Matches 1 - 50 out of 127 1 2 3 >


Match Document Document Title
US20140181530 System and Method for Protecting Cloud Services from Unauthorized Access and Malware Attacks  
Disclosed are systems, methods and computer program products for protecting cloud security services from unauthorized access and malware attacks. In one example, a cloud server receives one or...
US20130111216 METHOD AND APPARATUS FOR INCREMENTAL CODE SIGNING  
The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an...
US20140208100 PROVISIONING AN APP ON A DEVICE AND IMPLEMENTING A KEYSTORE  
A keystore is installed on a mobile app where the keystore is created and provisioned on a server, such as an app wrapping server, under the control of an enterprise. A generic (non-provisioned)...
US20050039028 E-mail security system  
E-mail security systems are provided. A representative system, among others, includes an e-mail client. A representative e-mail client, among others, includes a message composition logic and a...
US20140006796 SYSTEM AND METHOD FOR IDENTIFYING SOFTWARE CHANGES  
An enterprise trust server (ETS) can include a user interface configured to initiate generation of a first file signature associated with a first file accessed from a file system associated with a...
US20110055587 Alert options for electronic-paper verification  
A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The...
US20120166811 System and Method for Efficiently Detecting Additions and Alterations to Individual Application Elements for Multiple Releases of Applications in the Environments where the Applications can be Altered  
Systems, methods and computer readable media for detecting customization of an application running on a customer's environment are described. An application's original source can maintain a master...
US20140108812 SYSTEM AND METHOD ENABLING PARALLEL PROCESSING OF HASH FUNCTIONS USING AUTHENTICATION CHECKPOINT HASHES  
Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a...
US20150113284 METHOD AND APPARATUS FOR PROTECTING APPLICATION PROGRAM  
An application creating apparatus generates first authentication information using an authentication element is provided. The apparatus includes an application module when the application module...
US20110087892 Eliminating False Reports of Security Vulnerabilities when Testing Computer Software  
A system for eliminating false reports of security vulnerabilities when testing computer software, including a taint analysis engine configured to identify a tainted variable v in a computer...
US20150205949 RUNTIME APPLICATION INTEGRITY PROTECTION  
Systems, methods, apparatuses, and computer program products are described for checking the integrity of applications installed on a computing device and preventing the launch of applications that...
US20080092235 Trustable communities for a computer system  
A trustable community for a computer system includes multiple software components that have security interdependence. A trustable community attempts to stop malware from compromising one software...
US20130111215 SOFTWARE SELF-CHECKING SYSTEMS AND METHODS  
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running....
US20110302424 Software Self-Checking Systems and Methods  
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running....
US20130290729 SYSTEMS AND METHODS FOR CONTROLLING FILE EXECUTION FOR INDUSTRIAL CONTROL SYSTEMS  
A system includes a controller configured to control a process, and store at least one binary file, wherein the at least one binary files is generated from at least one source file, wherein the at...
US20080256363 Trusted component update system and method  
A trusted component update system comprises verify logic configured to validate integrity of an update to a trusted component of a computing device, and logic disposed in the trusted component and...
US20150186676 REAL-TIME CLOCK (RTC) MODIFICATION DETECTION SYSTEM  
A system for securing a real-time clock (RTC) of an electronic device includes a RTC counter that counts clock pulses of a RTC signal generated by a crystal oscillator, and a reference-time...
US20080077800 Persistent security system and method  
A persistent security system comprises a computing system comprising an operating system (OS), a basic input/output system (BIOS) and a hard disk drive (HDD), the OS configured to initiate a call...
US20140304520 DETECTION OF SECURE VARIABLE ALTERATION IN A COMPUTING DEVICE EQUIPPED WITH UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT FIRMWARE  
A firmware-based mechanism for protecting against physical attacks on ROM areas holding Authenticated Variables. A first hash of contents of at least one Authenticated Variable is created by a...
US20150033031 System and Method for Detecting a Security Compromise on a Device  
Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content...
US20140040630 SYSTEM AND METHOD FOR DETECTING A SECURITY COMPROMISE ON A DEVICE  
Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content...
US20100095129 COMPUTER PROGRAM INTEGRITY VERIFICATION  
A system and method are disclosed that can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary...
US20100083001 Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor  
Various approaches for extracting client's data from a storage provider are presented. In one approach, an auditor is initialized with a verification data set that confirms that an initial version...
US20110213986 Method for Activating Content and Content Reproduction Apparatus  
A firmware verification section verifies whether a firmware for controlling the activating of contents has been falsified or not, prior to the activating of the contents; a decoding key setting...
US20060236122 Secure boot  
Systems and methods for performing integrity verifications for computer programs to run on computing systems are provided. An integrity check is completed before passing execution control to the...
