Sign up


Match Document Document Title
8468543 System and method for preventing DRM client crash using process separate execution  
A computer system includes a DRM client system in which a plurality of DRM clients are installed, comprising: a virtual OS managing unit that separates a kernel of an actual operating system...
8468345 Containerless data for trustworthy computing and data services  
A digital escrow pattern and trustworthy platform is provided for data services including mathematical transformation techniques, such as searchable encryption techniques, for obscuring data stored...
8468344 Enabling multi-level security in a single-level security computing system  
According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that...
8468607 Associating multiple security domains to application servers  
Multiple security domains can be created and associated with various scopes within the cell allowing security configurations of each scope to be managed collectively. Examples of scopes include the...
8462665 Shared community storage network  
A hardware and/or software facility for durably and securely storing data within a shared community storage network. A user may have a storage device that they intend to share with others in the...
8464051 Method, apparatus, terminal and system for channel encryption  
The disclosure discloses a method, an apparatus, a terminal and a system for channel encryption. The method includes that: a relay server receives a channel encryption request from a client, and...
8464328 Method for protecting personal data read in a terminal station by a server  
The invention concerns a method enabling a server manager to prove subsequently that the server was authorized to read a user's personal data in a terminal station (ST), comprising: transmitting...
8463776 Image file container  
An image container file has at least first and second multimedia streams (MSs). The first MS includes first image data representing an image. The second MS includes arbitrary data, which can for...
8464324 System and method for identity verification on a computer  
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity...
8464347 Software updating apparatus, software updating system, alteration verification method and alteration verification program  
Provided is a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules receives, from an external server (200), a...
8464050 Selective authorization of the loading of dependent code modules by running processes  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating...
8464049 Method and system of accessing copy-prevented encrypted data resources over a network  
A system of accessing a copy-prevented encrypted data file transmitted over a network includes a server apparatus having data files; and a client apparatus comprising a read apparatus and a...
8464314 Enforcing universal access control in an information management system  
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy...
8458463 Method for safe operation and a system thereof  
The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system to...
8458458 Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method  
A security module is provided in a data recording medium, data to be written to the data recording medium is encrypted with an content key different from one data to another, and the content key is...
8458467 Method and apparatus for adaptive application message payload content transformation in a network infrastructure element  
Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation...
8458778 System, method, and apparatus for on-demand limited security credentials in wireless and other communication networks  
A method includes storing a security credential associated with a communication network on a portable storage device. The method also includes detecting removal of the portable storage device from...
8452987 Method and system for disaster recovery in a secure reprogrammable system  
Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable...
8448228 Separating authorization identity from policy enforcement identity  
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the...
8447037 Key tree construction and key distribution method for hierarchical role-based access control  
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role...
8447974 Method and apparatus for managing access rights to information spaces  
An approach is provided for managing access rights of users to information spaces using signatures stored in a memory tag. A signature manager caused reading of a memory tag to initiate a request,...
8447973 System, server, and device for providing contents  
According to an aspect of the invention, a content providing system is provided that includes a client device configured to receive contents and a server connected to the client device that...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored...
8443189 Trust event notification and actions based on thresholds and associated trust metadata scores  
An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust...
8442489 System and method for configuring devices for secure operations  
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices....
8443188 Using code access security for runtime accessibility checks  
Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private...
8438386 System and method for developing a risk profile for an internet service  
A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a...
8438647 Recovery of encrypted data from a secure storage device  
An exemplary software product to recover encrypted data from a target secure storage device can comprise software operational when executed by a processor to receive a recovery request to recovery...
8433927 Cryptographically-enabled privileged mode execution  
A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to...
8433899 System and method for authenticating data using incompatible digest functions  
A system for authenticating data of interest includes a digest locator engine capable to locate a first and a second digest result in a data file, including a set of data; a first digest creator...
8433901 System and method for wiping encrypted data on a device having file-level content protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing...
8429419 Method for securing authorized data entry and the device to perform this method  
A method and device for authorized data entry and securing the authenticity of such data when entering cryptographic operations in a computer requiring authorized data entry, sends a specific...
8429753 Controlling access to documents using file locks  
Examples are related to systems and methods for controlling access to document files on a document server. One example system includes document files stored on a document server, at least one of...
8429429 Computer security system and method  
A method is provided for protecting a computer system, comprising: attaching a security descriptor to a process running on a processor of the computer system; associating with the security...
8429414 Apparatus and method of generating and detecting prevention and control data for verifying validity of data  
A method of generating prevention and control data to verify validity of data to be transmitted, and an apparatus to perform the method, the method including generating the prevention and control...
8429755 System and method for receiving digital content  
A method and system for conducting a transaction involving digital content is provided. The system includes, a first user of a first mobile device connected to a network; a second user of a second...
8429401 Method and apparatus for virtually erasing data from WORM storage devices  
A storage device capable of selectively rendering certain data irretrievable is disclosed. The storage device includes Write Once Read Many (WORM) storage medium, a key generator, an encrypted...
8429425 Electronic backup and restoration of encrypted data  
Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes identifying an encrypted source disk image to be included...
8423780 Encryption based security system for network storage  
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access storage from the ability to access the...
8423765 System and method for remote device registration  
A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more...
8424106 Securing a communication protocol against attacks  
A method, system, and computer usable program product for securing a data communication against attacks are provided in the illustrative embodiments. A segment in the data communication is received...
8422674 Application-specific secret generation  
A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware...
8417946 Method and apparatus for accessing an electronic device by a data terminal  
This invention pertains to methods and apparatus for accessing an electronic device by a data terminal, as well as a computer program product, an electronic device and a data terminal.
8417868 Method, apparatus and system for offloading encryption on partitioned platforms  
A method, apparatus and system enable offloading of encryption on partitioned platforms. More specifically, a partitioned platform may include a user partition for user applications, including a...
8412935 Administration of storage systems containing three groups of data-operational, backup, and standby  
A storage system that administrates data to be mounted on a client terminal, the data being categorized into a plurality of generations, and that controls data in response to a request to mount...
8412934 System and method for backing up and restoring files encrypted with file-level content protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating a backup, backing up encrypted data, and restoring backed up encrypted data. The method for...
8412936 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Binding content licenses to portable storage devices
 
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage dev...
8413233 Authorizing local application activity using remotely defined security data  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A...
8407757 Specifying and enforcing run-time policies for application processes being executed on a computer  
The present invention provides a method and system of specifying and enforcing at least one run-time policy for at least one computer process executing on a computer system, where the computer...
8407469 Protection against unintentional file changing  
Files are protected against intrusion. A first embodiment protects certain files against changes. A second embodiment encrypts the files that are stored using user's personal information.