Sign up


Match Document Document Title
8370954 Content management systems and methods including content usage restrictions  
Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which...
8369530 Network set-up device  
A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a...
8365307 Method and apparatus for storing copy protection information separately from protected content  
A copy protection apparatus and method enabling storage of copy protection information separately from protected content is disclosed. One embodiment includes a digital data signal receiver to...
8364983 Corralling virtual machines with encryption keys  
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more...
8363837 Data storage device with data transformation capability  
In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive includes...
8363258 Content transmission device, content transmission method, and computer program used therewith  
A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission...
8364955 Systems and methods for effectively removing access to individual files on magnetic tape media  
A method for effectively removing access to individual files on magnetic tape media may include: 1) encrypting a file, 2) storing the encrypted file on a tape medium, 3) storing a cryptographic key...
8365298 Comprehensive security architecture for dynamic, web service based virtual organizations  
A comprehensive security architecture for a virtual organization (VO) is disclosed. The comprehensive security architecture uses the same security mechanism or substantially similar security...
8364965 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8359467 Access control system and method  
Certain embodiments of the invention relate to an access control system for controlling access to file system objects stored in a digital file system store. The system provides a first compartment...
8359656 Media processing system supporting different media formats via server-based transcoding  
A method for processing media content includes receiving, at a second communications device communicatively coupled to a network at a first geographic location, from a first wireless mobile...
8356178 Method and apparatus for authenticated data storage  
A method includes: computing a first message authentication code for each of a plurality of sets of data blocks on a data storage medium, and authenticating the sets of data blocks by computing a...
8356174 System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage  
The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed data. The data is encrypted by the...
8356356 Anti-debugger comprising spatially and temporally separate detection and response portions  
An anti-debugger comprises spatially and temporally separate detection and response portions. In an example configuration, the anti-debugger is implemented into a game system for detecting and...
8353028 Render engine, and method of using the same, to verify data for access and/or publication via a computer system  
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce listing) that includes active content...
8353038 Monitoring and managing changes to non-structured storage of system configuration information  
A configuration information manager monitors attempts by processes to update non-structured storage of system configuration information, such as plain text files which contain system configuration...
8352731 Secure decentralized storage system  
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale...
8352735 Method and system for encrypted file access  
A method and system for encrypted file access are provided. The method includes the steps of: receiving (502, 552) an access request for an encrypted file (401-403) by an application (110);...
8353055 Method and apparatus for processing rights object  
A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media...
8352999 Method for managing data in a shared computing environment  
A method of storing secret data in a shared computing environment includes defining secret data, such as a password and administration policies according to a schema of a directory server such as a...
8345873 Methods and systems for N-state signal processing with binary devices  
Linear Feedback Shift Registers (LFSRs) based 2p state with p>2 or p≧2 scramblers, descramblers, sequence generators and sequence detectors in binary implementation are provided. An LFSR may a...
8346926 Granting access to a content unit stored on an object addressable storage system  
Aspects of the invention relate to sharing content stored on an object addressable storage (OAS) system among a plurality of users of the OAS system and authenticating users to an OAS system. In...
8347085 Integrating security protection tools with computer device integrity and privacy policy  
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) run...
8347359 Encryption sentinel system and method  
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server...
8347112 Encryption/decryption engine with secure modes for key decryption and key derivation  
In at least some embodiments, an electronic device comprises a processor and an encryption/decryption (E/D) engine coupled to the processor via a bus. The E/D engine selectively operates in a first...
8347087 Support for multiple digital rights management systems for same content  
Techniques, systems, and apparatus, including medium-encoded computer program products, for protecting a document with multiple digital rights management systems are presented. A described...
8345869 Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network  
A communication system 100 includes a group of user devices, a first device separate from the group of user devices, a first satellite, a peer-to-peer network 130 in communication with the user...
8345870 Method and apparatus for encrypting encoded audio signal  
Advanced solutions for encrypting multi-layer audio data are required, ie. audio data that comprise a base layer and one or more enhancement layers. A method for encrypting such an encoded audio...
8347086 System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium  
A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method...
RE43906 Method and apparatus for securing digital assets  
Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is classified, at least a security clearance...
8341406 System and method for providing different levels of key security for controlling access to secured items  
With files secured by encryption techniques, keys are often required to gain access to the secured files. Techniques for providing and using multiple levels of keystores for securing the keys are...
8341736 Detection and dynamic alteration of execution of potential software threats  
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a...
8341753 Managing pre-release of a game application over a network  
A system, method, and apparatus are arranged to enable loading of an application, such as a game application, prior to a formal release date of the application. An end-user is provided components...
8341405 Access management in an off-premise environment  
A system that can assist users to manage a personal active directory for all of their information maintained within a cloud-based environment is provided. The identity of a client that accesses...
8341733 Creating secured file views in a software partition  
A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is...
8341404 System and method for intelligence based security  
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with...
8336097 Apparatus and method for monitoring and protecting system resources from web browser  
An apparatus and method for preventing an attempt to perform malicious activities using web browser weaknesses are provided. A file protection module monitors attempts to access at least one file...
8336109 Method and apparatus for processing rights object  
A method and apparatus for processing a Rights Object (RO) are provided. A method for upgrading the RO includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8332655 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects  
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query...
8332942 File system event tracking  
Automated file system event tracking and reporting techniques are described in which file system events requested by a user application are intercepted and recorded prior to the request being...
8332658 Computer system, management terminal, storage system and encryption management method  
A computer system in which an encryption-decryption process performed by one encryption-decryption module can be moved to another without stopping the process for a read/write request from a host...
8332632 Method and system for execution monitor-based trusted computing  
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service...
8332907 Detection and management of controlled files  
A remote device may receive a policy definition, search a file system for files that are to be protected, and disposition identified files to protect the files. After completing the protection, a...
8331560 Distributed scalable cryptographic access control  
Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer...
RE43845 Lock-and-key consumer billing data protection system having data encryption capability  
A “lock-and-key” consumer billing data protection capability is provided to telemarketing and electronic marketing systems which are based upon previously-acquired consumer lists. The lists con...
8327138 Method and system for securing digital assets using process-driven security policies  
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt...
8319990 Printing apparatus with data decryption  
A printing apparatus includes a data reading unit that reads data from a storage device that can store pieces of data, the data reading unit being connectable to the storage device, an input panel...
8321667 Security model for common multiplexed transactional logs  
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used...
8321932 Program-based authorization  
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the...