Sign up


Match Document Document Title
8572754 System and method for facilitating unlocking a device connected locally to a client  
Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various...
8572389 System and method for protecting master encryption keys  
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices....
8572729 System, method and computer program product for interception of user mode code execution and redirection to kernel mode  
A system, method and computer program product are provided. In use, code is executed in user mode. Further, the execution of the code is intercepted. In response to the interception, operations are...
8566960 System and method for adjustable licensing of digital products  
Techniques are provided for adjusting the number of devices allowed to use a digital product (e.g., software) under a license. In one embodiment, the technique may involve setting the allowed...
8566586 Methods and systems for network-based management of application security  
To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a process's token. The rule includes an application-criterion set...
8566924 Method and system for controlling communication ports  
A method for limiting devices and controlling the applications executed from USB ports on personal computers (PCs). More specifically, the present invention relates to a method for ensuring that...
8566953 Named object view of electronic data report  
A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file...
8560846 Document security system and method  
A method and system for document security are described. The method decrypts a key-map file located a composite document with embedded access control, decrypts a content part from the composite...
8561151 Mobile software entitlements manager  
A mobile entitlements manager implemented on a mobile device stores the software entitlements belonging to a user of the mobile device. The mobile device communicates with client computers on which...
8561152 Target-based access check independent of access request  
A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the...
8555410 External interface access control  
A method and apparatus of controlling access to a system containing vital corporation software and storing confidential data assets situated in an open accessible environment is provided. The...
8555070 External interface access control for medical systems  
A method and system of controlling access to a system in a medical environment is provided. The method includes calculating a signature value for at least one file usable with the medical system,...
8555059 Secure local update of content management software  
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys...
8554749 Data file access control  
In one embodiment, a data file and policy are generated. The policy is then associated with the data file, wherein the policy includes one or more unassigned accounts and an access control...
8555387 Apparatus and method for protecting asset in computer system  
Provided are an apparatus and method using spatial and temporal quarantine expansion to prevent important information from being leaked due to attacks such as viruses, hacking, and the like. The...
8555388 Heuristic botnet detection  
In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify suspicious network traffic; and...
8555060 Managing method, device and terminal for application program  
A managing method for an application program is disclosed, which includes that: a first terminal converts a file of a specified application program stored by the first terminal per se into an...
8547568 Approach for securely printing electronic documents  
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct...
8549606 Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content  
There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and...
8549421 Apparatus and method for managing content  
A content management apparatus displays, on a display unit, a first display object representing a content item, at least one area for including the first display object, and a second display object...
8549585 Method and apparatus to implement secured, layered logout from a computer system  
A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of...
8548924 Self-authorizing token  
Self-authorizing tokens are disclosed. Typical embodiments employ a secure element and a secure element interrogator. Such tokens may be used for authorization of financial payments and other...
8549278 Rights management services-based file encryption system and method  
Windows Rights Management Services (RMS) are leveraged to provide protection and sharing of encryption keys to file systems. An encrypting file system (EFS) delegates key sharing, management and...
8542593 System and methods for error tolerant content delivery over multicast channels  
In one embodiment of the invention, a system and method for error tolerant delivery of data is provided. A data file is received for transmission which includes metadata and data. The metadata...
8543832 Service provision system and communication terminal  
A first memory unit is arranged outside a block that is under security control. The block includes: a second memory unit; an acquisition unit for acquiring biological information on a living body...
8544060 Method and system for detecting and protecting against potential data loss from unknown applications  
A system and method for detecting and protecting against potential data loss from unknown applications is described. In one embodiment, a method includes detecting, by an endpoint data loss...
RE44503 Memory device storing identifying information and memory card including the same  
In a memory system using a removable recording medium and data stored in the recording medium, identifying information for identifying each recording medium from others is held in the recording...
8539233 Binding content licenses to portable storage devices  
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage dev...
8539230 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method
 
An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command...
8539244 Server, authentication server, content delivery system, and program  
A service provider server has management means which manages a user ID corresponding to a service user and a device IDs corresponding to an information processing terminals of the service user in...
8538020 Hybrid client-server cryptography for network applications  
In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data can be encrypted at a client device...
8539228 Managing access to a resource  
Methods of managing access to at least one resource in a computer system. The methods may comprise the step of associating access rights with an application resource. The access rights may define a...
8533489 Searchable symmetric encryption with dynamic updating  
A Searchable Symmetric Encryption (SSE) mechanism is described which allows efficient dynamic updating of encrypted index information. The encrypted index information includes pointer information...
8533821 Detecting and defending against man-in-the-middle attacks  
A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records...
8533456 Accelerating stream cipher operations using single and grid systems  
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method separates the data into multiple file...
8533467 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8533837 System and method for network edge data protection  
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate...
8533466 Electronic file access control system and method  
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless...
8528082 Security disposing method and device for input data  
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and mixing the input data with the...
8526608 Printing system and printer with electronic signature capability and method thereof  
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the...
8527751 Systems and methods for secure and certified electronic messaging  
The present disclosure provides systems and methods for secure and certified electronic messaging from a plurality of users to one or more electronic mailboxes and the like using a combination of...
8528089 Known files database for malware elimination  
A method, system, and computer program product for identifying files that are found during a malware scan, thus enabling them to be excluded from further analysis. A method for handling a potential...
8528099 Policy based management of content rights in enterprise/cross enterprise collaboration  
Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an...
8527719 Concurrent access to a memory pool shared between a block access device and a graph access device  
A graph access device and block access device can simultaneously access a memory pool shared between the devices. The memory pool may include one or more memory arrays accessed as a single logical...
8527753 Method and device for determining a unique content instance identifier, unique content instance identifier and method and device for managing content licenses  
The present disclosure is directed to determining a unique content instance identifier (CIID) for each content item handled in a content management system. The content item has been received from...
8528098 Electronic file browsing system and control method thereof  
An electronic file browsing system includes an electronic file delivery device and a file processing server. When document file browsing is requested from a mobile phone, a mobile phone access...
8520850 Downloadable security and protection methods and apparatus  
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights...
8522018 Method and system for implementing a mobile trusted platform module  
A method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface. The method also includes authenticating the...
8522309 Security switch  
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully...
8522015 Authentication of binaries in memory with proxy code execution  
Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual...