Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: database management





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,332,431 Configuration information management apparatus, configuration information management program, and configuration...
A CMDB (configuration information management database) stores a CI (configuration item) and know-how separately. A CMDB data update management unit associates...
US-8,332,387 Method, system, and computer program product for managing a multi-tenant database system
More efficient querying of a multi-tenant database using dynamic tuning of database indices. A layer of meta-data associates data items with tenants, e.g., via...
US-8,332,369 Policy driven distributed data resiliency
A data resiliency layer provides manageable data resiliency policy options for email related applications. Through one or more APIs such applications are...
US-8,332,265 System and methods for online performance management
A system, method and computer program product are provided for performance management. A member within an entity is selected and a performance assessment of the...
US-8,331,287 Method and system for managing mobility in a mobile communication system using mobile internet protocol
A method is provided for managing mobility of an Access Terminal (AT) in a mobile communication system using a Mobile Internet Protocol (MIP). The method...
US-8,327,380 Method and interprocess communication driver for managing requests of a database client to a database server
Certain example embodiments relate to techniques for managing the interprocess communication between at least one database client process and at least one...
US-8,327,337 Stream based debugging techniques
Techniques are described for debugging a processing element (or elements) in a stream based database application in a manner that reduces the impact of...
US-8,326,990 Automated optimal workload balancing during failover in share-nothing database systems
Procedures and systems may be used for assigning data partitions to data-processing host computers, for example, to initially assign data partitions at the...
US-8,326,941 Method for autonomic detection and repair of broken links in web environments
A method for implementing autonomic detection and repair of broken links in Web environments includes receiving a request for additional Web content in a server...
US-8,326,891 Managing a hierarchy of databases
Monitoring an activity profile for a given row of a database and determining a target database for a given row based on the activity profile of the given row....
US-8,326,877 Region-based security
The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a...
US-8,326,872 Database sandbox
Systems and methods that qualify and/or restrict access of codes associated with a database to objects located outside thereof and in other databases--even...
US-8,326,870 Critical parameter/requirements management process and environment
A critical parameter/requirements management process model for managing a development program for a product and an associated product structure-driven critical...
US-8,326,851 Simultaneous intellectual property search and valuation system and methodology (SIPS-VSM)
A system, method, and computer-based logic flow for a web-enabled tool that allows simultaneous intelligent searching, knowledge management based problem...
US-8,326,839 Efficient file access in a large repository using a two-level cache
A two-level cache to facilitate resolving resource path expressions for a hierarchy of resources is described, which includes a system-wide shared cache and a...
US-8,326,838 Education credentials management method and system
A system and method for online storage and distribution of educational credentials and related documents of student and job seeker applicants comprising, a...
US-8,326,818 Method of managing websites registered in search engine and a system thereof
A method of managing websites registered in a search engine in a search engine administration system includes receiving, by an interface module, website...
US-8,326,765 Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and...
The present invention is an expert matching method and apparatus for managing communications between an expert having particular qualifications and an end user...
US-8,326,744 Electronic transaction system and method
An Internet based system for executing transactions is described. The system may include transaction data, a database, a business logic manager and user...
US-8,326,742 Programmed trading system
An Internet based investment account management system that consists of data, a rules database, a business logic manager and user profiles is described. The...
US-8,326,684 System and method for selective publication of sponsored comments
A system for publishing a sponsor-comment together with content of a publisher that is associated with a particular file. A code segment is included in the...
US-8,326,657 Systems and methods for insurance underwriting
The systems and methods described herein may automate insurance underwriting by integrating information from multiple online databases and creating decision...
US-8,325,626 Lightweight mobility architecture
Mobility between access domains in an Internet Protocol (IP) network can be supported by introducing a so-called Mobility Manager (MM) that maintains a database...
US-8,325,615 System and method for collapsed subscriber management and call control
Systems and methods for integrating subscriber management and call control functionalities in a packet data network are provided. Subscriber management services...
US-8,321,947 Method and system for dynamically generating a watermarked document during a printing or display operation
A dynamic watermarking capability is implemented in an enterprise rights management (ERM) or similar system that comprises a central server to which end user...