US20050005101 Kernel cryptographic module signature verification system and method  
A computer operating system having a kernel with a kernel module signature verification unit is described herein. The kernel module signature verification unit automatically monitors kernel module...
US20120079279 Generation of SW Encryption Key During Silicon Manufacturing Process  
A method of generating an encryption key during the manufacturing process of a device includes randomly generating a seed, encrypting a unique identifier disposed in the device to obtain a first...
US20070245159 Hash function strengthening  
Systems, methods, media, and other embodiments associated with hash functions are described. One example system embodiment includes logic for computing a first hash for a first data set, logic for...
US20090132829 INFORMATION PROCESSOR, METHOD FOR VERIFYING AUTHENTICITY OF COMPUTER PROGRAM, AND COMPUTER PROGRAM PRODUCT  
A disc stores therein a computer program and encrypted information. A BIOS is executed at the time of start-up and starts the computer program. A TPM is connected to the BIOS by a low-speed bus....
US20150160939 SYSTEM AND METHOD FOR MODIFYING A SOFTWARE DISTRIBUTION PACKAGE WITHOUT RECALCULATING DIGITAL SIGNATURES  
Disclosed are systems, methods and computer program products for modifying a software distribution package. An example method includes receiving a software distribution package that including one...
US20100115283 SYSTEMS AND METHODS FOR USING CRYPTOGRAPHY TO PROTECT SECURE AND INSECURE COMPUTING ENVIRONMENTS  
Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying...
US20130124871 APPLICATION EXECUTION SYSTEM AND METHOD OF TERMINAL  
An application execution system and a method for executing applications, at a terminal, with security check on the application package are provided. The system includes an application creator...
US20060015746 Method for authenticating and executing a program  
Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated...
US20090113210 Program and operation verification  
A security module may be used to verify integrity of an executable program and may also be used to verify execution of the executable program on a computer. The security module may directly read a...
US20110231668 Signed Manifest for Run-Time Verification of Software Program Identity and Integrity  
A measurement engine performs active platform observation. A program includes an integrity manifest to indicate an integrity check value for a section of the program's source code. The measurement...
US20070283166 System and method for state transition intrusion detection  
A system and method for state transition intrusion detection is provided. The system and method employ a state transition file, containing a listing or table of all available state transitions...
US20150199518 IMAGE FORMING APPARATUS THAT PERFORMS UPDATE OF FIRMWARE, AND CONTROL METHOD THEREFOR  
An image forming apparatus which is capable of properly updating firmware. Update firmware is downloaded into a download area of an HDD and expanded and stored in a temporary expansion area of the...
US20130238904 PROTECTION AGAINST SIDE CHANNEL ATTACKS WITH AN INTEGRITY CHECK  
The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are...
US20080104402 Countermeasure against fault-based attack on RSA signature verification  
Methods and apparatuses enable countermeasures to obstruct a fault-based attack on an authentication procedure. A digital message M, a signature S, and a modulus N are received, where the...
US20080235517 Update System for Cipher System  
There is a demand for a device handling information with the use of encryption technology to safely and simply update the encryption schemes. The present invention offers an information security...
US20080148060 Maintaining Code Integrity in a Central Software Development System  
A central software development system comprises a code processor and a code authenticator. The code processor converts modified free source code received by the system to program code such as...
US20080046755 System and Method for Interapplication Communications  
A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program...
US20080082833 Secure firmware execution environment for systems employing option read-only memories  
A method for providing a secure firmware operating environment includes detecting the presence of a new component, for example, a peripheral device. Next, a determination is made as to whether the...
US20050114684 Contents use frequency limiting method, contents using terminal apparatus, contents using system, computer program and computer readable memory medium  
In a terminal device utilizing contents-having a limitation in the use frequency, an encrypted electronic file containing the contents is decrypted, then the decrypted electronic file is...
US20050154899 Mobile software authentication and validation  
Methods for encoding and validating a computer program are disclosed. A program is encoded by transforming the program using a canonical transform based at least in part on a partitioning...
US20070204165 Techniques for digital signature formation and verification  
Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with...
US20080052533 RELAY APPARATUS FOR ENCRYPTING AND RELAYING A FRAME  
A relay apparatus comprises a frame relay processing unit for relaying a frame, a plurality of ports for sending and receiving the frame to and from the outside, and a cryptographic processing...
US20080010466 Digital identifier chaining  
This invention provides a means for insuring data security and confidence in a recorded sequence of data that includes video, audio and meta-data through the use of digital signatures. The digital...
US20070198851 SECURE PROCESSOR  
A secure hardware comprises a secure pipe, a secure DMA, a secure assist and a secure bus, which connects between those blocks. The secure pipe stores a common encryption key in an encryption key...
US20130036310 LOW-LEVEL CODE SIGNING MECHANISM  
Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as...

Matches 1 - 50 out of 127 1 2 3 >