Match Document Document Title
US20140075197 METHOD FOR SELECTIVE SOFTWARE ROLLBACK  
A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software...
US20130283072 ALARM-BASED POWER SAVING MODE FOR AN ELECTRONIC DEVICE  
This disclosure relates to an alarm-based power saving mode and associated system implemented on a device for a microprocessor or a telematics circuitry, and more particularly, to an alarm and...
US20120324254 DRAWING POWER OVER NETWORK CABLE  
A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source...
US20140082350 SECURITY CREDENTIAL DEPLOYMENT IN CLOUD ENVIRONMENT  
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a...
US20150149762 Method and Apparatus for Unified Encrypted Messaging  
A unified encrypted messaging system transmits messages from a first computer to a second computer by dividing the encrypted message into a plurality of encrypted message fragments. A first...
US20120179908 SECURE PORTABLE MEDICAL INFORMATION SYSTEM AND METHODS RELATED THERETO  
Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will...
US20100122090 Secure Bytecode Instrumentation Facility  
A secure bytecode instrumentation facility, wherein a new code fragment is registered in an encrypted registry by first extracting a digital certificate from a specified code fragment location. A...
US20140258733 ROOTS-OF-TRUST FOR MEASUREMENT OF VIRTUAL MACHINES  
Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual...
US20110047389 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20110047054 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20120005495 PORTABLE POWER SUPPLY DEVICE WITH OUTLET CONNECTOR  
One or more embodiments include an outlet interface that is configured to mate with an electrical outlet. The outlet interface is provided as an integral structure of the housing.
US20120151234 METHOD AND APPARATUS FOR MESSAGE HANDLING DURING POWER SAVING MODES  
A method for implementing a sleep control that includes the steps of receiving a message from a sending block via a messaging bus, wherein the message is destined for a receiving block;...
US20130238894 Managing Credentials  
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and...
US20130117557 CLOUD COMPUTING SYSTEM AND CLOUD SERVER MANAGING METHOD THEREOF  
A cloud computing system is disclosed. The cloud computing system includes a management server that manages a plurality of servers and distributes service resources. Each of the servers...
US20140040617 METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION  
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an...
US20120137358 POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS  
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the...
US20110167259 SOFTWARE LICENSE ENFORCEMENT  
Systems and methods for performing software license enforcement are provided. According to one embodiment, file or operating system activity relating to a code module are intercepted by a kernel...
US20130219155 Pre-installed Application Activation  
Pre-installed application activation techniques are described in which live content for applications is activated before user interaction with the applications. Input indicative of an initial...
US20120060025 SERVICE PROVIDER INVOCATION  
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and...
US20130173908 Hash Table Organization  
Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key...
US20140164792 Securing Encrypted Virtual Hard Disks  
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an...
US20120297206 Securing Encrypted Virtual Hard Disks  
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an...
US20150169021 DYNAMIC SELF-CORRECTING POWER MANAGEMENT FOR SOLID STATE DRIVE  
A system and method for operating a solid state drive (SSD) within power limitations while maintaining SSD performance. In one embodiment a power management integrated circuit (PMIC) is used to...
US20130268770 CRYPTOGRAPHIC HASH DATABASE  
A method for bursting a hash table of a key-value database comprises receiving a key and a value, traversing trie nodes of the key-value database from a root node to a leaf node by recursively...
US20150143124 SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY  
Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is...
US20150143123 SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY  
Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is...
US20110099377 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to...
US20130096998 AUTOMATED DEVICE PROVISIONING AND ACTIVATION  
A method comprising providing a plurality of links to a plurality of end-user devices communicatively coupled to a network system, a particular link of the plurality of links supporting...
US20130013927 Automated Entity Verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
US20130013553 Automated Entity Verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
US20110283106 METHOD FOR REALIZING AUTHENTICATION CENTER AND AUTHENTICATION SYSTEM  
A method for realizing an authentication center (AC) and an authentication system are disclosed. The method comprises: a UE sends an authentication request to an AC and applies for temporary...
