Matches 1 - 50 out of 197 1 2 3 4 >


Match Document Document Title
US20130173917 SECURE SEARCH AND RETRIEVAL  
A method and apparatus is disclosed herein for secure search and retrieval. In one embodiment, the method comprises receiving an encrypted, permuted search tree with nodes that have been permuted...
US20120137130 System and Method for Providing Multi-Location Access Management to Secured Items  
A system and method for providing access management to secured items through use of a plurality of server machines associated with different locations are disclosed. According to one embodiment, a...
US20140115331 Secure Information Transfer Via Bar Codes  
A method for providing a document using a secure bar code includes encrypting the document to generate an encrypted document, and mixing together bits for a security credential with bits for the...
US20140372753 METHOD AND APPARATUS FOR PERFORMING DISTRIBUTED PRIVACY-PRESERVING COMPUTATIONS ON USER LOCATIONS  
A location-trace comparison system can perform privacy-preserving computations on locations traces for two or more users, for example, to determine a location-visit overlap for these users. During...
US20150227757 SYSTEM AND METHOD FOR DISTRIBUTED DEDUPLICATIONOF ENCRYPTED CHUNKS  
The present disclosure relates to an advantageous system and related methods for distributed deduplication of encrypted chunks. One embodiment relates to a method for storing encrypted chunks in...
US20140025948 SYSTEM AND METHOD FOR DISTRIBUTED DEDUPLICATION OF ENCRYPTED CHUNKS  
The present disclosure relates to an advantageous system and related methods for distributed deduplication of encrypted chunks. One embodiment relates to a method for storing encrypted chunks in...
US20130275752 METHOD AND SYSTEM FOR SECURE MULTIPARTY CLOUD COMPUTATION  
One embodiment of the present invention provides a system for performing secure multiparty cloud computation. During operation, the system receives multiple encrypted datasets from multiple...
US20140344574 ECONOMICALLY SECURE DIGITAL MASS MEDIA SYSTEMS  
Content is encoded with a watermark that associates it with a particular consumer. When presented for playback, the rendering equipment examines the watermark to confirm that the consumer with...
US20140304507 CONTENT DELIVERY NETWORK ENCRYPTION  
A system and method for delivering content to end users encrypted within a content delivery network (CDN) for content originators is disclosed. CDNs transport content for content originators to...
US20130254540 SYSTEM AND METHOD FOR ACCESSING INFORMATION RESOURCES USING CRYPTOGRAPHIC AUTHORIZATION PERMITS  
A system and method for securing information associates a party with a node that communicates messages over one or more channels based on a channel access privilege. One or more authorities sign a...
US20110197062 METHOD AND SYSTEM FOR LICENSE MANAGEMENT  
Embodiments of the invention relate to methods, apparatus and systems, including computer program products for license management in one or more computer systems. A first computer runs a master...
US20130097421 Protecting Information Using Policies and Encryption  
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with...
US20130311775 METHOD AND SYSTEM FOR UNIFIED MOBILE CONTENT PROTECTION  
Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server...
US20150205940 METHOD FOR CONTROLLING ONLINE PREVIEWING OF E-BOOK PAGE  
Disclosed is a method for controlling online previewing of an e-book page, comprising the following steps of: encrypting, on a server end, an e-book based on content, and establishing an index...
US20100199088 Method and System For Securing Digital Assets Using Process-Driven Security Policies  
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt...
US20100178033 ENHANCED CONTENT RESOLUTION METHOD  
A method of providing automatically verifiable trust in a content resolution process in which a PDR resolves a content reference identifier (CRID) identifying a content item using a resolution...
US20080086757 CONTENT PROTECTION INTEROPERABILITY INFRASTRUCTURE  
Interoperability of protected content items between computing devices is facilitated by providing content items having a standard representation, and media players having support for the content...
US20080148049 Secure access of resources at shared appliances  
An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being...
US20140380046 COLLABORATIVE STREAMING SYSTEM FOR PROTECTED MEDIA  
The present disclosure is directed to a collaborative streaming system for protected media. A presentation device may interact with a group of trusted devices over a network to stream multimedia...
US20080046725 Fast system call method  
A method of a fast system call is provided. First, a logical operation to compute a kernel service routine is used. Then the logical operation result is compared with ciphertext from a key...
US20080126800 METHODOLOGIES TO SECURE INTER-PROCESS COMMUNICATION BASED ON TRUST  
A system securing inter-process communication (IPC) based on trust includes a user quota mechanism to provide resource management of IPC's. A single user is allowed to allocate a fixed amount of...
US20140115332 SECURE SHARING AND COLLABORATIVE EDITING OF DOCUMENTS IN CLOUD BASED APPLICATIONS  
Collaboratively editing a document in a system of sharee clients includes creating a document change, generating a document token for encrypting the document change, encrypting the document change...
US20080016372 METHOD, APPARATUS, AND PROGRAM PRODUCT FOR REVEALING REDACTED INFORMATION  
A selectively encrypted data unit includes an encrypted version of sensitive information (capable of being decrypted to reveal the sensitive information), a plurality of auxiliary values, and an...
US20070083756 Method for verifying rights contained in a security module  
A method of verification of rights is disclosed, contained in a security module associated to an apparatus processing broadcasted digital data. The apparatus is connected to a management center...
