Match Document Document Title
US20150220746 ENCRYPTED DATA STORE FOR RECORDS  
A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record...
US20110047054 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20140164792 Securing Encrypted Virtual Hard Disks  
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an...
US20120297206 Securing Encrypted Virtual Hard Disks  
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an...
US20110191598 DOCK FOR A PORTABLE HARD DISK AND A METHOD FOR ACCESSING CONTENT ON A HOST DEVICE USING THE DOCK  
There is provided a first dock for a portable hard disk, where the first dock is connectable to a host device. There is also provided a corresponding method for accessing content on the host...
US20070283168 Program, classification method and system  
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected...
US20150039908 System and Method for Securing A Credential Vault On A Trusted Computing Base  
A method for utilizing a secure credential vault on a mobile computing device includes: prompting a user for and receiving from the user a credential vault password; prompting a user for and...
US20120324244 KIOSK DISTRIBUTION OF LICENSED CONTENT TO PORTABLE DEVICE WITHIN DVD AVAILABILITY WINDOW  
A system and method are disclosed for kiosk distribution of licensed content to one or more portable devices. The system stores and distributes licensed content in such a manner as to be...
US20100318798 MESSAGE HANDLING AT A MOBILE DEVICE  
A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with...
US20110307709 MANAGING SECURITY OPERATING MODES  
A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by...
US20150220756 CRYPTOGRAPHIC METHOD AND SYSTEM OF PROTECTING DIGITAL CONTENT & RECOVERY OF SAME THROUGH UNIQUE USER IDENTIFICATION  
A computer-implemented method and related system controls access to protected content with certificate-based access authorization. Protected content stored in a memory of a computer is enciphered...
US20080148068 Storage Media to Storage Drive Centric Security  
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage media and associated with data...
US20140006789 DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG  
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored...
US20150089247 STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF  
A security method based on a memory unit for a user is provided. The security method includes receiving, from a server, a security code including a security service command for the user terminal...
US20090164804 SECURED STORAGE DEVICE  
A method of preventing unauthorized access to digital content includes obtaining from a trusted entity a public key of a public-private key pair, encrypting content being received by a storage...
US20150220754 Document Security in Enterprise Content Management Systems  
Methods for enhancing the security of content in a records management system. A document is received to be stored as a record in the records management system. A unique combination of an...
US20100318807 SYSTEM AND METHOD FOR GENERATING A DISGUISED PASSWORD BASED ON A REAL PASSWORD  
A system and method for generating a disguised password are provided. The method presets a real password via an input device, selects one or more characters from the real password as a...
US20130145179 Corralling Virtual Machines With Encryption Keys  
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more...
US20130111221 STORAGE SYSTEM AND ITS MANAGEMENT METHOD  
A plurality of storage devices with different functions and storage pools with different attributes are automatically associated with each other. A controller: divides a plurality of storage...
US20090150682 Third Party Secured Storage for Web Services and Web Applications  
A system and method for providing third party secure hosting of an application. The system and method includes providing a host system with a main memory and a third party secured memory, the...
US20110055593 METHOD AND APPARATUS FOR PROTECTING ACCOUNT NUMBERS AND PASSWORDS  
A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret...
US20150205968 SHARED PREFERENCES IN A MULTI-APPLICATION ENVIRONMENT  
Various aspects of the subject technology relate to a system configured to store preferences in a file that is accessible to other applications on a computing device. The preferences stored in the...
US20110055582 HASH FUNCTION USING A DOMINO GAME PROCESS  
In the computer data security field, cryptographic hash function processes are embodied in a computer system and may be keyless, but are highly secure. The processes are based on the type of...
US20150193599 MULTIPLE CONTENT PROTECTION SYSTEMS IN A FILE  
Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file....
US20140089684 METHOD AND APPARATUS FOR PROTECTING FILE  
Embodiments of the present invention provide a method and a system for protecting a file, which belong to the field of information security. The method includes: replacing a secure file header of...
US20140164790 STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING  
Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to host a plurality of volumes, each...
US20070074292 Management of encrypted storage networks  
A system and technique for managing security in storage networks is provided. A management server searches the storage system and compiles information about security in the system, including...
US20140331063 Disrupting Password Attack Using Compression  
Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using...
