Match Document Document Title
US20150220748 3D PRINTING IN MARKETPLACE ENVIRONMENTS  
Systems, methods, and media for authorizing 3D printing services in a marketplace environment are provided. In one example, a system comprises a computing device that implements a 3D printing...
US20120029938 Anonymous Healthcare and Records System  
Described herein is using cryptographic techniques (anonymous proof systems) to ensure the anonymity of health records when processing payment claims related to insurers and pharmacies. A patient...
US20120222127 AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT  
A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method includes loading the...
US20120255027 DETECTING CODE INJECTIONS THROUGH CRYPTOGRAPHIC METHODS  
Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding...
US20130127615 Sanitization compliance monitoring system with security enhancements  
A sanitization compliance monitoring system comprises care giver badges, patient bed beacons associated with patient beds, dispenser beacons associated with sanitization dispensers, and a central...
US20130036473 SYSTEM AND METHOD FOR BRANCH FUNCTION BASED OBFUSCATION  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating branches in computer code. A compiler or a post-compilation tool can obfuscate branches by...
US20130167244 System for Managing Risk in Employee Travel  
A system for managing risk in employee travel may control access by users to the travel risk management system. The travel risk management system may receive and store company information for a...
US20130198734 ACCESS TO PROTECTED CONTENT BASED ON LICENSE HIERARCHY  
According to example configurations as described herein, use of software can be contingent upon whether a hierarchical license tree has a valid license for a software resource associated with a...
US20100333078 PACKAGING SYSTEM FOR CUSTOMIZING SOFTWARE  
In one embodiment, a system for customizing executable software code is provided. The system can include a scan logic configured to scan the executable software code to determine an execution...
US20140366147 AUTOMATIC MEDIATION OF RESOURCE ACCESS IN MOBILE APPLICATIONS  
The subject disclosure is directed towards automated, static analysis-based program code processing that detects unprotected resource accesses by applications, that is, those that do not provide...
US20130007889 TRUSTED COMPUTING SOURCE CODE ESCROW AND OPTIMIZATION  
A software installation package includes encrypted source code. An installer receives an encryption key for decrypting the encrypted source code. The installer further causes the establishment of...
US20100257189 Healthcare Record System And Method For Providing Improved Portable Data  
A health-data-portal aggregator executing a stored program to accept medical information entered by the patient for storage on the electronic computer, upload electronic clinical records generated...
US20140283096 VALIDATING NORMALIZED CODE REPRESENTATIONS  
A request that includes an indication of an execution context and data that represents executable code is obtained. An analysis of the data is initiated based on generating a first templatized...
US20150082453 METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS  
A system and method for distribution of digital works in a tree-like structure of devices. A hierarchical right may include a first usage right governing a use for the digital work and a first...
US20150235041 ALLOWING FIRST MODULE OF COMPUTER CODE RECEIVED FROM VENDOR TO MAKE USE OF SERVICE PROVIDED BY SECOND MODULE WHILE ENSURING SECURITY OF SYSTEM  
A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A...
US20120255028 Providing Trusted Services Management Using a Hybrid Service Model  
Methods, computer readable media, and apparatuses for providing trusted services management using a hybrid service model are presented. According to one or more aspects, a first transaction log of...
US20130198815 Systems and Methods for Universal Enhanced Log-In, Identity Document Verification and Dedicated Survey Participation  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
US20140230071 DEVICE AND METHOD FOR GENERATING AND DISPLAYING GRAPHIC CODES SPECIFIC FOR MEDICAL DEVICES AND MEDICAL TREATMENT  
The present invention relates to the field of information display and information playback on medical fluid management machines, in particular dialysis machines in which there should be a simple...
US20130227702 SYSTEM AND METHOD FOR SYNTAGMATICALLY MANAGING AND OPERATING CERTIFICATION USING ANONYMITY CODE AND QUASI-PUBLIC SYNTAGMATIC CERTIFICATION CENTER  
A method for syntagmatically managing and operating certification using an anonymity code is provided, which includes causing a quasi-public syntagmatic certification center to receive basic...
US20130298258 MANAGING NETWORK IDENTITIES  
Techniques for managing network identities include generating, with a local computing system, a tree structure representing a network comprising a plurality of entities, the tree structure...
US20140337995 SYSTEMS AND METHOD FOR IDENTIFYING AND MITIGATING INFORMATION SECURITY RISKS  
Methods and systems for Sustained Testing and Awareness Refresh against Phishing threats (STAR*Phishâ„¢) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target...
US20120124671 SYSTEMS AND METHODS FOR IDENTIFYING AND MITIGATING INFORMATION SECURITY RISKS  
Methods and systems for Sustained Testing and Awareness Refresh against Phishing threats (STAR*Phishâ„¢) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target...
US20110213807 System and method for distributed tokenization using several substitution steps  
A method for distributed tokenization of sensitive strings of characters, such as social security numbers, credit card numbers and the like, in a local server is disclosed. The method comprises...
US20140215632 PREVENTING THE DETECTION AND THEFT OF USER ENTRY ALPHANUMERIC SECURITY CODES ON COMPUTER TOUCH SCREEN KEYPADS  
Preventing, discernible patterns of surface marks resulting from the repetitive entry of security codes to computer device touch screen alphanumeric keypads. There is predetermined the number of...
