Match Document Document Title
US20140195802 PAGE ENCRYPTION SYSTEM  
Text containing files are encrypted by first formatting the files for display. The display-formatted files are then coded to form files indicating the information. The files are encrypted. The...
US20140068255 METHOD OF MANAGING MEDICAL INFORMATION IN OPERATING SYSTEM FOR MEDICAL INFORMATION DATABASE  
Provided is a method of managing medical information in an operating system for a medical information database, the method including encrypting, by a first user, medical information having patient...
US20120179908 SECURE PORTABLE MEDICAL INFORMATION SYSTEM AND METHODS RELATED THERETO  
Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will...
US20140258720 SYSTEMS AND METHODS FOR TRANSPARENT PER-FILE ENCRYPTION AND DECRYPTION VIA METADATA IDENTIFICATION  
A new approach is proposed that contemplates systems and methods to support encryption and decryption of files including data and source code associated with a software application running in a...
US20120191972 SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating...
US20120137130 System and Method for Providing Multi-Location Access Management to Secured Items  
A system and method for providing access management to secured items through use of a plurality of server machines associated with different locations are disclosed. According to one embodiment, a...
US20150026463 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE  
Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a...
US20130124861 SHIELDING A SENSITIVE FILE  
An apparatus for shielding a sensitive file includes a client computer having various units. An encryption-decryption unit performs a cryptographic operation on the sensitive file with a...
US20150180931 CONTENT DELIVERY METHODS AND SYSTEMS  
The present invention relates generally to systems and methods for delivering content from content providers to end users using computer networks. Aspects of the invention enable content providers...
US20140101438 STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM  
A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE...
US20140359283 INTERLOCKING APPLICATIONS AND FILES  
A file system monitoring layer is positioned between a virtual file system (VFS) encryption layer and a lower level file system layer. The file system monitoring layer stores a list of...
US20140181511 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE  
Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a...
US20150149771 BLOCK ENCRYPTION METHOD AND BLOCK DECRYPTION METHOD HAVING INTEGRITY VERIFICATION  
An encryption method and decryption method are provided. The encryption method divides an electronic file into a plurality of message blocks, wherein the message blocks have a sequence. The...
US20080162931 DIGITAL ASSET MANAGEMENT SYSTEM  
Access to a digital asset by a user may be controlled by encrypting the digital asset, embedding the encrypted digital asset in a file, providing a file viewer to the user, responding to a request...
US20140344572 SECURE CLOUD STORAGE AND SYNCHRONIZATION SYSTEMS AND METHODS  
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can...
US20140059344 FILE PROTECTION USING SESSION-BASED DIGITAL RIGHTS MANAGEMENT  
Systems and methods are provided for encrypting electronic files during a transfer to a low-security storage location is provided. In one embodiment, a method comprises receiving a file copy...
US20120159567 CONTEXTUAL ROLE AWARENESS  
The disclosed subject matter relates to an architecture that can provide contextual role awareness. For example, rather than focusing on features and functionality at the device level, features...
US20110213971 METHOD AND APPARATUS FOR PROVIDING RIGHTS MANAGEMENT AT FILE SYSTEM LEVEL  
An approach is presented for providing rights management at file system level. A virtual file system rights management application receives a request to access a protected file. The rights...
US20150244693 CLOUD AWARE FILE SYSTEM  
A virtual file system is described that is implemented in a virtualization platform as a stackable file system layer that intercepts file operations between a hypervisor and a physical file...
US20140075187 SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an...
US20150046706 System and Method for Controlling Access to Encrypted Files  
Disclosed are systems, methods and computer program products for controlling access to encrypted files. In one aspect, the system detects a request from an application to access an encrypted file....
US20150052354 DISTRIBUTED FRAGMENTS FILE SYSTEM  
The present invention relates to a distributed storage scheme, the distributed storage scheme, every file is encrypted, interleaved and fragmented, and the various fragments are stored on...
US20120278617 Method and System for Establishing a Trusted and Decentralized Peer-To-Peer Network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
US20110022839 Method and system for establishing a trusted and decentralized peer-to-peer network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
US20140325214 ENCRYPTION SOLUTION FOR PROTECTING FILE SYSTEMS IN MULTI-HOST CLUSTERS  
A method of managing file security in a cluster environment is provided. The method includes passing a request for a file from a secure file system layer to a secure volume manager layer and...
US20110138174 BROWSER SECURITY STANDARDS VIA ACCESS CONTROL  
A computing system is operable to contain a security module within an operating system. This security module may then act to monitor access requests by a web browser and apply mandatory access...
US20140351587 PROTECTING CRYPTOGRAPHIC SECRETS USING FILE SYSTEM ATTRIBUTES  
Techniques are disclosed for protecting cryptographic secrets stored locally in a device, such as a mobile phone. A client device creates or downloads a shared secret to be used in a server...