US20090300371 SEMICONDUCTOR INTEGRATED DEVICE AND METHOD OF TESTING SEMICONDUCTOR INTEGRATED DEVICE  
According to one embodiment, a semiconductor integrated device which stores secret data and is capable of operating in a test mode in which a scan test with respect to an internal circuit is...
US20140351606 POLICY DRIVEN CLOUD STORAGE MANAGEMENT AND CLOUD STORAGE POLICY ROUTER  
Techniques are disclosed for a policy driven cloud storage management broker and a cloud storage policy router, along with methods for registering tenant applications with the cloud storage...
US20090150684 ANTI-ATTACKING METHOD FOR PRIVATE KEY, CONTROLLER, STORAGE DEVICE AND COMPUTER READABLE RECORDING MEDIUM HAVING THE SAME  
An anti-attacking method for a private key is provided. The method includes using a plurality of storage areas for storing the same security information. The method also includes selecting one of...
US20060179326 Security device using multiple operating system for enforcing security domain  
A security device using multiple operating systems for enforcing security domain policies is provided. The device is installed in a computing device having a hard disk drive and allows multiple...
US20150215120 Storage Encryption  
Storage associated with a virtual machine or other type of device may be migrated between locations (e.g., physical devices, network locations, etc.). To maintain the security of the storage, a...
US20080114992 Interoperable Digital Rights Management  
The subject matter disclosed herein relates to a method and/or system for enabling access to media content using different digital rights management formats.
US20080162948 Digital Information Storage System, Digital Information Security System, Method for Storing Digital Information and Method for Service Digital Information  
Provided is a digital information storage system, a digital information security system, and a digital information storing method, and a digital information providing method, and more...
US20130067242 MANAGING SELF-ENCRYPTING DRIVES IN DECENTRALIZED ENVIRONMENTS  
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple...
US20090327757 Computer system for managing storage area state of a storage system  
There is provided a computer system, having a host and at least one storage system. The at least one storage system provides storage area includes at least one of an encrypted storage area and a...
US20090199016 Storage system, and encryption key management method and encryption key management program thereof  
A user no longer needs to restore key information upon restoring data. Proposed is a storage system having a storage apparatus, a tape library apparatus for backing up data stored in the storage...
US20110040975 SYSTEM AND METHOD FOR CONTROLLED COPYING AND MOVING OF CONTENT BETWEEN DEVICES AND DOMAINS BASED ON CONDITIONAL ENCRYPTION OF CONTENT KEY DEPENDING ON USAGE STATE  
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use...
US20050257072 Credential roaming  
Implementations are described and claimed herein to enable credential roaming among a plurality of different computing devices. An exemplary system may include an event handler to receive event...
US20150229476 SELECTIVE SHREDDING IN A DEDUPLICATION SYSTEM  
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
US20090013194 TECHNIQUE FOR PROTECTING A DATABASE FROM AN ONGOING THREAT  
A system for stopping an ongoing threat to a database is described. During operation, if an ongoing threat to the database is detected, the system modifies a threat-assessment condition. Then, the...
US20070157032 Method for enabling an administrator to configure a recovery password  
A method is provided for a enabling a user to initiate a password protected backup copy of the user's credentials. The method includes providing a user with a credential store containing...
US20070016804 PASSWORD MANAGEMENT SYSTEM  
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion...
US20110185191 ELECTRONIC BOOK ELECTRONIC LINKS  
The invention, an electronic book selection and delivery system, is a new way to distribute books and other textual information to bookstores, libraries and consumers. The primary components of...
US20110019820 COMMUNICATION CHANNEL CLAIM DEPENDENT SECURITY PRECAUTIONS  
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication...
US20070079143 Secure recoverable passwords  
A method and apparatus are disclosed that enable a user who forgets one of his two passwords to securely recover the forgotten password. After a user logs in using one of his two passwords, the...
US20140136856 SYSTEM AND METHOD FOR UPDATING FIRMWARE  
A mechanism that allows firmware for a computing device to be updated in a secure manner by utilizing an update validation procedure included in a ROM image is discussed.
US20110004770 ENCRYPTION SYSTEM THAT PREVENTS ACTIVATION OF COMPUTER VIRUSES  
System for preventing activation of computer viruses operates in such a way that all executable files must be kept separated from other files and encrypted when written to Hard Disk Drive or Solid...
US20050278552 Secure virtual account  
The invention relates to a method for storing data or a hierarchic folder structure on a selected number of computers and/or intelligent devices having storage capacity in a community of computers...