Sign up


Match Document Document Title
8290817 Selectable options for downloading digital content to a mobile terminal  
A user may select and purchase digital content for a mobile terminal over a wireless communication system. The user may select among two or more delivery options, each having a different price....
8291467 Information processing apparatus, information management method, and storage medium therefor  
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security policy for a second file generated...
8290155 Information processing apparatus, information recording medium, information processing method and computer program  
A configuration is adopted for including in key specifying information, being the configuration data of a key specifying code, subset division identifying information (partition bit) indicating...
8291504 Enforcing single stream per sign-on from a content delivery network (CDN) media server  
A method for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is...
8291235 Method and system for controlling access of clients and users to a print server  
A method of controlling use of a printer on a network includes providing a key to a client on the network. The key is then used to submit a print job from the client to a printer on the network.
8291482 System for restricting content access and storage  
UIMID of a UIM 50 owned by the owner of a portable phone 40 is stored in an owner information registration area 410b of phone 40. A CPU 405 of portable phone 40, upon receiving content, compares a...
8291229 System and method for digital signatures and authentication  
A system and method for authentication and digital signatures on memory-only supports, comprising a read-once memory unit storing secret arrays, whose contents are destroyed upon reading, a...
8286255 Computer file control through file tagging  
In embodiments of the present invention improved capabilities are described for providing data protection through the detection of tags associated with data or a file. In embodiments the present...
8286236 Manufacturing control system  
Methods and systems for a manufacturing control system include but are not limited to identifying at least one object data file configured to produce an object by a manufacturing machine;...
8281390 Remotely defining security data for authorization of local application activity  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device....
8281149 Privacy-preserving flexible anonymous-pseudonymous access  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
8281147 Image based shared secret proxy for secure password entry  
The claimed subject matter provides systems and/or methods that facilitate utilizing a shared secret to obscure a password within a sequence of characters. The sequence of characters can include...
8275998 Encryption device, key distribution device and key distribution system  
A key distribution system distributes key data for using content to a second encryption device that has been legitimately outsourced processing by a first encryption device. The first encryption...
8275884 Method and system for securely sharing content  
A method and apparatus for securely sharing content are provided, which can securely share the content without allowing access by unauthorized third parties. The method of securely sharing content...
8272061 Method for evaluating a network  
A method for evaluating access rules violations, the method includes: receiving, a model of a computer network; and determining security metrics associated with a violation of an access rule in...
8271804 Information processing device, log management apparatus, and log management program product  
An information processing device creates a hash value from an event log every time the event occurs. The information processing device generates a digital signature by encrypting the hash value...
8271642 System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input  
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential...
8271805 Methods and apparatus for providing a secure buffer  
The present invention provides a secure buffer for use in data storage and encryption processing. Blocks or packets of data are passed to a secure buffer within a processor. The processor may be...
8272042 System and method for automation of information or data classification for implementation of controls  
A system, method and computer program product are provided for monitoring data traffic on one or more networks, determining the classification of the data based on an organization's classification...
8266176 Storage system and file access determination method of the same  
A storage system configured to be applied to a broad range of access forms to the file and improve performance of file access control processing. The storage system may store a part of the access...
8266691 Renewable integrity rooted system  
A method of validating software is disclosed. The method may include receiving, at a first function, a first hash and a first version. The first function may validate a second function according to...
8266429 Technique for securely communicating and storing programming material in a trusted domain  
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the inv...
8266430 Selective shredding in a deduplication system  
Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
8261068 Systems and methods for selective encryption of operating system metadata for host-based encryption of data at rest on a logical unit  
A method is provided for providing an operating system (OS) independent input/output (I/O) filter driver capable of encrypting at least a portion of a logical unit (LUN), the method comprising the...
8261069 Privacy-enhanced searches using encryption  
Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted...
8261098 Method and apparatus for encrypting and processing data in flash translation layer  
A method for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, and an apparatus thereof. The apparatus for encrypting and...
8261096 Information processing apparatus, information recording medium, information processing method, and computer program  
An information processing apparatus, an information recording medium, an information processing method, and a computer program are provided. In an information recording medium storing many pieces...
8261066 System and method for secure storage, transfer and retrieval of content addressable information  
An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key...
8261067 Devices, methods, and systems for sending and receiving case study files  
The present disclosure includes devices, methods, and systems for creating a case study file that includes an image file from an imaging modality, executing a hash algorithm on the case study file...
8261055 Information processing apparatus and system and data communication method pertaining to the information processing system  
A first information processing apparatus encrypts data that it receives from a second information processing apparatus, and transmits the data thus encrypted to an external device. The second...
8254577 Validation of encryption key  
A label corresponding to a cryptographic key is stored at a first computational device. A user provided label is received at a second computational device. The user provided label is sent from the...
8255371 Methods and apparatuses for data protection  
Methods and apparatuses for data protection against corrupted write operations. In one embodiment, a technique of crash protection uses an atomically updated global transaction indicator to switch...
8256009 Method and apparatus for managing digital rights of secure removable media  
Disclosed is a method and apparatus for managing rights object of SRM in a digital rights management system. The method for managing rights object bound to the SRM, comprises: transmitting ROAP...
8250475 Managing icon integrity  
Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the...
8249249 System and method for text-based encryption  
A system, method, and computer program for text-based encryption, involves accessing a text file with a plurality of lines of text characters; re-sequencing each of the text characters in the...
8250630 Detecting unauthorized computer access  
A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first...
8250655 Rapid heuristic method and system for recognition of similarity between malware variants  
A system, method and computer program product for identifying new variants of certain data objects, for example, malware-carrying files, including (a) dividing a file into a plurality of N pieces;...
8250659 Apparatus and method for protecting the integrity of data  
By arranging a redundancy means and a control means upstream from an encryption means which encrypts and decrypts the data to be stored in an external memory, the integrity of data may be ensured...
8250665 Digital Broadcasting system and method of processing data in digital broadcasting system  
A method for controlling a digital television (DTV) includes receiving independent space identification information recorded in a storage area of a compact wireless device and a wired equivalent...
8250365 Page encryption system  
Text containing files are encrypted by first formatting the files for display. The display-formatted files are then run length coded to form files indicating the information. The files are encrypted.
8245270 Resource based dynamic security authorization  
Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a...
8245036 Method and system for establishing a trusted and decentralized peer-to-peer network  
The present invention offers a new and improved method and system to establish a trusted and decentralized peer-to-peer network for: the sharing of computer files between and among computing...
8245035 Merging registry keys  
Two or more separate physical Registry directories are presented as a single (virtual) Registry directory to an application running in a controlled execution environment called a silo. All of the...
8239675 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8239947 Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system  
A user mode application component invokes the assistance of a kernel mode driver component to detect and/or remediate malicious code on a computer system. The user mode application may include code...
8239356 Methods and apparatuses for data protection  
Methods and apparatuses for data protection against corrupted write operations. In one embodiment, a technique of crash protection uses an atomically updated global transaction indicator to switch...
8239923 Controlling computer program extensions in a network device  
A network infrastructure element such as a packet data router or switch hosts an application program and one or more user program extensions to the application program. Logic in the network element...
8238204 Apparatus and method for managing key in library apparatus  
In order to facilitate the management of the hardware key of a library apparatus employing the LTO system, a write function of a noncontact memory (CM: cartridge memory) contained in an LTO tape...
8239676 Secure proximity verification of a node on a network  
A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification protocol. The node-verification...
8239674 System and method of protecting files from unauthorized modification or deletion  
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A...