1
Daniel Y Fung, Brandon C Hood: Method, system and computer readable medium for web site account and e-commerce management from a central location. Passgate Corporation, Carlos R Villamar, Nixon Peabody, April 12, 2005: US06879965 (200 worldwide citation)

A method, system and computer readable medium for, from a central Web site, performing at least one of registering a user at a destination Web site, logging in a user at a destination Web site and managing an online financial transaction at a destination Web site, including parsing a form Web page o ...


2
Daniel Y Fung, Stephen C Evans: Method, system and computer readable medium for web site account and e-commerce management from a central location. Passgate Corporation, Carlos R Villamar, The Villamar Firm PLLC, January 4, 2011: US07865414 (90 worldwide citation)

A method, system, and computer readable medium for managing a financial transaction of a user at a merchant, including authenticating the user via a device of the user while the user is at the merchant; transmitting activation information for activating a reusable, pre-existing, unaltered and perman ...


3
Matthew George Tyler: Online gaming cheating prevention system and method. Matthew George Tyler, Carlos R Villamar, Nixon Peabody, January 30, 2007: US07169050 (81 worldwide citation)

A method, system, and software for preventing cheating during online gaming on a first computer system, include receiving information regarding cheaters detected during online gaming gathered by a second computer system; and making the received information available to the first computer system. Adv ...


4
Victor I Sheymov, Roger B Turner: Systems and methods for communication protection. Invicta Networks, Carlos R Villamar, Nixon Peabody, June 26, 2007: US07236598 (73 worldwide citation)

A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are ...


5
Guillermo Lao, Rory Jacobs, Mai Nguyen, Manuel Ham, Vincent Tieu: Method and apparatus for managing digital content usage rights. ContentGuard Holdings, Marc S Kaufman, Carlos R Villamar, Nixon Peabody, August 1, 2006: US07085741 (63 worldwide citation)

A method and an apparatus for specifying and editing rights associated with a content includes a general model that comprehends rights specification at different levels of the content life cycle. The rights specification includes content association, and the protection of the content is a byproduct ...


6
Victor I Sheymov: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. INVICTA Networks, Carlos R Villamar, Nixon Peabody, December 27, 2005: US06981146 (46 worldwide citation)

The intrusion protection method and system for a communications network provides address agility wherein the cyber coordinates of a target host are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit which generates a random seq ...


7
Mark J Stefik, Peter L T Pirolli: Composite digital works having usage rights and method for creating the same. ContentGuard Holdings, Marc S Kaufman, Carlos R Villamar, Nixon Peabody, September 26, 2006: US07113912 (44 worldwide citation)

A method for creating a composite digital work having usage rights and composite digital works having usage rights. The method comprises creating a digital content portion of a composite digital work including a plurality of content parts, and creating a description structure for the composite digit ...


8
Victor I Sheymov, Roger B Turner: Systems and methods for distributed network protection. Invicta Networks, Carlos R Villamar, Nixon Peabody, March 27, 2007: US07197563 (41 worldwide citation)

By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographi ...


9
Michael Charles Raley: Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine. Contentguard Holdings, Marc S Kaufman, Carlos R Villamar, Nixon Peabody, July 4, 2006: US07073199 (40 worldwide citation)

A system and method is disclosed for the secure distribution and consumption of electronic documents using a standard rendering engine. The documents have usage rights associated therewith. A server stores the documents in computer readable form. A user operates a client having a standard applicatio ...


10
Amit Ramchandran, John Reid Hauser Jr: Low power, high performance, heterogeneous, scalable processor architecture. 3Plus1 Technology, Carlos R Villamar, May 18, 2010: US07721069 (33 worldwide citation)

One embodiment of the present includes a heterogenous, high-performance, scalable processor having at least one W-type sub-processor capable of processing W bits in parallel, W being an integer value, at least one N-type sub-processor capable of processing N bits in parallel, N being an integer valu ...