Sign up


Match Document Document Title
8191159 Data security for digital data storage  
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data...
8191162 System and method for securing and tracking files  
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing system is connected to a server for...
8190922 Extensible and flexible electronic information tracking systems and methods  
A method and system for tracking electronic information includes the steps of: encrypting an electronic file stored on a hardware storage device; attaching or incorporating with the file a...
8190902 Techniques for digital signature formation and verification  
Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with...
8191115 Method and apparatus for extensible security authorization grouping  
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators...
8191165 Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity  
A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide...
8185736 File transfer system for direct transfer between computers  
A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a...
8185954 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8185751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system  
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical...
8181266 Method for moving a rights object between devices and a method and device for using a content object based on the moving method and device  
A method for moving a rights object (RO) between devices, a method of using a content object based on the moving method, and devices using the methods are provided. The moving method includes...
8181248 System and method of detecting anomaly malicious code by using process behavior prediction technique  
Provided are a pattern analyzing/detecting method and a system using the same that are capable of detecting and effectively preventing an unknown malicious code attack. To detect such an attack,...
8181220 Method and apparatus for digital rights management policies  
Method and apparatus are described wherein, in one example embodiment, there is provided one or more policy templates that may define a set of policy permissions or other attributes that may be...
8181022 Method and apparatus for controlling access restrictions for media playback  
A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be...
8181020 System and method for securely storing firmware  
A mechanism for creating and accessing a secure storage area for firmware that stores a “Virtual ROM” module reference or pointer in the actual ROM that includes a unique identifier for the vir...
8176334 Document security system that permits external users to gain access to secured files  
An improved system and approaches for exchanging secured files (e.g., documents) between internal users of an organization and external users are disclosed. A file security system of the...
8176318 Method and system for providing a customized network  
The present invention comprises a method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data. The data is grouped and stored as per user...
8176568 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system  
A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each...
8176249 Methods for embedding session secrets, within application instances  
Method for embedding a session secret, within an application instance, comprising the steps of generating an ephemeral session secret by a master application. Embedding, by master application,...
8175271 Method and system for security protocol partitioning and virtualization  
A method for implementing a security protocol, involving receiving a packet from a network connection, obtaining an identifier for one of a plurality of security association database (SADB)...
8176333 Method and apparatus for protecting external call references  
The present invention is generally directed to a method, system, and article of manufacture that ensures the integrity of programs having variable portions. One aspect of this invention is a method...
8176319 Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system  
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical...
8171540 Method and system for E-mail management of E-mail having embedded classification metadata  
A method and system method for e-mail management of e-mails having embedded classification metadata. A query from an end user to access an e-mail account by an e-mail client is received. It is then...
8171566 Copyright protection data processing system and reproduction device  
If playback devices are prohibited from playing back contents recorded in R media, there occurs a problem that it takes more time to manufacture commercial ROM media. Conversely, if playback...
8171479 Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers  
A method for presenting an aggregate view of native resources includes the step of enumerating a plurality of system-scoped native resources provided by a system scope. A plurality of...
8171286 Computer program for securely viewing a file  
A method for distributing a password protected content file without revealing the password to a recipient. An unlocking program that has access to at least one password corresponding to the...
8171549 Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data, files and their transfer  
Apparatus, methods and articles of manufacture are disclosed for analyzing code. A valuation component, which provides a value for analyzed code is comprised of a tokenization component, hashing...
8171532 Management apparatus, management method and recording medium storing program  
A management apparatus which includes: a receiving unit that receives first authorization information for a first document that is already issued and contains document identification information...
8171558 Inter-program authentication using dynamically-generated public/private key pairs  
In a multi-tiered computing environment, a first program may authenticate with a second program using dynamically-generated public/private key pairs. An authentication token is constructed that...
8171285 Cryptographically signed filesystem  
A cryptographically signed filesystem provides a central database resident on a server that contains database objects. The server creates startup software to be installed in a client system's read...
8171563 Secure message system with remote decryption service  
Systems and methods for secure messaging are provided. A sender may encrypt content and send the encrypted content to a recipient over a communications network. The encrypted content may be...
8171307 Background encryption of disks in a large cluster  
The invention provides for rekeying a large cluster of storage security appliances which allows more than two of the storage security appliances to proxy a single storage medium while encrypting...
8166313 Method and apparatus for dump and log anonymization (DALA)  
According to one embodiment of the invention, an original dump file is received from a client machine to be forwarded to a dump file recipient. The original dump file is parsed to identify certain...
8166291 System for managing program applications storable in a mobile terminal  
Management server 16 may obtain application programs from content server 20 in response to requests of mobile terminal 11. Management server 16 may transmit the obtained application programs to...
8160566 Message sender controllable messaging system  
The present invention relates to a mobile phone and a method for its operation and control. The mobile phone is capable of receiving the message sent by other mobile phones through a message...
8160257 Tape failover across a cluster  
A security appliance that encrypts and decrypts information is installed in each of redundant multi-paths between a host system and a back up tape storage system. The host system is arranged to...
8156561 Method and apparatus for setting access restriction information  
Access restriction information that an old storage device has is transferred to a new storage device. A management server 2200 obtains a port management TL 2445 that the old storage device 2400...
8156503 System, method and computer program product for accessing a memory space allocated to a virtual machine  
A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential...
8156322 Critical security parameter generation and exchange system and method for smart-card memory modules  
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it...
8156328 Encryption method and device  
A method and a device are disclosed for the low-cost implementation even of high-performance encryption functions in an encryptor. The encryptor may be composed merely of PC software or the like,...
8151347 Clustered file system for mix of trusted and untrusted nodes  
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory...
8150897 Computer file system driver control method, program thereof, and program recording medium  
In the method of controlling a file system driver of an electronic computer and the program for the method and further the storage medium containing the program according to the present invention,...
8151346 Unauthorized usage prevention system and information processing apparatus  
A disclosed unauthorized usage prevention system enables execution of at least one software item including an identification information item uniquely associated with the software item, based on a...
8149467 E-mail transmission apparatus, e-mail transmission method and e-mail transmission program  
A technology for use in an e-mail transmission apparatus capable of preventing or discovering ‘impersonation’ in e-mail transmission efficiently, in which an e-mail is sent not only to a rec...
8151339 Method and apparatus for implementing filter rules in a network element  
Multiple non-conflicting actions associated with filter rules may be located and applied to a packet using a single ACL lookup by causing action records to be created from ACEs in the ACL, and then...
8151345 Self-authorizing devices  
Self-authorizing cards and cellular network adapters for authorization of financially payments and other secure transactions. In some embodiments a smart card is provided with a connector for a USB...
8151109 Selective authorization of the loading of dependent code modules by running processes  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, file system or operating system activity relating to a first code module is...
8151349 Masking mechanism that facilitates safely executing untrusted native code  
This disclosure presents a system that uses masking to safely execute native code. This system includes a processing element that executes the native code and a memory which stores code and data...
8145904 System and method for network edge data protection  
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate...
8145900 Crypto-pointers for secure data storage  
This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data...
8141136 Method and system of replacing smart card  
The present invention disclosed a method and system of replacing smart cards. It uses a new identification device (a new SIM) to replace an old one (an old SIM) associated with a user account. The...