Sign up


Match Document Document Title
8332658 Computer system, management terminal, storage system and encryption management method  
A computer system in which an encryption-decryption process performed by one encryption-decryption module can be moved to another without stopping the process for a read/write request from a host...
8332632 Method and system for execution monitor-based trusted computing  
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service...
8332907 Detection and management of controlled files  
A remote device may receive a policy definition, search a file system for files that are to be protected, and disposition identified files to protect the files. After completing the protection, a...
8331560 Distributed scalable cryptographic access control  
Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer...
RE43845 Lock-and-key consumer billing data protection system having data encryption capability  
A “lock-and-key” consumer billing data protection capability is provided to telemarketing and electronic marketing systems which are based upon previously-acquired consumer lists. The lists con...
8327138 Method and system for securing digital assets using process-driven security policies  
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt...
8319990 Printing apparatus with data decryption  
A printing apparatus includes a data reading unit that reads data from a storage device that can store pieces of data, the data reading unit being connectable to the storage device, an input panel...
8321667 Security model for common multiplexed transactional logs  
A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used...
8321932 Program-based authorization  
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the...
8321949 Managing software run in a computing system  
In general, one aspect of the subject matter described in this specification can be embodied in a system that includes a network-based information server system; and a computer operable to interact...
8321914 System and method for verifying an attribute in records for procurement application  
A system and associated method for verifying an attribute in records for a procurement application. The procurement application employs a database having a company profile record, a user profile...
8316442 Preventing secure data from leaving the network perimeter  
Secure data is prevented from leaving the perimeter of a network such as an enterprise network or corporate network (“corpnet”) by an arrangement in which a hash of the secure data is per...
8316414 Reconfiguring a secure system  
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The...
8316233 Systems and methods for accessing secure and certified electronic messages  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8316460 Private web browsing using encryption  
Computer-implemented methods for temporarily storing history of a private web browsing session using encryption are provided. In one aspect, a method includes receiving a request to temporarily...
8312546 Systems, apparatus, and methods for detecting malware  
Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity...
8312267 Technique for securely communicating programming content  
A technique for securely transferring content from a first device in a first layer to a second device in a second layer. In one embodiment, the first device is a device in a trusted domain and the...
8312238 Microcomputer and method for controlling memory access  
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or prohibited state to a memory space by a program...
8307409 Electronic information management device, computer readable recording medium, method for controlling access, and method for transferring data  
An electronic information management device includes: an associating unit that associates electronic information with first access right information with respect to each user, the electronic...
8307433 Client side username/password credential protection  
A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a...
8306393 Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium  
A first information recorder comprises a limited number-of-times of copying information setting unit for setting information on the limited number-of-times of copying electronic data, a first...
8307091 Method and apparatus for providing access of network based radio frequency identification information  
A method and apparatus for enabling consumers to scan RFID tags using home based endpoint devices that can transmit the scanned information to network based services are disclosed. Using the RFID...
8302178 System and method for a dynamic policies enforced file system for a data storage device  
An autonomous data storage device for storing data files via an external file interface, the external file interface being controllable from an external device, the device comprising: a physical...
8302194 Using file prevalence to inform aggressiveness of behavioral heuristics  
The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate....
8302039 Secure exchange of information in electronic design automation  
Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured...
8301897 Challenge-based authentication protocol  
Methods and apparatus for authenticating a user are disclosed. According to one aspect of the present invention, a method for authenticating a user includes displaying a first representation of a...
8301884 Method of managing metadata  
Managing metadata in a metadata transmission server by generating a plurality of metadata fragment data by partitioning metadata to be transmitted based upon predetermined segment units, selecting...
8296826 Secure transfer of files  
Disclosed are various systems, methods, and other embodiments for the secure storage of files and the like. In one example, a determination is made in a server as to whether an entity indicated in...
8296570 Flexible method of user authentication  
A method of authorizing a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices...
8295482 Image scanning system, and image scanner and computer readable medium therefor  
An image scanning system includes an image scanner and a terminal device connected with the image scanner. The terminal device accepts a password, stores an image encryption key, encrypts the image...
8291219 System and method for enabling device dependent rights protection  
A system and method for enhancing the protection of digital properties while also increasing the flexibility of distribution of the digital properties. In one embodiment, the digital property is...
8290164 Automatic recovery of TPM keys  
A trusted platform module (TPM) is a silicon chip that constitutes a secure encryption key-pair generator and key management device. A TPM provides a hardware-based root-of-trust contingent on the...
8291471 Managing document access  
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating...
8290817 Selectable options for downloading digital content to a mobile terminal  
A user may select and purchase digital content for a mobile terminal over a wireless communication system. The user may select among two or more delivery options, each having a different price....
8291467 Information processing apparatus, information management method, and storage medium therefor  
An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security policy for a second file generated...
8290155 Information processing apparatus, information recording medium, information processing method and computer program  
A configuration is adopted for including in key specifying information, being the configuration data of a key specifying code, subset division identifying information (partition bit) indicating...
8291504 Enforcing single stream per sign-on from a content delivery network (CDN) media server  
A method for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is...
8291235 Method and system for controlling access of clients and users to a print server  
A method of controlling use of a printer on a network includes providing a key to a client on the network. The key is then used to submit a print job from the client to a printer on the network.
8291482 System for restricting content access and storage  
UIMID of a UIM 50 owned by the owner of a portable phone 40 is stored in an owner information registration area 410b of phone 40. A CPU 405 of portable phone 40, upon receiving content, compares a...
8291229 System and method for digital signatures and authentication  
A system and method for authentication and digital signatures on memory-only supports, comprising a read-once memory unit storing secret arrays, whose contents are destroyed upon reading, a...
8286255 Computer file control through file tagging  
In embodiments of the present invention improved capabilities are described for providing data protection through the detection of tags associated with data or a file. In embodiments the present...
8286236 Manufacturing control system  
Methods and systems for a manufacturing control system include but are not limited to identifying at least one object data file configured to produce an object by a manufacturing machine;...
8281390 Remotely defining security data for authorization of local application activity  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device....
8281149 Privacy-preserving flexible anonymous-pseudonymous access  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
8281147 Image based shared secret proxy for secure password entry  
The claimed subject matter provides systems and/or methods that facilitate utilizing a shared secret to obscure a password within a sequence of characters. The sequence of characters can include...
8275998 Encryption device, key distribution device and key distribution system  
A key distribution system distributes key data for using content to a second encryption device that has been legitimately outsourced processing by a first encryption device. The first encryption...
8275884 Method and system for securely sharing content  
A method and apparatus for securely sharing content are provided, which can securely share the content without allowing access by unauthorized third parties. The method of securely sharing content...
8272061 Method for evaluating a network  
A method for evaluating access rules violations, the method includes: receiving, a model of a computer network; and determining security metrics associated with a violation of an access rule in...
8271804 Information processing device, log management apparatus, and log management program product  
An information processing device creates a hash value from an event log every time the event occurs. The information processing device generates a digital signature by encrypting the hash value...
8271642 System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input  
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential...