Sign up


Match Document Document Title
8321667 Security model for common multiplexed transactional logs  
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used...
8321932 Program-based authorization  
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the...
8321949 Managing software run in a computing system  
In general, one aspect of the subject matter described in this specification can be embodied in a system that includes a network-based information server system; and a computer operable to interact...
8321914 System and method for verifying an attribute in records for procurement application  
A system and associated method for verifying an attribute in records for a procurement application. The procurement application employs a database having a company profile record, a user profile...
8316442 Preventing secure data from leaving the network perimeter  
Secure data is prevented from leaving the perimeter of a network such as an enterprise network or corporate network (“corpnet”) by an arrangement in which a hash of the secure data is per...
8316414 Reconfiguring a secure system  
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The...
8316233 Systems and methods for accessing secure and certified electronic messages  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8316460 Private web browsing using encryption  
Computer-implemented methods for temporarily storing history of a private web browsing session using encryption are provided. In one aspect, a method includes receiving a request to temporarily...
8312546 Systems, apparatus, and methods for detecting malware  
Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity...
8312267 Technique for securely communicating programming content  
A technique for securely transferring content from a first device in a first layer to a second device in a second layer. In one embodiment, the first device is a device in a trusted domain and the...
8312238 Microcomputer and method for controlling memory access  
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or prohibited state to a memory space by a program...
8307409 Electronic information management device, computer readable recording medium, method for controlling access, and method for transferring data  
An electronic information management device includes: an associating unit that associates electronic information with first access right information with respect to each user, the electronic...
8307433 Client side username/password credential protection  
A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a...
8306393 Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium  
A first information recorder comprises a limited number-of-times of copying information setting unit for setting information on the limited number-of-times of copying electronic data, a first...
8307091 Method and apparatus for providing access of network based radio frequency identification information  
A method and apparatus for enabling consumers to scan RFID tags using home based endpoint devices that can transmit the scanned information to network based services are disclosed. Using the RFID...
8302178 System and method for a dynamic policies enforced file system for a data storage device  
An autonomous data storage device for storing data files via an external file interface, the external file interface being controllable from an external device, the device comprising: a physical...
8302194 Using file prevalence to inform aggressiveness of behavioral heuristics  
The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate....
8302039 Secure exchange of information in electronic design automation  
Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured...
8301897 Challenge-based authentication protocol  
Methods and apparatus for authenticating a user are disclosed. According to one aspect of the present invention, a method for authenticating a user includes displaying a first representation of a...
8301884 Method of managing metadata  
Managing metadata in a metadata transmission server by generating a plurality of metadata fragment data by partitioning metadata to be transmitted based upon predetermined segment units, selecting...
8296826 Secure transfer of files  
Disclosed are various systems, methods, and other embodiments for the secure storage of files and the like. In one example, a determination is made in a server as to whether an entity indicated in...
8296570 Flexible method of user authentication  
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices...
8295482 Image scanning system, and image scanner and computer readable medium therefor  
An image scanning system includes an image scanner and a terminal device connected with the image scanner. The terminal device accepts a password, stores an image encryption key, encrypts the image...
8291219 System and method for enabling device dependent rights protection  
A system and method for enhancing the protection of digital properties while also increasing the flexibility of distribution of the digital properties. In one embodiment, the digital property is...
8290164 Automatic recovery of TPM keys  
A trusted platform module (TPM) is a silicon chip that constitutes a secure encryption key-pair generator and key management device. A TPM provides a hardware-based root-of-trust contingent on the...
8291471 Managing document access  
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating...
8290817 Selectable options for downloading digital content to a mobile terminal  
A user may select and purchase digital content for a mobile terminal over a wireless communication system. The user may select among two or more delivery options, each having a different price....
8291467 Information processing apparatus, information management method, and storage medium therefor  
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security policy for a second file generated...
8290155 Information processing apparatus, information recording medium, information processing method and computer program  
A configuration is adopted for including in key specifying information, being the configuration data of a key specifying code, subset division identifying information (partition bit) indicating...
8291504 Enforcing single stream per sign-on from a content delivery network (CDN) media server  
A method for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is...
8291235 Method and system for controlling access of clients and users to a print server  
A method of controlling use of a printer on a network includes providing a key to a client on the network. The key is then used to submit a print job from the client to a printer on the network.
8291482 System for restricting content access and storage  
UIMID of a UIM 50 owned by the owner of a portable phone 40 is stored in an owner information registration area 410b of phone 40. A CPU 405 of portable phone 40, upon receiving content, compares a...
8291229 System and method for digital signatures and authentication  
A system and method for authentication and digital signatures on memory-only supports, comprising a read-once memory unit storing secret arrays, whose contents are destroyed upon reading, a...
8286255 Computer file control through file tagging  
In embodiments of the present invention improved capabilities are described for providing data protection through the detection of tags associated with data or a file. In embodiments the present...
8286236 Manufacturing control system  
Methods and systems for a manufacturing control system include but are not limited to identifying at least one object data file configured to produce an object by a manufacturing machine;...
8281390 Remotely defining security data for authorization of local application activity  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device....
8281149 Privacy-preserving flexible anonymous-pseudonymous access  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
8281147 Image based shared secret proxy for secure password entry  
The claimed subject matter provides systems and/or methods that facilitate utilizing a shared secret to obscure a password within a sequence of characters. The sequence of characters can include...
8275998 Encryption device, key distribution device and key distribution system  
A key distribution system distributes key data for using content to a second encryption device that has been legitimately outsourced processing by a first encryption device. The first encryption...
8275884 Method and system for securely sharing content  
A method and apparatus for securely sharing content are provided, which can securely share the content without allowing access by unauthorized third parties. The method of securely sharing content...
8272061 Method for evaluating a network  
A method for evaluating access rules violations, the method includes: receiving, a model of a computer network; and determining security metrics associated with a violation of an access rule in...
8271804 Information processing device, log management apparatus, and log management program product  
An information processing device creates a hash value from an event log every time the event occurs. The information processing device generates a digital signature by encrypting the hash value...
8271642 System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input  
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential...
8271805 Methods and apparatus for providing a secure buffer  
The present invention provides a secure buffer for use in data storage and encryption processing. Blocks or packets of data are passed to a secure buffer within a processor. The processor may be...
8272042 System and method for automation of information or data classification for implementation of controls  
A system, method and computer program product are provided for monitoring data traffic on one or more networks, determining the classification of the data based on an organization's classification...
8266176 Storage system and file access determination method of the same  
A storage system configured to be applied to a broad range of access forms to the file and improve performance of file access control processing. The storage system may store a part of the access...
8266691 Renewable integrity rooted system  
A method of validating software is disclosed. The method may include receiving, at a first function, a first hash and a first version. The first function may validate a second function according to...
8266429 Technique for securely communicating and storing programming material in a trusted domain  
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the inv...
8266430 Selective shredding in a deduplication system  
Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
8261068 Systems and methods for selective encryption of operating system metadata for host-based encryption of data at rest on a logical unit  
A method is provided for providing an operating system (OS) independent input/output (I/O) filter driver capable of encrypting at least a portion of a logical unit (LUN), the method comprising the...