and computer program product are provided. Initially, data is received from a remote source which is destined for a target. A portion of such...
Computer system, computer program product and method for assessing a
profile of a computer system
A method for maintaining a computer system on the basis of an access profile and a change profile is disclosed. The computer system includes at least one...
Detection of observer programs and countermeasures against observer
A system for detecting an observing program on a computer system is disclosed as including accessing instructions that access observer data. The observer data...
Authentication-capable apparatus and security system
The place where a user performs personal authentication includes a room into which entry is authenticated, and an apparatus for use of which authentication...
Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
Protection system for display apparatus and method thereof
A protection system for a display apparatus and a method thereof are provided. The protection system includes an electronic key and a protection module. The...
System and method for controlling user access to an electronic device
A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a...
Time information management system
A rights validator system for controlling access to content, the system including a query processor to receive a rights query and to provide a result to the...
Integrated policy checking system and method
A system and method are provided for validating a security service associated with packets communicated on a network. A hash of a security service associated...
Network security system having a device profiler communicatively coupled
to a traffic monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess...
Enabling network communication from role based authentication
Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive...
Validating the origin of web content
Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web...
Leveraging a persistent connection to access a secured service
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to...
Resource based non-interactive entity application proxy method and system
A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The...
Methods for protecting against cookie-poisoning attacks in
The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods...
Information processing system, recording medium storing control program,
and computer data signal embodied in a...
An information processing system, which includes: an information distribution server; a client apparatus; and a plurality of service providing servers that...
Image formation apparatus, function extension method, and a computer
readable storage medium having function...
An image formation apparatus: previously stores first information allowing functions that a plurality of users are authorized to use, respectively, to be...
Network systems and methods for providing guest access
The present disclosure generally pertains to routers for providing guest access to networks. An integrated router in one exemplary embodiment comprises at least...
Information processing system, information processing method, and computer
An information processing system includes: an organization information storage that stores organization information which defines an organization including...
Method and apparatus for provisioning a device to access digital rights
management (DRM) services in a...
A method and apparatus are provided for enabling a Universal Plug and Play (UPnP) device to be automatically provisioned to access services without the need for...
Complementary client and user authentication scheme
An authentication mechanism is provided to authenticate both client and user of a portable computing device when the user causes a client to request a protected...
Secure access point for scada devices
A programmable control unit interacts with a physical system. The physical system has a public network interface for communicating with remote computer systems....
System for eliminating unauthorized electronic mail
A system for eliminating unauthorized email sent to a user on a network employs an email-receiving server connected between the network and the user's email...
Preventing a non-head end based service provider from sending media to a
media processing system
Systems and methods that prevent unauthorized access in a communications network are provided. In one embodiment, a system that prevents unauthorized access to...
Apparatus and method for controlling devices in one or more home networks
An apparatus for controlling devices in one or more home networks is provided. The apparatus includes an authentication unit, a control message generation unit,...
Correlation engine with support for time-based rules
A rules engine with support for time-based rules is disclosed. A method performed by the rules engine, comprises receiving security events generated by a number...
Configurable redundant security device failover
Techniques are described for managing failover in redundant network devices. In particular, each device in a set of redundant network devices includes redundant...
Method and system for trusted contextual communications
This invention provides a method, system and apparatus for allowing media context sensitive SIP signaling exchange (such as voice) and call establishment while...
System and method for wireless communication of video data having partial
A system and method for wireless communication of video data are disclosed. One embodiment of the system transmits partially compressed video data from a...
Human factors based video compression
Systems and method to compress digital video based on human factors expressed as a desirability score are provided. A particular method includes selecting a...
Method for recovering a video-on-demand session
The present invention relates to a method for recovering a downloading section that has been interrupted, in a device comprising an interface with a network...
Client server based interactive television program guide system with
remote server recording
An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for...
Communication system and method for a mobile platform
A communication system is provided for use with a mobile platform. The communication system can be configured to store video data on-board to allow pseudo-live...
Method and system for transmitting plural data in portable broadcasting
A method and system for transmitting a plurality of ESG data to an MS over a communication network in a DVB-H CBMS portable broadcasting service are provided....
Systems and methods for providing fantasy sports contests based on
Fantasy sports contests based on segments of a single sports event. A segment or subevent may be a portion of a single sports event. The users choose a roster...