US-8,321,901 System for remotely controlling client recording and storage behavior
A system for remotely controlling client recording and storage behavior schedules the recording, storing, and deleting of multimedia content on a client system...
US-8,321,567 IP pool management utilizing an IP pool MIB
A method for managing Internet Protocol (IP) addresses on a data communications network includes allocating multiple local IP address pools, requesting IP...
US-8,321,480 Full-function to high availability large database conversion
Systems, methods and computer readable medium for migrating Information Management System (IMS) Full-Function databases to IMS High Availability Large Databases...
US-8,321,415 Server apparatus, method of inspecting logs for the same, and storage medium
An inspection server receives a search condition for print logs accumulated in a print log database from an inspection client PC, and an associated log setting...
US-8,321,392 Pending state management for mobile business objects
A system, method, and computer program product are provided for invoking an operation to change a current data row of a table in a local database. As a result,...
US-8,321,387 Restricting access to sensitive data
Techniques are disclosed for managing execution of queries against databases and more particularly for restricting access to sensitive data in underlying...
US-8,321,373 Method of servicing query statements from a client machine using a database management system (DBMS) employing...
A method of serving query statements from one or more client machines using a database management system (DBMS) employing a relational data store and a...
US-8,321,358 Interpersonal relationships analysis system and method which computes distances between people in an image
An interpersonal relationships analysis method and system obtains an album comprising a plurality of photos, and recognize faces in each of the plurality of...
US-8,321,352 Fingerprinting for software license inventory management
Various techniques for software license inventory and asset management are disclosed. A fingerprint may be generated and associated with various copies of...
US-8,321,317 System and method for managing and evaluating network commodities purchasing
One or more price metrics are generated by retrieving, from a database, one or more price data sets representing a specified time period. Each of the retrieved...
US-8,321,257 Managing project schedule data using separate current and historical task schedule data
A project management system manages project schedule data using separate current and historical task schedule data structures. In general, current schedule data...
US-8,320,882 Method and apparatus for managing obfuscated mobile device user identities
A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an "enriched" identifier that exposes the...
US-8,320,716 Issuing a paper voucher for stored image data
A voucher data management system is provided. An image data generating section reads an original of a voucher to be copied and supplied to a user and generates...
US-8,320,651 Image reporting method and system
A method and system are provided to report the findings of an expert's analysis of image data. The method and system are based on a reporting system that forms...
US-8,320,414 Formation and rearrangement of lender devices that perform multiplexing functions
A method comprises establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two...
US-8,319,736 Touch sensitive computing device and method
Touch sensitive computing systems and methods are provided. The touch sensitive computing device may include a touch sensitive display configured to receive a...
US-8,317,093 Information providing system, apparatus and method for information processing, and computer program product
An information providing system includes the following elements. An IC card stores card ID. An information providing terminal reads out the card ID of the IC...
US-8,316,798 Individually mixed pet feed supply system
It used to be difficult to automatically mix--together with ordinary pet foods--nutrients and medications as additives based on a prescription from an animal...
US-8,316,417 Method for dynamic secure management of an authenticated relational table in a database
Method for the dynamic secure management of an authenticated relational table forming part of a database; the method comprises the following steps: store the...
US-8,316,182 Hierarchical storage management for database systems
In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage...
US-8,316,101 Resource management system for hosting of user solutions
Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration...
US-8,316,063 Data-driven database processor
Provided is a technique for a data-driven database which frees a user from having to be conscious of a sequence in which instructions of a program for accessing...
US-8,316,061 System, method and computer program product for managing and tracking technical events associated with...
A system for production which includes a database configured to store information about technical events and a server to provide centralized management of the...
US-8,316,053 Information processing apparatus and information processing method
A document management apparatus performs a first process to delete an object that is not to be presented to a user from document information registered in a...
US-8,316,051 Techniques for adding multiple security policies to a database system
Techniques for managing access to data in a database allow several policies to be applied simultaneously to the same row in a database table, and provide a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.