US20110238983 NETWORK INTEGRITY MAINTENANCE  
A device removal system securely removes an item of content or a device from a content-protected home network. An authorization table maintains a list of devices in the content-protected home...
US20110055931 METHOD AND APPARATUS FOR PROTECTING ACCOUNT NUMBERS AND PASSWORDS  
A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret...
US20050102506 Anti-piracy system  
A system for reducing piracy of protected digital content. An integrated module with public and private keys sends the public key along with a request for content to a transaction manager. The...
US20150006889 ACADEMIC QUIZ-PACK SUITE ADMINISTRATION BASED ON DIGITAL RIGHTS MANAGEMENT SERVICE  
A method for managing access and use of quiz-packs by users of course-packs which may are accessed and displayed by a client application, comprising the steps of establishing a database with...
US20140331043 ELECTRO DEVICE FOR PROTECTING USER'S PRIVACY AND METHOD FOR CONTROLLING THEREOF  
A method of controlling a first electronic device to acquire content in cooperation with a second electronic device is provided. The method includes performing a mutual authorization, acquiring...
US20110029435 SYSTEMS AND METHODS FOR DISTRIBUTING ELECTRONIC CONTENT  
A system for distributing electronic content may include a content repository including one or more electronic content items. The content repository may be in communication with one or more...
US20110179143 STORAGE SYSTEM SUPPORTING REPLACEMENT OF CONTENT IN A STORAGE DEVICE  
A file replacement system includes a storage device, a host, and a server. In a file replacement transaction one or more files that are stored in the storage device are replaced in the storage...
US20150039886 SECURE APPLICATION ACCESS SYSTEM  
A proxy server creates an index of keywords, receives at least a portion of a file, and, when a keyword in the index is encountered in the at least a portion of the file as the at least a portion...
US20140129831 Computer-Implemented System And Method For Individual Message Encryption Using A Unique Key  
A computer-implemented system and method for individual record encryption is provided. A plurality of records associated with incoming calls to a call center are maintained. A unique encryption...
US20150100781 CONTENT GATHERING USING SHARED KEY  
The gathering of content (such as a file) from a variety of different sources. Rather than provide the whole content, a given one of the sources instead provides only a portion of the information...
US20130080772 DYNAMIC ENCRYPTION  
Systems and methods for encrypting a media file for streaming and/or downloading over a network are disclosed. These systems and methods may be part of a larger media servicing network that can be...
US20140208102 METHOD OF PROTECTING DIGITAL INFORMATION  
The method provides encoding digital information by assigning encoding values from a plurality of collectives of encoding values to the message symbols. The collectives are unbound from each...
US20130179684 ENCRYPTED DATABASE SYSTEM, CLIENT TERMINAL, ENCRYPTED DATABASE SERVER, NATURAL JOINING METHOD, AND PROGRAM  
A client terminal is provided with a column encryption unit that, from an encryption key, a table identifier, and a column identifier, generates a column private key, a column public key, and a...
US20140258719 DISTRIBUTED ENCRYPTION AND ACCESS CONTROL SCHEME IN A CLOUD ENVIRONMENT  
System, computer readable medium and method for decryption. The method may include receiving, by a third computerized system and from a fourth computerized system, a first encrypted file entity...
US20140281521 Method, System, Network Server And Storage Medium For Anonymous Dating  
In a method, system, network server and storage medium for anonymous dating, the system obtains dating information transmitted by a dating information sender; encrypts an account of the dating...
US20140372750 CLIENT-SIDE ENCRYPTION  
Methods and systems of encrypting files at a client in a cloud-based file system are provided. A first key corresponding to an organization to which the client belongs is obtained. Then a first...
US20140068254 UPLOAD AND DOWNLOAD STREAMING ENCRYPTION TO/FROM A CLOUD-BASED PLATFORM  
Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption...
US20120210126 DOCUMENT ENCRYPTION AND DECRYPTION  
A document encryption and decryption system and method for selectively encrypting and decrypting files and attachments, electronic mail, text messages, and any other items to protect or secure its...
US20110258438 System and Method for Providing Different Levels of Key Security for Controlling Access to Secured Items  
With files secured by encryption techniques, keys are often required to gain access to the secured files. Techniques for providing and using multiple levels of keystores for securing the keys are...
US20140013113 SECURE NON-INVASIVE METHOD AND SYSTEM FOR DISTRIBUTION OF DIGITAL ASSETS  
A client computer system receives a file that is at least partially encrypted. The client computer also receives a file manager and user input. In response to the user input matching data stored...
US20120204028 Secure Kerberized Access of Encrypted File System  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
US20110154031 Secure Kerberized Access of Encrypted File System  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
US20110314276 Communication verification system  
A communication system verifying the source of a file. The system uses a first link between a sending computer and an authorizing computer which contains a request for a PIN associated with the...