Sign up


Match Document Document Title
8352731 Secure decentralized storage system  
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale...
8352735 Method and system for encrypted file access  
A method and system for encrypted file access are provided. The method includes the steps of: receiving (502, 552) an access request for an encrypted file (401-403) by an application (110);...
8353055 Method and apparatus for processing rights object  
A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media...
8352999 Method for managing data in a shared computing environment  
A method of storing secret data in a shared computing environment includes defining secret data, such as a password and administration policies according to a schema of a directory server such as a...
8345873 Methods and systems for N-state signal processing with binary devices  
Linear Feedback Shift Registers (LFSRs) based 2p state with p>2 or p≧2 scramblers, descramblers, sequence generators and sequence detectors in binary implementation are provided. An LFSR may a...
8346926 Granting access to a content unit stored on an object addressable storage system  
Aspects of the invention relate to sharing content stored on an object addressable storage (OAS) system among a plurality of users of the OAS system and authenticating users to an OAS system. In...
8347085 Integrating security protection tools with computer device integrity and privacy policy  
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) run...
8347359 Encryption sentinel system and method  
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server...
8347112 Encryption/decryption engine with secure modes for key decryption and key derivation  
In at least some embodiments, an electronic device comprises a processor and an encryption/decryption (E/D) engine coupled to the processor via a bus. The E/D engine selectively operates in a first...
8347087 Support for multiple digital rights management systems for same content  
Techniques, systems, and apparatus, including medium-encoded computer program products, for protecting a document with multiple digital rights management systems are presented. A described...
8345869 Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network  
A communication system 100 includes a group of user devices, a first device separate from the group of user devices, a first satellite, a peer-to-peer network 130 in communication with the user...
8345870 Method and apparatus for encrypting encoded audio signal  
Advanced solutions for encrypting multi-layer audio data are required, ie. audio data that comprise a base layer and one or more enhancement layers. A method for encrypting such an encoded audio...
8347086 System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium  
A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method...
RE43906 Method and apparatus for securing digital assets  
Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is classified, at least a security clearance...
8341406 System and method for providing different levels of key security for controlling access to secured items  
With files secured by encryption techniques, keys are often required to gain access to the secured files. Techniques for providing and using multiple levels of keystores for securing the keys are...
8341736 Detection and dynamic alteration of execution of potential software threats  
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a...
8341753 Managing pre-release of a game application over a network  
A system, method, and apparatus are arranged to enable loading of an application, such as a game application, prior to a formal release date of the application. An end-user is provided components...
8341405 Access management in an off-premise environment  
A system that can assist users to manage a personal active directory for all of their information maintained within a cloud-based environment is provided. The identity of a client that accesses...
8341733 Creating secured file views in a software partition  
A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is...
8341404 System and method for intelligence based security  
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with...
8336097 Apparatus and method for monitoring and protecting system resources from web browser  
An apparatus and method for preventing an attempt to perform malicious activities using web browser weaknesses are provided. A file protection module monitors attempts to access at least one file...
8336109 Method and apparatus for processing rights object  
A method and apparatus for processing a Rights Object (RO) are provided. A method for upgrading the RO includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8332655 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects  
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query...
8332942 File system event tracking  
Automated file system event tracking and reporting techniques are described in which file system events requested by a user application are intercepted and recorded prior to the request being...
8332658 Computer system, management terminal, storage system and encryption management method  
A computer system in which an encryption-decryption process performed by one encryption-decryption module can be moved to another without stopping the process for a read/write request from a host...
8332632 Method and system for execution monitor-based trusted computing  
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service...
8332907 Detection and management of controlled files  
A remote device may receive a policy definition, search a file system for files that are to be protected, and disposition identified files to protect the files. After completing the protection, a...
8331560 Distributed scalable cryptographic access control  
Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer...
RE43845 Lock-and-key consumer billing data protection system having data encryption capability  
A “lock-and-key” consumer billing data protection capability is provided to telemarketing and electronic marketing systems which are based upon previously-acquired consumer lists. The lists con...
8327138 Method and system for securing digital assets using process-driven security policies  
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt...
8319990 Printing apparatus with data decryption  
A printing apparatus includes a data reading unit that reads data from a storage device that can store pieces of data, the data reading unit being connectable to the storage device, an input panel...
8321667 Security model for common multiplexed transactional logs  
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used...
8321932 Program-based authorization  
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the...
8321949 Managing software run in a computing system  
In general, one aspect of the subject matter described in this specification can be embodied in a system that includes a network-based information server system; and a computer operable to interact...
8321914 System and method for verifying an attribute in records for procurement application  
A system and associated method for verifying an attribute in records for a procurement application. The procurement application employs a database having a company profile record, a user profile...
8316442 Preventing secure data from leaving the network perimeter  
Secure data is prevented from leaving the perimeter of a network such as an enterprise network or corporate network (“corpnet”) by an arrangement in which a hash of the secure data is per...
8316414 Reconfiguring a secure system  
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The...
8316233 Systems and methods for accessing secure and certified electronic messages  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8316460 Private web browsing using encryption  
Computer-implemented methods for temporarily storing history of a private web browsing session using encryption are provided. In one aspect, a method includes receiving a request to temporarily...
8312546 Systems, apparatus, and methods for detecting malware  
Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity...
8312267 Technique for securely communicating programming content  
A technique for securely transferring content from a first device in a first layer to a second device in a second layer. In one embodiment, the first device is a device in a trusted domain and the...
8312238 Microcomputer and method for controlling memory access  
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or prohibited state to a memory space by a program...
8307409 Electronic information management device, computer readable recording medium, method for controlling access, and method for transferring data  
An electronic information management device includes: an associating unit that associates electronic information with first access right information with respect to each user, the electronic...
8307433 Client side username/password credential protection  
A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a...
8306393 Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium  
A first information recorder comprises a limited number-of-times of copying information setting unit for setting information on the limited number-of-times of copying electronic data, a first...
8307091 Method and apparatus for providing access of network based radio frequency identification information  
A method and apparatus for enabling consumers to scan RFID tags using home based endpoint devices that can transmit the scanned information to network based services are disclosed. Using the RFID...
8302178 System and method for a dynamic policies enforced file system for a data storage device  
An autonomous data storage device for storing data files via an external file interface, the external file interface being controllable from an external device, the device comprising: a physical...
8302194 Using file prevalence to inform aggressiveness of behavioral heuristics  
The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate....
8302039 Secure exchange of information in electronic design automation  
Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured...