Sign up


Match Document Document Title
8250655 Rapid heuristic method and system for recognition of similarity between malware variants  
A system, method and computer program product for identifying new variants of certain data objects, for example, malware-carrying files, including (a) dividing a file into a plurality of N pieces;...
8250659 Apparatus and method for protecting the integrity of data  
By arranging a redundancy means and a control means upstream from an encryption means which encrypts and decrypts the data to be stored in an external memory, the integrity of data may be ensured...
8250665 Digital Broadcasting system and method of processing data in digital broadcasting system  
A method for controlling a digital television (DTV) includes receiving independent space identification information recorded in a storage area of a compact wireless device and a wired equivalent...
8250365 Page encryption system  
Text containing files are encrypted by first formatting the files for display. The display-formatted files are then run length coded to form files indicating the information. The files are encrypted.
8245270 Resource based dynamic security authorization  
Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a...
8245036 Method and system for establishing a trusted and decentralized peer-to-peer network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
8245035 Merging registry keys  
Two or more separate physical Registry directories are presented as a single (virtual) Registry directory to an application running in a controlled execution environment called a silo. All of the...
8239675 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8239947 Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system  
A user mode application component invokes the assistance of a kernel mode driver component to detect and/or remediate malicious code on a computer system. The user mode application may include code...
8239356 Methods and apparatuses for data protection  
Methods and apparatuses for data protection against corrupted write operations. In one embodiment, a technique of crash protection uses an atomically updated global transaction indicator to switch...
8239923 Controlling computer program extensions in a network device  
A network infrastructure element such as a packet data router or switch hosts an application program and one or more user program extensions to the application program. Logic in the network element...
8238204 Apparatus and method for managing key in library apparatus  
In order to facilitate the management of the hardware key of a library apparatus employing the LTO system, a write function of a noncontact memory (CM: cartridge memory) contained in an LTO tape...
8239676 Secure proximity verification of a node on a network  
A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification protocol. The node-verification...
8239674 System and method of protecting files from unauthorized modification or deletion  
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A...
8239673 Methods, apparatus and systems with loadable kernel architecture for processors  
A device (200, 2200) for improved security includes a processor (200) and a secure writeable memory (2245) coupled to said processor (200) and including code (2240) to download a loadable security...
8234489 Set of system configuration registers having shadow register  
A processor is disclosed having a plurality of general purpose registers for storing data for processing by the processor; a set of system configuration registers for storing data indicative of a...
8233627 Method and system for managing a key for encryption or decryption of data  
A user private key is stored in a database of the user terminal. A user public key and user information are stored in the user management DB. The encryption/decryption unit encrypts an authority...
8230517 Opaque message archives  
A system includes a server equipped to generate a split encryption key having at least a first key portion and a second key portion, that is used by the server to encrypt at least a portion of a...
8229930 URL reputation system  
A URL reputation system may have a reputation server and a client device with a cache of reputation information. A URL reputation query from the client to the server may return reputation data...
8230491 Automatic access to network devices using various authentication schemes  
An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state transitions...
8225317 Insertion and invocation of virtual appliance agents through exception handling regions of virtual machines  
A method for inserting an agent of a virtual appliance into a virtual machine. The method may include inserting, into an exception handler memory location of a virtual machine, one or more...
8225108 Method and system for mixed symmetric and asymmetric encryption of .ZIP files  
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in...
8225109 Method and apparatus for generating a compressed and encrypted baseline backup  
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including directories and files, are identified....
8225391 System and method for improving restrictiveness on accessing software applications  
Systems and methods for improving the restrictiveness on accessing software applications on mobile devices, such as cell phones, are disclosed. In accordance with an exemplary embodiment, a...
8225091 Systems and methods for protecting sensitive files from unauthorized access  
Systems and methods for protecting sensitive files from unauthorized access are disclosed. An exemplary method involves detecting a connection of the computing device to an electronic device. An...
8225089 Electronic transaction systems utilizing a PEAD and a private key  
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the...
8219821 System and method for signature based data container recognition  
A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance generates a signature of the data...
8218763 Method for ensuring the validity of recovered electronic documents from remote storage  
A method for electronically storing and retrieving at a later date a true copy of a document stored on a remote storage device comprises: sending a document in electronic format from a document...
8214641 File access in multi-protocol environment  
Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two...
8213602 Method and system for encrypting and decrypting a transport stream using multiple algorithms  
There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key to...
8214902 Determination by circuitry of presence of authorized and/or malicious data  
An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine,...
8214643 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method  
An object is to provide a service providing method capable of curbing rise of cost A service providing method according to the present invention is one for providing services A and B, which...
8214908 Electronic musical apparatus, control method therefor, and program for implementing the control method  
An automatic performance apparatus which can make it difficult to discriminate between music contents which require copyright protection and music contents which do not require copyright...
8209540 Incremental secure backup and restore of user settings and data  
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to the manifest. The data processing...
8205079 Encryption/decryption system and method thereof  
An encryption/decryption system includes a displaying unit, an operating unit, a pressure sensing unit and an indicating unit. The displaying unit is configured for displaying files. The operating...
8205077 Management apparatus  
A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret...
8205078 Handling files containing confidential or sensitive information  
A method, apparatus, and computer instructions for managing files in a data processing system. An attribute for a file is specified as having a special designation. The file with the attribute...
8205094 Tamper evident removable media storing executable code  
A mobile wireless device operable to install code on a removable medium, in which the device is programmed to calculate and store a digest of this code into a persistent non-removable store inside...
8204929 Hiding sensitive information  
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information to be relatively securely and...
8201244 Automated malware signature generation  
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown...
8201228 System and method for securing a network  
A method of securing a telecom network, the operation of the telecom network controlled using a plurality of telecom network commands, includes grouping at least some of the plurality of telecom...
8200965 Storage system for data encryption  
A storage system including a host interface connected via a network to a host computer; a disk interface connected to a disk drive; a memory module that stores control information of a cache memory...
8200964 Method and apparatus for accessing an encrypted file system using non-local keys  
One embodiment of the present invention provides a system for accessing an encrypted file through a file system. During operation, the system receives a request to access the encrypted file. In...
8195938 Cloud-based application whitelisting  
Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution...
8196200 Piggybacking malicious code blocker  
A method includes determining whether a transaction request has occurred during a transaction session. Upon a determination that a transaction request has occurred, the method includes parsing...
8196194 Method and network for securely delivering streaming data  
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client...
8191159 Data security for digital data storage  
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data...
8191162 System and method for securing and tracking files  
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing system is connected to a server for...
8190922 Extensible and flexible electronic information tracking systems and methods  
A method and system for tracking electronic information includes the steps of: encrypting an electronic file stored on a hardware storage device; attaching or incorporating with the file a...
8190902 Techniques for digital signature formation and verification  
Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with...