Sign up


Match Document Document Title
8156561 Method and apparatus for setting access restriction information  
Access restriction information that an old storage device has is transferred to a new storage device. A management server 2200 obtains a port management TL 2445 that the old storage device 2400...
8156503 System, method and computer program product for accessing a memory space allocated to a virtual machine  
A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential...
8156322 Critical security parameter generation and exchange system and method for smart-card memory modules  
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it...
8156328 Encryption method and device  
A method and a device are disclosed for the low-cost implementation even of high-performance encryption functions in an encryptor. The encryptor may be composed merely of PC software or the like,...
8151347 Clustered file system for mix of trusted and untrusted nodes  
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory...
8150897 Computer file system driver control method, program thereof, and program recording medium  
In the method of controlling a file system driver of an electronic computer and the program for the method and further the storage medium containing the program according to the present invention,...
8151346 Unauthorized usage prevention system and information processing apparatus  
A disclosed unauthorized usage prevention system enables execution of at least one software item including an identification information item uniquely associated with the software item, based on a...
8149467 E-mail transmission apparatus, e-mail transmission method and e-mail transmission program  
A technology for use in an e-mail transmission apparatus capable of preventing or discovering ‘impersonation’ in e-mail transmission efficiently, in which an e-mail is sent not only to a rec...
8151339 Method and apparatus for implementing filter rules in a network element  
Multiple non-conflicting actions associated with filter rules may be located and applied to a packet using a single ACL lookup by causing action records to be created from ACEs in the ACL, and then...
8151345 Self-authorizing devices  
Self-authorizing cards and cellular network adapters for authorization of financially payments and other secure transactions. In some embodiments a smart card is provided with a connector for a USB...
8151109 Selective authorization of the loading of dependent code modules by running processes  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, file system or operating system activity relating to a first code module is...
8151349 Masking mechanism that facilitates safely executing untrusted native code  
This disclosure presents a system that uses masking to safely execute native code. This system includes a processing element that executes the native code and a memory which stores code and data...
8145904 System and method for network edge data protection  
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate...
8145900 Crypto-pointers for secure data storage  
This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data...
8141136 Method and system of replacing smart card  
The present invention disclosed a method and system of replacing smart cards. It uses a new identification device (a new SIM) to replace an old one (an old SIM) associated with a user account. The...
8140860 Policy-driven file system with integrated RAID functionality  
A filing system controls block-level storage and selects a required level of performance and reliability for a file stored on a storage system on a file-by-file basis. A policy manager contains at...
8140866 Secure storage in file system  
A node may contain a secure store agent. A process executing on the node may request connection information from the secure store agent. An encryption key phrase may be accessed, responsive to the...
8140846 System for managing program applications storable in a mobile terminal  
Management server 16 may obtain application programs from content server 20 in response to requests of mobile terminal 11. Management server 16 may transmit the obtained application programs to...
8135129 Protection of a modular exponentiation calculation performed by an integrated circuit  
A method and a circuit for protecting a numerical quantity contained in an integrated circuit on a first number of bits, in a modular exponentiation computing of a data by the numerical quantity,...
8130959 Rekeying encryption for removable storage media  
Provided are a method, system, and article of manufacture for rekeying encryption keys for removable storage media. A rekey request is received for a coupled removable storage media, wherein...
8130960 Method and apparatus for providing seamless file system encryption from a pre-boot environment into a firmware interface aware operating system  
Methods and apparatus for providing seamless functionality in a computer are disclosed. For example, an encrypted file system manager is included to layer an encoded File Allocation Table on top of...
8130962 Content protection method and apparatus  
There is disclosed a content protection method and apparatus. The content protection method and apparatus further improves such related schemes by facilitating spatial as well as temporal...
8130963 Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site  
Rather than downloading each content document on demand from the publisher location to the user site, at the publisher location, each content document is encrypted and then multiple encrypted...
8132014 Image archiver  
An archiver system for tracking the exchange of personally identifiable information in document production systems includes a document production device and a media writer. When a document...
8127150 Data security  
In one embodiment, a method is provided that may include encrypting, based least in part upon at least one key, one or more respective portions of input data to generate one or more respective...
