Sign up


Match Document Document Title
8238204 Apparatus and method for managing key in library apparatus  
In order to facilitate the management of the hardware key of a library apparatus employing the LTO system, a write function of a noncontact memory (CM: cartridge memory) contained in an LTO tape...
8239676 Secure proximity verification of a node on a network  
A system and method determines the proximity of the target node to the source node from the time required to communicate messages within the node-verification protocol. The node-verification...
8239674 System and method of protecting files from unauthorized modification or deletion  
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A...
8239673 Methods, apparatus and systems with loadable kernel architecture for processors  
A device (200, 2200) for improved security includes a processor (200) and a secure writeable memory (2245) coupled to said processor (200) and including code (2240) to download a loadable security...
8234489 Set of system configuration registers having shadow register  
A processor is disclosed having a plurality of general purpose registers for storing data for processing by the processor; a set of system configuration registers for storing data indicative of a...
8233627 Method and system for managing a key for encryption or decryption of data  
A user private key is stored in a database of the user terminal. A user public key and user information are stored in the user management DB. The encryption/decryption unit encrypts an authority...
8230517 Opaque message archives  
A system includes a server equipped to generate a split encryption key having at least a first key portion and a second key portion, that is used by the server to encrypt at least a portion of a...
8229930 URL reputation system  
A URL reputation system may have a reputation server and a client device with a cache of reputation information. A URL reputation query from the client to the server may return reputation data...
8230491 Automatic access to network devices using various authentication schemes  
An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state transitions...
8225317 Insertion and invocation of virtual appliance agents through exception handling regions of virtual machines  
A method for inserting an agent of a virtual appliance into a virtual machine. The method may include inserting, into an exception handler memory location of a virtual machine, one or more...
8225108 Method and system for mixed symmetric and asymmetric encryption of .ZIP files  
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in...
8225109 Method and apparatus for generating a compressed and encrypted baseline backup  
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including directories and files, are identified....
8225391 System and method for improving restrictiveness on accessing software applications  
Systems and methods for improving the restrictiveness on accessing software applications on mobile devices, such as cell phones, are disclosed. In accordance with an exemplary embodiment, a...
8225091 Systems and methods for protecting sensitive files from unauthorized access  
Systems and methods for protecting sensitive files from unauthorized access are disclosed. An exemplary method involves detecting a connection of the computing device to an electronic device. An...
8225089 Electronic transaction systems utilizing a PEAD and a private key  
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the...
8219821 System and method for signature based data container recognition  
A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance generates a signature of the data...
8218763 Method for ensuring the validity of recovered electronic documents from remote storage  
A method for electronically storing and retrieving at a later date a true copy of a document stored on a remote storage device comprises: sending a document in electronic format from a document...
8214641 File access in multi-protocol environment  
Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two...
8213602 Method and system for encrypting and decrypting a transport stream using multiple algorithms  
There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key to...
8214902 Determination by circuitry of presence of authorized and/or malicious data  
An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine,...
8214643 Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method  
An object is to provide a service providing method capable of curbing rise of cost A service providing method according to the present invention is one for providing services A and B, which...
8214908 Electronic musical apparatus, control method therefor, and program for implementing the control method  
An automatic performance apparatus which can make it difficult to discriminate between music contents which require copyright protection and music contents which do not require copyright...
8209540 Incremental secure backup and restore of user settings and data  
A data processing device receives a manifest from a previous backup operation and determines what files have changed by comparing the files to be backed up to the manifest. The data processing...
8205079 Encryption/decryption system and method thereof  
An encryption/decryption system includes a displaying unit, an operating unit, a pressure sensing unit and an indicating unit. The displaying unit is configured for displaying files. The operating...
8205077 Management apparatus  
A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret...
8205078 Handling files containing confidential or sensitive information  
A method, apparatus, and computer instructions for managing files in a data processing system. An attribute for a file is specified as having a special designation. The file with the attribute...
8205094 Tamper evident removable media storing executable code  
A mobile wireless device operable to install code on a removable medium, in which the device is programmed to calculate and store a digest of this code into a persistent non-removable store inside...
8204929 Hiding sensitive information  
An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information to be relatively securely and...
8201244 Automated malware signature generation  
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown...
8201228 System and method for securing a network  
A method of securing a telecom network, the operation of the telecom network controlled using a plurality of telecom network commands, includes grouping at least some of the plurality of telecom...
8200965 Storage system for data encryption  
A storage system including a host interface connected via a network to a host computer; a disk interface connected to a disk drive; a memory module that stores control information of a cache memory...
8200964 Method and apparatus for accessing an encrypted file system using non-local keys  
One embodiment of the present invention provides a system for accessing an encrypted file through a file system. During operation, the system receives a request to access the encrypted file. In...
8195938 Cloud-based application whitelisting  
Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution...
8196200 Piggybacking malicious code blocker  
A method includes determining whether a transaction request has occurred during a transaction session. Upon a determination that a transaction request has occurred, the method includes parsing...
8196194 Method and network for securely delivering streaming data  
In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client...
8191159 Data security for digital data storage  
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data...
8191162 System and method for securing and tracking files  
A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing system is connected to a server for...
8190922 Extensible and flexible electronic information tracking systems and methods  
A method and system for tracking electronic information includes the steps of: encrypting an electronic file stored on a hardware storage device; attaching or incorporating with the file a...
8190902 Techniques for digital signature formation and verification  
Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with...
8191115 Method and apparatus for extensible security authorization grouping  
A method and apparatus for providing an extensible grouping mechanism for security applications for use in a computer system. Groups may be established and maintained by non-system administrators...
8191165 Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity  
A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide...
8185736 File transfer system for direct transfer between computers  
A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a...
8185954 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8185751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system  
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical...
8181266 Method for moving a rights object between devices and a method and device for using a content object based on the moving method and device  
A method for moving a rights object (RO) between devices, a method of using a content object based on the moving method, and devices using the methods are provided. The moving method includes...
8181248 System and method of detecting anomaly malicious code by using process behavior prediction technique  
Provided are a pattern analyzing/detecting method and a system using the same that are capable of detecting and effectively preventing an unknown malicious code attack. To detect such an attack,...
8181220 Method and apparatus for digital rights management policies  
Method and apparatus are described wherein, in one example embodiment, there is provided one or more policy templates that may define a set of policy permissions or other attributes that may be...
8181022 Method and apparatus for controlling access restrictions for media playback  
A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be...
8181020 System and method for securely storing firmware  
A mechanism for creating and accessing a secure storage area for firmware that stores a “Virtual ROM” module reference or pointer in the actual ROM that includes a unique identifier for the vir...
8176334 Document security system that permits external users to gain access to secured files  
An improved system and approaches for exchanging secured files (e.g., documents) between internal users of an organization and external users are disclosed. A file security system of the...