Sign up


Match Document Document Title
8214902 Determination by circuitry of presence of authorized and/or malicious data  
An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine,...
8214643 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method  
An object is to provide a service providing method capable of curbing rise of cost A service providing method according to the present invention is one for providing services A and B, which...
8214908 Electronic musical apparatus, control method therefor, and program for implementing the control method  
An automatic performance apparatus which can make it difficult to discriminate between music contents which require copyright protection and music contents which do not require copyright...
8209540 Incremental secure backup and restore of user settings and data  
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to the manifest. The data processing...
8205079 Encryption/decryption system and method thereof  
An encryption/decryption system includes a displaying unit, an operating unit, a pressure sensing unit and an indicating unit. The displaying unit is configured for displaying files. The operating...
8205077 Management apparatus  
A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret...
8205078 Handling files containing confidential or sensitive information  
A method, apparatus, and computer instructions for managing files in a data processing system. An attribute for a file is specified as having a special designation. The file with the attribute...
8205094 Tamper evident removable media storing executable code  
A mobile wireless device operable to install code on a removable medium, in which the device is programmed to calculate and store a digest of this code into a persistent non-removable store inside...
8204929 Hiding sensitive information  
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information to be relatively securely and...
8201244 Automated malware signature generation  
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown...
8201228 System and method for securing a network  
A method of securing a telecom network, the operation of the telecom network controlled using a plurality of telecom network commands, includes grouping at least some of the plurality of telecom...
8200965 Storage system for data encryption  
A storage system including a host interface connected via a network to a host computer; a disk interface connected to a disk drive; a memory module that stores control information of a cache memory...
8200964 Method and apparatus for accessing an encrypted file system using non-local keys  
One embodiment of the present invention provides a system for accessing an encrypted file through a file system. During operation, the system receives a request to access the encrypted file. In...
8195938 Cloud-based application whitelisting  
Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution...
8196200 Piggybacking malicious code blocker  
A method includes determining whether a transaction request has occurred during a transaction session. Upon a determination that a transaction request has occurred, the method includes parsing...
8196194 Method and network for securely delivering streaming data  
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client...
8191159 Data security for digital data storage  
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data...
8191162 System and method for securing and tracking files  
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing system is connected to a server for...
8190922 Extensible and flexible electronic information tracking systems and methods  
A method and system for tracking electronic information includes the steps of: encrypting an electronic file stored on a hardware storage device; attaching or incorporating with the file a...
8190902 Techniques for digital signature formation and verification  
Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with...
8191115 Method and apparatus for extensible security authorization grouping  
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators...
8191165 Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity  
A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide...
8185736 File transfer system for direct transfer between computers  
A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a...
8185954 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8185751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system  
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical...
8181266 Method for moving a rights object between devices and a method and device for using a content object based on the moving method and device  
A method for moving a rights object (RO) between devices, a method of using a content object based on the moving method, and devices using the methods are provided. The moving method includes...
8181248 System and method of detecting anomaly malicious code by using process behavior prediction technique  
Provided are a pattern analyzing/detecting method and a system using the same that are capable of detecting and effectively preventing an unknown malicious code attack. To detect such an attack,...
8181220 Method and apparatus for digital rights management policies  
Method and apparatus are described wherein, in one example embodiment, there is provided one or more policy templates that may define a set of policy permissions or other attributes that may be...
8181022 Method and apparatus for controlling access restrictions for media playback  
A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be...
8181020 System and method for securely storing firmware  
A mechanism for creating and accessing a secure storage area for firmware that stores a “Virtual ROM” module reference or pointer in the actual ROM that includes a unique identifier for the vir...
8176334 Document security system that permits external users to gain access to secured files  
An improved system and approaches for exchanging secured files (e.g., documents) between internal users of an organization and external users are disclosed. A file security system of the...
8176318 Method and system for providing a customized network  
The present invention comprises a method, system, and computer-readable medium for providing a secure computer network for the real time transfer of data. The data is grouped and stored as per user...
8176568 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system  
A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each...
8176249 Methods for embedding session secrets, within application instances  
Method for embedding a session secret, within an application instance, comprising the steps of generating an ephemeral session secret by a master application. Embedding, by master application,...
8175271 Method and system for security protocol partitioning and virtualization  
A method for implementing a security protocol, involving receiving a packet from a network connection, obtaining an identifier for one of a plurality of security association database (SADB)...
8176333 Method and apparatus for protecting external call references  
The present invention is generally directed to a method, system, and article of manufacture that ensures the integrity of programs having variable portions. One aspect of this invention is a method...
8176319 Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system  
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical...
8171540 Method and system for E-mail management of E-mail having embedded classification metadata  
A method and system method for e-mail management of e-mails having embedded classification metadata. A query from an end user to access an e-mail account by an e-mail client is received. It is then...
8171566 Copyright protection data processing system and reproduction device  
If playback devices are prohibited from playing back contents recorded in R media, there occurs a problem that it takes more time to manufacture commercial ROM media. Conversely, if playback...
8171479 Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers  
A method for presenting an aggregate view of native resources includes the step of enumerating a plurality of system-scoped native resources provided by a system scope. A plurality of...
8171286 Computer program for securely viewing a file  
A method for distributing a password protected content file without revealing the password to a recipient. An unlocking program that has access to at least one password corresponding to the...
8171549 Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data, files and their transfer  
Apparatus, methods and articles of manufacture are disclosed for analyzing code. A valuation component, which provides a value for analyzed code is comprised of a tokenization component, hashing...
8171532 Management apparatus, management method and recording medium storing program  
A management apparatus which includes: a receiving unit that receives first authorization information for a first document that is already issued and contains document identification information...
8171558 Inter-program authentication using dynamically-generated public/private key pairs  
In a multi-tiered computing environment, a first program may authenticate with a second program using dynamically-generated public/private key pairs. An authentication token is constructed that...
8171285 Cryptographically signed filesystem  
A cryptographically signed filesystem provides a central database resident on a server that contains database objects. The server creates startup software to be installed in a client system's read...
8171563 Secure message system with remote decryption service  
Systems and methods for secure messaging are provided. A sender may encrypt content and send the encrypted content to a recipient over a communications network. The encrypted content may be...
8171307 Background encryption of disks in a large cluster  
The invention provides for rekeying a large cluster of storage security appliances which allows more than two of the storage security appliances to proxy a single storage medium while encrypting...
8166313 Method and apparatus for dump and log anonymization (DALA)  
According to one embodiment of the invention, an original dump file is received from a client machine to be forwarded to a dump file recipient. The original dump file is parsed to identify certain...
8166291 System for managing program applications storable in a mobile terminal  
Management server 16 may obtain application programs from content server 20 in response to requests of mobile terminal 11. Management server 16 may transmit the obtained application programs to...
8160566 Message sender controllable messaging system  
The present invention relates to a mobile phone and a method for its operation and control. The mobile phone is capable of receiving the message sent by other mobile phones through a message...