US20150067376 POWER MANAGEMENT IN A CIRCUIT  
The present disclosure is generally related to power management in a circuit on a circuit board of a processor. The circuit includes a first power connector coupled to a first power input rail....
US20110191598 DOCK FOR A PORTABLE HARD DISK AND A METHOD FOR ACCESSING CONTENT ON A HOST DEVICE USING THE DOCK  
There is provided a first dock for a portable hard disk, where the first dock is connectable to a host device. There is also provided a corresponding method for accessing content on the host...
US20100306832 METHOD FOR FINGERPRINTING AND IDENTIFYING INTERNET USERS  
Various aspects of the present system provide methods and systems for identifying an individual who operates a remote computer. One aspect provides a technique to generate fingerprint of computer...
US20130191656 POWER DISTRIBUTION FOR MICROPROCESSOR POWER GATES  
Embodiments related to controlling power distribution within a microprocessor are provided. In one example, a microprocessor comprising a power supply is provided. The example microprocessor also...
US20120317409 Mobile Printing  
A method of printing comprising, at an imaging device, receiving a print-by-reference print request and an encryption key from a mobile device, transmitting the print-by-reference print request...
US20100306560 Power Management in a Virtual Machine Farm at the Local Virtual Machine Platform Level by a Platform Hypervisor Extended with Farm Management Server Functions  
Power management for a virtual machine farm in which each hypervisor respectively serving each virtual machine platform in the farm is provided with an extended hypervisor function coacts with...
US20110016320 METHOD FOR AUTHENTICATION AND SIGNATURE OF A USER IN AN APPLICATION SERVICE, USING A MOBILE TELEPHONE AS A SECOND FACTOR IN ADDITION TO AND INDEPENDENTLY OF A FIRST FACTOR  
The invention relates to a method for the two-factor authentication of a user in an application service running on an application server. The first authentication factor is a PIN authentication...
US20130159730 ATTRIBUTE-BASED DIGITAL SIGNATURES  
An attribute-based digital signature system is disclosed. A first signature generating unit (1) is used for generating a first signature (10) for a document (11), based on a first signature key...
US20150026457 CONTROLLING ACCESS BY CODE  
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or...
US20150039879 CubeSat System, Method and Apparatus  
A satellite system includes a chassis, an avionics package included within an upper portion of the chassis. The avionics package includes a main system board, a payload interface board, at least...
US20130080789 Multi-Channel Multi-Factor Authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security...
US20120254606 Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models  
A most likely sequence of states corresponding to an observation sequence stored at a client is determined securely with respect to a HMM stored at a server. An encryption of a log-probability of...
US20140245019 APPARATUS FOR GENERATING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION INFORMATION AND METHOD OF PERFORMING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION USING THE SAME  
Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for...
US20140136837 METHOD FOR IDENTIFYING AND AUTHENTICATING A USER VIA A PORTABLE DEVICE  
The method comprises: a1) associating, a user server (US) in collaboration with an authoritative user server (AUS), a user's portable device (MT) with an email address; anda2) once associated,...
US20150046694 METHOD AND APPARATUS FOR SECURELY ESTABLISHING L3-SVC CONNECTIONS  
A system and method are provided for securely establishing Layer-3 SVCs or SPVCs across an ATM network. An originating multiservice switch that generates the connection setup message for the...
US20120054486 Securing A Virtual Environment And Virtual Machines  
A computer implemented method and system for securing a virtual environment and virtual machines in the virtual environment is provided. A credential authority server is provided for managing...
US20120311344 TECHNIQUES FOR SECURITY AUDITING OF CLOUD RESOURCES  
Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security...
US20150127954 OPERATING SYSTEM  
An example server-based system is provided, which includes at least one server configured with a clinical operating system having a plurality of application services, the application services...
US20130054959 Security Control in a Communication System  
A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The...