Match Document Document Title
US20150026454 CHUNK-LEVEL CLIENT SIDE ENCRYPTION IN HIERARCHICAL CONTENT ADDRESSABLE STORAGE SYSTEMS  
Techniques for chunk-level client side encryption are provided. In a content addressable storage system, a plurality of chunks is used to implement a hierarchical file system. The hierarchical...
US20140317410 NETWORK SERVICE INTERMEDIATION METHOD AND INTERMEDIATION SYSTEM  
An intermediation method used in an intermediation system that includes an intermediation device determining a permission for application services requiring user authentication on a network, where...
US20130124853 DIGITAL RIGHTS MANAGEMENT DISTRIBUTION SYSTEM  
In an example embodiment, a digital content distributor may transmit an unsigned license associated with a protected digital object to a digital rights management provider. The digital rights...
US20130318388 METHOD AND SYSTEM FOR COMPUTING ENERGY RATING FOR CLOUD-BASED SOFTWARE SERVICES  
A method for computing the energy rating for cloud-based software services is disclosed. For each of the service, following steps are performed. The method includes identifying configuration...
US20080152145 ASSET BRING-OUT MANAGEMENT SYSTEM, ASSET BRING-OUT MANAGEMENT METHOD, BROUGHT OUT ASSET, BROUGHT OUT ASSET CONTROL PROGRAM  
An asset bring-out management system includes a brought out asset, a managing system, an encryption determining unit, and a brought out information registering unit. The managing system manages...
US20110307941 Method and apparatus to implement secured, layered logout from a computer system  
A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of...
US20130227274 PRIVACY-PRESERVING PUBLISH-SUBSCRIBE PROTOCOL IN A CLOUD-ASSISTED MODEL  
A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item....
US20140298055 ENERGY SAVING CIRCUIT OF COMPUTER  
An energy saving circuit of a computer is connected between a power supply and a motherboard. The energy saving circuit includes first to fifth electronic switches and a sensor. When the computer...
US20100306536 SYSTEM AND METHOD FOR ROUTING MESSAGES BETWEEN APPLICATIONS  
A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized interface that enables parties to...
US20140173284 KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE  
To provide key management layered on a quasi-out-of-band authentication system, a security server receives a request for activation of a user interface window for a particular user from a network...
US20120272056 KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE  
To provide key management layered on a quasi-out-of-band authentication system, a security server receives a request for activation of a user interface window for a particular user from a network...
US20110029788 Power Limiting In Redundant Power Supply Systems  
A redundant power supply system includes power limit logic and plural power supplies. The power limit logic is configured to impose a first power limit threshold on the power supply system during...
US20140359283 INTERLOCKING APPLICATIONS AND FILES  
A file system monitoring layer is positioned between a virtual file system (VFS) encryption layer and a lower level file system layer. The file system monitoring layer stores a list of...
US20140006829 REVERSE-PROXYING METHOD AND SERVER/CLIENT SYSTEM USING THE SAME  
A reverse-proxying method and a server/client system using the same are provided. The reverse-proxying method includes: providing, by a server, a service to a client; and, when the server enters a...
US20110307709 MANAGING SECURITY OPERATING MODES  
A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by...
US20130166909 Client-Side Player File and Content License Verification  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying a message based on application of a hashing algorithm. In one aspect, a method...
US20120324255 SECONDARY POWER UTILIZATION DURING PEAK POWER TIMES  
Systems and methods for selectively utilizing secondary power sources during peak power times are provided for. The method includes receiving a notification of a peak power time, and discontinuing...
US20130067217 SYSTEM AND METHOD FOR PROTECTING ACCESS TO AUTHENTICATION SYSTEMS  
A system and method for protecting access to authentication systems. A mediator may accept original authentication credentials from a client, may process the authentication credentials to provide...
US20110047378 SYSTEM AND METHOD FOR IDENTIFYING ACCOUNT AND PERIPHERAL DEVICE THEREOF  
An account identification system, an account identification method, and a peripheral device thereof are provided, wherein the peripheral device has a private key. When a user is about to log into...
US20120265976 Secure Network Cloud Architecture  
Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various...
US20140181511 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE  
Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a...
US20110087876 Dynamic Analytical Differentiator For Obfuscated Functions In Complex Models  
Systems and methods are provided for providing secure transmission of software code, which includes a mathematical function, from a first computer to a second computer so that the mathematical...
US20150172278 System And Method For Assigning Quality To Cryptographaic Identities Used In A Digital Transaction  
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital transaction. The quality assignment supports...
US20140372753 METHOD AND APPARATUS FOR PERFORMING DISTRIBUTED PRIVACY-PRESERVING COMPUTATIONS ON USER LOCATIONS  
A location-trace comparison system can perform privacy-preserving computations on locations traces for two or more users, for example, to determine a location-visit overlap for these users. During...
US20110161684 MINI POWER SUPPLY MODULE  
The present invention discloses a mini power supply module comprising a circuit board and a power connector. Said power connector is abutted and electrically connected with said power connector...
US20130124857 COMMUNICATION APPARATUS AND CONTROL METHOD THEREFOR  
It is determined whether a user who has logged in in communication using a selfsigned certificate stored by default is an administrator or a general user. If it is determined that the user is an...
US20110066861 DIGITAL CONTENT MANAGEMENT AND DELIVERY  
Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one...
US20120079294 Power Sharing Between Midspan and Endspan for Higher Power PoE  
Methods and systems for higher power PoE are provided. Embodiments overcome system limitations to PSE power scaling by using an endspan-midspan configuration which allocates power to the PD from...
US20140195834 HIGH THROUGHPUT LOW LATENCY USER MODE DRIVERS IMPLEMENTED IN MANAGED CODE  
Implementing a safe driver that can support high throughput and low latency devices. The method includes receiving a hardware message from a hardware device. The method further includes delivering...
US20100313007 SYSTEM AND METHOD FOR THE GENERATION OF A CONTENT FINGERPRINT FOR CONTENT IDENTIFICATION  
A system and method for the generation of a content fingerprint for content identification are described. Various embodiments include encoding content without any available identifying...
US20130117569 METHOD AND APPARATUS FOR IMPROVING DIGITAL SIGNATURES  
Systems and methods are provided for enchancing pseudo random number generation to thwart various security attacks to a system that relies on digital signature security measures. For example, a...
US20140201513 POWER MANAGEMENT CIRCUIT, SERVER, AND POWER MANAGEMENT METHOD THEREOF  
A server is provided in the present disclosure, and the server includes a power module, a motherboard circuit, and a power management circuit. The power management circuit is coupled to the...
US20110145604 FAULT TOLERANT POWER SEQUENCER  
A system comprising a plurality of subsystems and a master power sequencer. Each of the plurality of subsystems is coupled to an associated power switch and an associated slave power sequencer....
US20140115348 SERVER SYSTEM AND HEAT DISSIPATION CONTROL METHOD THEREOF  
A server system and a heat dissipation control method thereof are provided. A main power supply and a standby power supply respectively supplying a main voltage and a standby voltage of the server...
US20130198547 System and Method for Maintaining Connectivity to Remote Application Servers  
A system and method for maintaining connectivity between a host system running an Always-On-Always-Connected (AOAC) application and an associated remote application server. The system further...
US20130007495 System and Method for Maintaining Connectivity to Remote Application Servers  
A system and method for maintaining connectivity between a host system running an Always-On-Always-Connected (AOAC) application and an associated remote application server. The system further...
US20120005501 System and Method for Maintaining Connectivity to Remote Application Servers  
A system and method for maintaining connectivity between a host system running an Always-On-Always-Connected (AOAC) application and an associated remote application server. The system further...
US20140208140 POWER CONSUMPTION LIMIT ASSOCIATED WITH POWER OVER ETHERNET (POE) COMPUTING SYSTEM  
A computing system is associated with power consumption based on Power over Ethernet (PoE). Power consumption is compared to a threshold, and a signal is asserted that power consumption is to be...
US20130138971 INTELLIGENT SECURITY CONTROL SYSTEM FOR VIRTUALIZED ECOSYSTEMS  
Resources of a virtualized ecosystem are intelligently secured by defining and analyzing object handling security control information for one or more logical resources in the virtualized ecosystem...
US20130080763 PERSONAL MESSAGING SECURITY  
A method may include creating, by a user device, an electronic message, the electronic message comprising destination information corresponding to an intended recipient of the electronic message....
US20070300074 Trusted evidence cameras and related methods and computer program products  
Digital Cameras configured to verify authenticity of digital photos taken with the digital camera and related methods and computer program products are provided. GPS information associated with a...
US20110307707 METHOD AND SYSTEM FOR SECURING A FILE  
A method for securing files. The method includes an n-bit generator, executing on a first member of a group, generating a message digest using a first secret and a file constant value. The file...
US20110203000 PREVENTING UNAUTHORIZED FONT LINKING  
Methods, computer readable media, and apparatuses for preventing unauthorized font linking are presented. A request for a font file may be received. It may be determined whether the request is...
US20140237268 MOISTURE SHUTDOWN CONTROL  
Aspects of shutdown control of a device in the presence of moisture are described. In one embodiment, a moisture detection signal is received from a moisture detector. In turn, certain parameters...
US20140201521 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in...
US20100306559 POWER-MANAGER CONFIGURATION UPLOAD AND DOWNLOAD METHOD AND SYSTEM FOR NETWORK MANAGERS  
A power management system embodiment of the present invention comprises a power manager with a network agent in communication over a network with a network manager. The power manager is connected...
US20110137803 SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS  
The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital...
US20110138187 SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION USING MULTIPLE KINDS OF TEMPLATES  
In additional enrollment of a template in a biometric authentication system, the template is automatically enrolled on the basis of a plurality of authentication results to assure a user's...
US20130031373 Product authentication based upon a hyperelliptic curve equation and a curve pairing function  
Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve...
US20150033059 STATUS-SENSITIVE POWER OBSERVING SYSTEM  
The present invention relates to a status-sensitive power observing system (1) which enables to observe power consumption of interconnected embedded systems under different operating conditions...