US20120027213 Method And Apparatus For Remotely Provisioning Software-Based Security Coprocessors  
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system....
US20070256133 BLOCKING PROCESSES FROM EXECUTING BASED ON VOTES  
In an embodiment, in response to detecting that a process is attempting to execute at the client, a vote for the process is requested from a user if the user has not yet provided a vote. In...
US20130227282 METHOD FOR SYNCHRONOUS ENCRYPTION BETWEEN A CLIENT AND A LICENSING AGENT  
A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass...
US20090119507 Reference Monitor for Enforcing Information Flow Policies  
A reference monitor that authorizes information flows between elements of a data processing system is provided. The elements of the data processing system are associated with security data...
US20090249067 System and Method for Pre-Placing Secure Content on an End User Storage Device  
A system and method for pre-placing content from a provider on an end user storage device is described. The system includes a device connected to an end user network and a public network and used...
US20070143839 Access Unit Switching Through Physical Mediation  
A plurality of access units may be established with varying levels of privilege and access rights, such that the user may perform tasks carrying with them a high risk of viral infection in an...
US20120030464 SECRET SHARING SYSTEM, SHARING APPARATUS, SHARE MANAGEMENT APPARATUS, ACQUISITION APPARATUS, PROCESSING METHODS THEREOF, SECRET SHARING METHOD, PROGRAM, AND RECORDING MEDIUM  
A secure secret sharing system is implemented. Shares SH(α, h(α)) are generated by secret sharing of secret information separately for each subset SUB(α); each of share management apparatuses...
US20100250927 INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION  
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich...
US20080098485 HYBRID META-DIRECTORY  
Exemplary embodiments provide a method and system for providing a hybrid meta-directory for recording a grant of privileges. In one embodiment method and system aspects of the exemplary embodiment...
US20150199498 FLEXIBLE AND EFFICIENT SIGNALING AND CARRIAGE OF AUTHORIZATION ACQUISITION INFORMATION FOR DYNAMIC ADAPTIVE STREAMING  
A robust encryption key management system for protecting content of a media content provider, the media content provider utilizing signaling fields in Media Presentation Description (MPD) files to...
US20070150933 Combining communication policies into common rules store  
A method for applying a common communication policy over at least two user groups of an organization. The method receives a communication request to transmit a communication between a sender user...
US20060212700 Method for processing network selection information for a user terminal in a wireless local area network  
The present invention discloses a method for processing network selection information for a user terminal in wireless local area network (WLAN). When a WLAN user terminal accesses a wireless...
US20080046726 Assessing a community of particle capability  
The capability level of a community of practice is assessed. A community model is provided having key areas of focus each defined by levels. The levels have attributes. The community is compared...
US20070271618 SECURING ACCESS TO A SERVICE DATA OBJECT  
Methods, systems, and computer program products are disclosed for securing access to a service data object that include providing a service data object having an embedded security policy, and...
US20080034438 MULTIPLE HIERARCHY ACCESS CONTROL METHOD  
A method for controlling access of a principal to a plurality of resources is disclosed. The method includes organizing each of the plurality of resources such that they are capable of...
US20120290837 Method and system for secured management of online XML document services through structure-preserving asymmetric encryption  
A system and method for encrypting/decrypting a document is provided. The encryption method includes encrypting portions within the document containing structural information with an asymmetric...
US20080016580 Role-based access in a multi-customer computing environment  
An actor is associated with a role, a policy type is associated with the role, and a role scope is associated with the role. One or more values are received for one or more corresponding context...
US20060020790 Authorization using ciphertext tokens in a content receiver  
According to the invention, a method for securing a plaintext object within a content receiver is disclosed. In one step, a secure portion of a secure object and a plaintext remainder of the...
US20090240937 SEPARATED STORAGE OF DATA AND KEY NECESSARY TO ACCESS THE DATA  
A novel approach introduces an extra layer of data security by storing files and the keys required to access the files separately. When the files are being accessed, the host of the files sends a...
US20100037051 METHOD FOR SHARING RIGHTS OBJECTS BETWEEN USERS  
Provided is a method for delivering all or part of a rights object (RO) of a user associated with the content to other users. The method includes creating a rights object to be transmitted to a...
US20070186102 Method and apparatus for facilitating fine-grain permission management  
One embodiment of the present invention provides a system that facilitates fine-grain permission management and delegated policy administration. During operation, the system creates a permission...
US20070199075 Method of and device for generating authorization status list  
A method of generating an authorization status list, comprising generating a run-length encoded representation of an authorization status of a number of devices and storing the representation in...
US20060218394 Organizational role-based controlled access management system  
An Organizational Role-based Access Controlled Management System capable of controlling role-based access within an organization allows system analysts or managers to build and control access...
US20060179303 Network security  
A network (11) including a plurality of devices (A . . . F), each device being capable of wireless communication with the other devices of the network. One of the devices (C) includes...
US20080104708 Comprehensive security architecture for dynamic, web service based virtual organizations  
A comprehensive security architecture for a virtual organization (VO) is disclosed. The comprehensive security architecture uses the same security mechanism or substantially similar security...
US20060277594 Policy implementation delegation  
The present invention allows a user (e.g., a policy implementer) to be identified and delegated responsibility for implementing a policy. This can occur, implicitly, semi-implicitly or explicitly....

Matches 1 - 50 out of 197 1 2 3 4 >