Sign up


Match Document Document Title
8386793 Method and apparatus for implementing electronic seal  
A method provided herein includes the following steps: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external...
8387146 System and method for tracking computer viruses  
A method for collecting and distributing data on computer viruses identified on a plurality of computers during virus scanning includes receiving virus scan results from the plurality of computers...
8386768 High performance data encryption server and method for transparently encrypting/decrypting data  
High-performance data encryption/decryption server and method for transparently encrypting/decrypting data. System and method for encryption and/or decryption cryptographic services that have...
8385551 Highly available cryptographic key storage (HACKS)  
A system and method for managing trusted platform module (TPM) keys utilized in a cluster of computing nodes. A cluster-level management unit communicates with a local TPM agent in each node in the...
8381271 Method and system for providing user access to a secure application  
A method and system for providing remote user access to secure financial applications by deployment of SSO software (126) to client workstations (120), including receiving a password for...
8375419 Information processing apparatus, method for controlling information processing apparatus, and storage medium  
A method for controlling an information processing apparatus includes storing identification information to identify a type of authentication information which is necessary to use each of a...
8375454 Method for locking an application program  
A method for locking the application program includes: when running a application program stored in a terminal, it judges whether a first unlocking key of the application program exists in the...
8375418 Method of performing software updates (installations), on networked 32/64-bit microsoft computers in an automated environment without introducing a possible security threat  
A method of monitoring all network communications, including a real-time analysis of intercepting all networked connections and closing those network connections, including all connections across...
8374348 Device for secure transmission recording and visualisation of audiovisual programmes  
A method of distributing video sequences according to a nominal flow format including a succession of frames each including at least one I block corresponding to a complete digital I image and at...
8370628 Document collaboration system with alternative views  
A system provides document collaboration for a plurality of users. The system divides a central document into a plurality of sections. The system then assigns edit rights for a user for one or more...
8370954 Content management systems and methods including content usage restrictions  
Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which...
8369530 Network set-up device  
A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a...
8365307 Method and apparatus for storing copy protection information separately from protected content  
A copy protection apparatus and method enabling storage of copy protection information separately from protected content is disclosed. One embodiment includes a digital data signal receiver to...
8364983 Corralling virtual machines with encryption keys  
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more...
8363837 Data storage device with data transformation capability  
In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive includes...
8363258 Content transmission device, content transmission method, and computer program used therewith  
A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission...
8364955 Systems and methods for effectively removing access to individual files on magnetic tape media  
A method for effectively removing access to individual files on magnetic tape media may include: 1) encrypting a file, 2) storing the encrypted file on a tape medium, 3) storing a cryptographic key...
8365298 Comprehensive security architecture for dynamic, web service based virtual organizations  
A comprehensive security architecture for a virtual organization (VO) is disclosed. The comprehensive security architecture uses the same security mechanism or substantially similar security...
8364965 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8359467 Access control system and method  
Certain embodiments of the invention relate to an access control system for controlling access to file system objects stored in a digital file system store. The system provides a first compartment...
8359656 Media processing system supporting different media formats via server-based transcoding  
A method for processing media content includes receiving, at a second communications device communicatively coupled to a network at a first geographic location, from a first wireless mobile...
8356178 Method and apparatus for authenticated data storage  
A method includes: computing a first message authentication code for each of a plurality of sets of data blocks on a data storage medium, and authenticating the sets of data blocks by computing a...
8356174 System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage  
The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed data. The data is encrypted by the...
8356356 Anti-debugger comprising spatially and temporally separate detection and response portions  
An anti-debugger comprises spatially and temporally separate detection and response portions. In an example configuration, the anti-debugger is implemented into a game system for detecting and...
8353028 Render engine, and method of using the same, to verify data for access and/or publication via a computer system  
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce listing) that includes active content...
8353038 Monitoring and managing changes to non-structured storage of system configuration information  
A configuration information manager monitors attempts by processes to update non-structured storage of system configuration information, such as plain text files which contain system configuration...
8352731 Secure decentralized storage system  
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale...
8352735 Method and system for encrypted file access  
A method and system for encrypted file access are provided. The method includes the steps of: receiving (502, 552) an access request for an encrypted file (401-403) by an application (110);...
8353055 Method and apparatus for processing rights object  
A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media...
8352999 Method for managing data in a shared computing environment  
A method of storing secret data in a shared computing environment includes defining secret data, such as a password and administration policies according to a schema of a directory server such as a...
8345873 Methods and systems for N-state signal processing with binary devices  
Linear Feedback Shift Registers (LFSRs) based 2p state with p>2 or p≧2 scramblers, descramblers, sequence generators and sequence detectors in binary implementation are provided. An LFSR may a...
8346926 Granting access to a content unit stored on an object addressable storage system  
Aspects of the invention relate to sharing content stored on an object addressable storage (OAS) system among a plurality of users of the OAS system and authenticating users to an OAS system. In...
8347085 Integrating security protection tools with computer device integrity and privacy policy  
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) run...
8347359 Encryption sentinel system and method  
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server...
8347112 Encryption/decryption engine with secure modes for key decryption and key derivation  
In at least some embodiments, an electronic device comprises a processor and an encryption/decryption (E/D) engine coupled to the processor via a bus. The E/D engine selectively operates in a first...
8347087 Support for multiple digital rights management systems for same content  
Techniques, systems, and apparatus, including medium-encoded computer program products, for protecting a document with multiple digital rights management systems are presented. A described...
8345869 Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network  
A communication system 100 includes a group of user devices, a first device separate from the group of user devices, a first satellite, a peer-to-peer network 130 in communication with the user...
8345870 Method and apparatus for encrypting encoded audio signal  
Advanced solutions for encrypting multi-layer audio data are required, ie. audio data that comprise a base layer and one or more enhancement layers. A method for encrypting such an encoded audio...
8347086 System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium  
A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method...
RE43906 Method and apparatus for securing digital assets  
Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is classified, at least a security clearance...
8341406 System and method for providing different levels of key security for controlling access to secured items  
With files secured by encryption techniques, keys are often required to gain access to the secured files. Techniques for providing and using multiple levels of keystores for securing the keys are...
8341736 Detection and dynamic alteration of execution of potential software threats  
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a...
8341753 Managing pre-release of a game application over a network  
A system, method, and apparatus are arranged to enable loading of an application, such as a game application, prior to a formal release date of the application. An end-user is provided components...
8341405 Access management in an off-premise environment  
A system that can assist users to manage a personal active directory for all of their information maintained within a cloud-based environment is provided. The identity of a client that accesses...
8341733 Creating secured file views in a software partition  
A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is...
8341404 System and method for intelligence based security  
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with...
8336097 Apparatus and method for monitoring and protecting system resources from web browser  
An apparatus and method for preventing an attempt to perform malicious activities using web browser weaknesses are provided. A file protection module monitors attempts to access at least one file...
8336109 Method and apparatus for processing rights object  
A method and apparatus for processing a Rights Object (RO) are provided. A method for upgrading the RO includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8332655 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects  
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query...