8123126 Anti-counterfeit packaging  
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a random mark; and an electronic memory...
8122517 Mediated access of software dumped data through specialized analysis modules  
The present invention can include a method, computer program product, and system for mediating access to content of a software dump. The invention can identify an event occurring within a computing...
8117441 Integrating security protection tools with computer device integrity and privacy policy  
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) run...
8117464 Sub-volume level security for deduplicated data  
A network storage server receives write requests from clients via a network and internally buffers data blocks written by the write requests. At a consistency point, the storage server commits the...
8117648 Secure information storage and delivery system and method  
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level...
8108928 Adaptive traitor tracing  
One embodiment of the present invention includes a method for traitor tracing that selects a probability distribution for the assignment of file-segment variations in a digital file. This...
8108671 Method and system for controlling presentation of computer readable media on a media storage device  
A method of controlling presentation of content on a media storage device is described. The method is comprised of verifying the presence of a media presentation mechanism and a usage compliance...
8108314 Content use control device, recording device, reproduction device, recording medium, and content use control method  
A collective content consisting of a plurality of partial contents holding license information including a use condition can be appropriately used according to the use condition contained in the...
8108313 Rights expression profile system and method using templates  
A system and method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression, including specifying...
8103878 Control device, update method and control software  
To update the program, the file is updated by verifying according to a digital signature attached to the file having the program converted whether the file is not dishonestly falsified. To verify...
8103724 Method and program product for securing privacy of an e-mail address in an e-mail  
A method and program product for securing privacy of an e-mail address is provided. The method includes generating an e-mail message to one or more recipients on a sender e-mail client and...
8096466 Transaction recordal system  
A system for recording a transaction relating to a security document, the security document having disposed thereon or therein coded data including a number of coded data portions. Each coded data...
8099592 System and method for controlling data communications between a server and a client device  
A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the...
8099596 System and method for malware protection using virtualization  
Disclosed are systems, methods and computer program products for protecting applications deployed on a host computer from malware using virtualization. An exemplary malware protection system may...
8099770 Apparatus, and an associated methodology, for facilitating authentication using a digital music authentication token  
An apparatus, and an associated methodology, for facilitating authentication of a user device to access content at another device. A music file is selected as digital music authentication token....
8099781 Method of managing and mitigating security risks through planning  
An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related...
8099599 Controlling access to data streams  
Access to one or more data streams can be controlled by encrypting a description of how segments of the data streams can be assembled, for example, to produce an audio or video program. Access to...
8095791 Distributed processing system, distributed processing method and image processing apparatus  
A distributed storage system implements high-speed data reconstitution processing while ensuring a high security level. Devices (63) in a device group (51) with security level “low” dis...
8095790 Information processing apparatus and method, and computer program  
A recording/playback apparatus for recording or playing back content is provided. For example, a playback unit plays back a medium on which an encrypted content management unit and an encrypted...
8095804 Storing deleted data in a file system snapshot  
Aspects of the invention relate to creating a snapshot of a file system on an OAS system. A snapshot of a file system is an image of a file system at a particular point in time. A snapshot of a...
8095990 Gaming machine, gaming information authentication loading device and gaming information loading device  
A gaming machine comprises a gaming board and a mother board. The gaming board comprises a boot ROM and a card slot. The boot ROM stores therein an authentication program for authenticating a...
8090104 Method of descrambling a scrambled content data object  
In a method of descrambling a scrambled content data object, at least a section of the scrambled content data object is descrambled by applying at least one decryption operation under a key at...
8090100 Storage apparatus and data management method for changing keys of a logical volume and common resource  
A storage apparatus, which controls the input and output of data to and from a computer, includes a logical volume for storing data from the computer, a common resource for storing data pre-stored...
8090103 Method of managing copy protection information of a recording medium, recording medium with copy protection information for contents recorded thereon, and reproducing method for the recording medium  
The present invention relates to a method of managing CPI (Copy Protection Information) for preventing unauthorized copy of encrypted content recorded on a high-density recording medium such as a...
8090942 Method and system for asymmetrically encrypting .ZIP files  
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in...