Sign up


Match Document Document Title
8272042 System and method for automation of information or data classification for implementation of controls  
A system, method and computer program product are provided for monitoring data traffic on one or more networks, determining the classification of the data based on an organization's classification...
8266176 Storage system and file access determination method of the same  
A storage system configured to be applied to a broad range of access forms to the file and improve performance of file access control processing. The storage system may store a part of the access...
8266691 Renewable integrity rooted system  
A method of validating software is disclosed. The method may include receiving, at a first function, a first hash and a first version. The first function may validate a second function according to...
8266429 Technique for securely communicating and storing programming material in a trusted domain  
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the inv...
8266430 Selective shredding in a deduplication system  
Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
8261068 Systems and methods for selective encryption of operating system metadata for host-based encryption of data at rest on a logical unit  
A method is provided for providing an operating system (OS) independent input/output (I/O) filter driver capable of encrypting at least a portion of a logical unit (LUN), the method comprising the...
8261069 Privacy-enhanced searches using encryption  
Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted...
8261098 Method and apparatus for encrypting and processing data in flash translation layer  
A method for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, and an apparatus thereof. The apparatus for encrypting and...
8261096 Information processing apparatus, information recording medium, information processing method, and computer program  
An information processing apparatus, an information recording medium, an information processing method, and a computer program are provided. In an information recording medium storing many pieces...
8261066 System and method for secure storage, transfer and retrieval of content addressable information  
An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key...
8261067 Devices, methods, and systems for sending and receiving case study files  
The present disclosure includes devices, methods, and systems for creating a case study file that includes an image file from an imaging modality, executing a hash algorithm on the case study file...
8261055 Information processing apparatus and system and data communication method pertaining to the information processing system  
A first information processing apparatus encrypts data that it receives from a second information processing apparatus, and transmits the data thus encrypted to an external device. The second...
8254577 Validation of encryption key  
A label corresponding to a cryptographic key is stored at a first computational device. A user provided label is received at a second computational device. The user provided label is sent from the...
8255371 Methods and apparatuses for data protection  
Methods and apparatuses for data protection against corrupted write operations. In one embodiment, a technique of crash protection uses an atomically updated global transaction indicator to switch...
8256009 Method and apparatus for managing digital rights of secure removable media  
Disclosed is a method and apparatus for managing rights object of SRM in a digital rights management system. The method for managing rights object bound to the SRM, comprises: transmitting ROAP...
8250475 Managing icon integrity  
Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the...
8249249 System and method for text-based encryption  
A system, method, and computer program for text-based encryption, involves accessing a text file with a plurality of lines of text characters; re-sequencing each of the text characters in the...
8250630 Detecting unauthorized computer access  
A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first...
8250655 Rapid heuristic method and system for recognition of similarity between malware variants  
A system, method and computer program product for identifying new variants of certain data objects, for example, malware-carrying files, including (a) dividing a file into a plurality of N pieces;...
8250659 Apparatus and method for protecting the integrity of data  
By arranging a redundancy means and a control means upstream from an encryption means which encrypts and decrypts the data to be stored in an external memory, the integrity of data may be ensured...
8250665 Digital Broadcasting system and method of processing data in digital broadcasting system  
A method for controlling a digital television (DTV) includes receiving independent space identification information recorded in a storage area of a compact wireless device and a wired equivalent...
8250365 Page encryption system  
Text containing files are encrypted by first formatting the files for display. The display-formatted files are then run length coded to form files indicating the information. The files are encrypted.
8245270 Resource based dynamic security authorization  
Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a...
8245036 Method and system for establishing a trusted and decentralized peer-to-peer network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
8245035 Merging registry keys  
Two or more separate physical Registry directories are presented as a single (virtual) Registry directory to an application running in a controlled execution environment called a silo. All of the...
8239675 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8239947 Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system  
A user mode application component invokes the assistance of a kernel mode driver component to detect and/or remediate malicious code on a computer system. The user mode application may include code...
8239356 Methods and apparatuses for data protection  
Methods and apparatuses for data protection against corrupted write operations. In one embodiment, a technique of crash protection uses an atomically updated global transaction indicator to switch...
8239923 Controlling computer program extensions in a network device  
A network infrastructure element such as a packet data router or switch hosts an application program and one or more user program extensions to the application program. Logic in the network element...
8238204 Apparatus and method for managing key in library apparatus  
In order to facilitate the management of the hardware key of a library apparatus employing the LTO system, a write function of a noncontact memory (CM: cartridge memory) contained in an LTO tape...
8239676 Secure proximity verification of a node on a network  
A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification protocol. The node-verification...
8239674 System and method of protecting files from unauthorized modification or deletion  
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A...
8239673 Methods, apparatus and systems with loadable kernel architecture for processors  
A device (200, 2200) for improved security includes a processor (200) and a secure writeable memory (2245) coupled to said processor (200) and including code (2240) to download a loadable security...
8234489 Set of system configuration registers having shadow register  
A processor is disclosed having a plurality of general purpose registers for storing data for processing by the processor; a set of system configuration registers for storing data indicative of a...
8233627 Method and system for managing a key for encryption or decryption of data  
A user private key is stored in a database of the user terminal. A user public key and user information are stored in the user management DB. The encryption/decryption unit encrypts an authority...
8230517 Opaque message archives  
A system includes a server equipped to generate a split encryption key having at least a first key portion and a second key portion, that is used by the server to encrypt at least a portion of a...
8229930 URL reputation system  
A URL reputation system may have a reputation server and a client device with a cache of reputation information. A URL reputation query from the client to the server may return reputation data...
8230491 Automatic access to network devices using various authentication schemes  
An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state transitions...
8225317 Insertion and invocation of virtual appliance agents through exception handling regions of virtual machines  
A method for inserting an agent of a virtual appliance into a virtual machine. The method may include inserting, into an exception handler memory location of a virtual machine, one or more...
8225108 Method and system for mixed symmetric and asymmetric encryption of .ZIP files  
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in...
8225109 Method and apparatus for generating a compressed and encrypted baseline backup  
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including directories and files, are identified....
8225391 System and method for improving restrictiveness on accessing software applications  
Systems and methods for improving the restrictiveness on accessing software applications on mobile devices, such as cell phones, are disclosed. In accordance with an exemplary embodiment, a...
8225091 Systems and methods for protecting sensitive files from unauthorized access  
Systems and methods for protecting sensitive files from unauthorized access are disclosed. An exemplary method involves detecting a connection of the computing device to an electronic device. An...
8225089 Electronic transaction systems utilizing a PEAD and a private key  
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the...
8219821 System and method for signature based data container recognition  
A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance generates a signature of the data...
8218763 Method for ensuring the validity of recovered electronic documents from remote storage  
A method for electronically storing and retrieving at a later date a true copy of a document stored on a remote storage device comprises: sending a document in electronic format from a document...
8214641 File access in multi-protocol environment  
Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two...
8213602 Method and system for encrypting and decrypting a transport stream using multiple algorithms  
There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key to...
8214902 Determination by circuitry of presence of authorized and/or malicious data  
An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine,...
8214643 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method  
An object is to provide a service providing method capable of curbing rise of cost A service providing method according to the present invention is one for providing services A and B, which...