US20150096042 METHOD AND APPARATUS FOR IMPROVED PRIVATE MESSAGING  
An improved method and apparatus for private messaging is disclosed. In one embodiment, a first device transmits a message to a second device via a server. The message is displayed on the second...
US20140223572 MESSAGE SERVICE PROVIDING METHOD, AND APPARATUS AND SYSTEM THEREFOR  
The present invention relates to a message service providing method, and more specifically, to a message service providing method, and an apparatus and a system therefor capable of selective...
US20120192284 METHOD FOR ACQUISITION OF SOFTWARE APPLICATIONS  
A method for acquisition of a software application stored on a software application distribution unit and intended to be supplied to a user computer unit is disclosed wherein, the user computer...
US20130091581 Methods and Systems for Establishing and Maintaining Verified Anonymity in Online Environments  
In online communities and e-commerce sites that desire identity verification of individuals, a verified user is restricted to a single user identity, typically the user's real name. The use of...
US20150172254 System and Method For Operating a Social Networking Site on the Internet  
A system for operating a social networking site on the internet. The system comprises a server machine in communication with the internet and a social site module operating on the server machine....
US20110191593 Software License Embedded In Shell Code  
Software application protection methods and systems for protecting and verifying licensing of an original application. The system reads the original application executable, and generates a shelled...
US20130333047 ELECTRONIC COMMUNICATION SECURITY SYSTEMS  
Embodiments of the invention relate to methods increasing the security of electronic messages.
US20120272326 TOKENIZATION SYSTEM  
A tokenization unit that tokenizes a real name ID to a different tokenized ID according to a user's service usage situation, a service history analyzing unit that analyzes service history data, a...
US20140230072 Distributed Tokenization Using Several Substitution Steps  
A method for distributed tokenization of sensitive strings of characters, such as social security numbers, credit card numbers and the like, in a local server is disclosed. The method comprises...
US20120291144 SYSTEM AND METHOD FOR PRIVACY PROTECTION USING IDENTIFIABILITY RISK ASSESSMENT  
A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for...
US20140245453 METHOD AND APPARATUS FOR TRANSMITTING A USER DATAGRAM PROTOCOL MESSAGE THAT IS LARGER THAN A DEFINED SIZE  
A first device initiates a handshake message exchange with a second device according to a security protocol. The first device determines that an application datagram is to be transmitted according...
US20140337984 VERIFICATION OF SERIALIZATION CODES  
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to...
US20110271350 METHOD FOR PROTECTING SOFTWARE  
A method for protecting software is disclosed in the invention, including steps of analyzing the software or obtaining source codes of the software, and modifying the instructions obtained from...
US20130073949 SYSTEM AND METHOD TO AID ASSISTIVE SOFTWARE IN DYNAMICALLY INTERPRETING INTERNET WEBSITES AND THE LIKE  
Disclosed is a system and method for modifying the presentation of content and/or graphical elements and behavior of a digital presentation (e.g., a webpage) by identifying an information event...
US20140007253 GRADUATED AUTHENTICATION IN AN IDENTITY MANAGEMENT SYSTEM  
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication security to provide a...
US20110083189 SYSTEM AND METHOD FOR ENFORCING DIGITAL RIGHTS MANAGEMENT RULES  
A method for enforcing digital rights management (DRM) rules in a first device is disclosed. In the method the first device receives a message that includes a rights object (RO) having a digital...
US20100313196 MANAGING SECURELY INSTALLED APPLICATIONS  
Embodiments of the present disclosure provide methods and systems for managing securely installed applications. After installation, an installation framework performs a bind process to correlate...
US20140007247 Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings  
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content...
US20120317650 SYSTEM AND METHODS FOR FACILITATING SECURE COMMUNICATIONS ON A WEBSITE  
A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is...
US20150101058 Blog Post Protection Pathway  
Disclosed herein is a method and system for providing copyright protection for blog posts prior to publication from within a running blog-publishing software application by automatically...
US20150020208 SYSTEM AND METHOD FOR TARGETED MESSAGING, WORKFLOW MANAGEMENT, AND DIGITAL RIGHTS MANAGEMENT FOR GEOFEEDS  
The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that is related to geographically definable...
US20150074813 PROTECTION OF RESOURCES DOWNLOADED TO PORTABLE DEVICES FROM ENTERPRISE SYSTEMS  
An aspect of the present invention provides for protection of resources hosted on enterprise systems. In an embodiment, an enterprise system receives a request from a portable device to download a...
US20150082443 SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT  
A method to automate compliance with software package content licenses is disclosed. The method may generate a dependency graph for a software product's package code by creating nodes only for...
US20120159639 METHOD OF PROVIDING CUSTOMIZED SERVICE WITH PRIVACY SECURITY  
A method of providing customized service with privacy security includes: requesting service information provided from a smart environment to a smart environment control system; once the service...
US20110258704 STREAMING INSERTION OF TOKENS INTO CONTENT TO PROTECT AGAINST CSRF  
Methods and apparatus are provided for protecting against cross-site request forgeries (CSRFs) by requiring certain requests submitted to a computer server to include specific tokens. The requests...
US20140380496 METHODS AND SYSTEMS FOR DETERMINING A COMPLIANCE LEVEL OF AN APPLICATION WITH RESPECT TO A PRIVACY PROFILE ASSOCIATED WITH A USER  
An exemplary method includes an application management system 1) detecting a request provided by a user to install an application on a user device, 2) identifying a plurality of privacy attributes...