Sign up


Match Document Document Title
8510792 Gated network service  
A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining...
8510557 Secure message and file delivery  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8510552 System and method for file-level data protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a...
8510840 Method and apparatus for detecting scans in real-time  
A method and apparatus for detecting scans are described. In one example, a plurality of flows is allocated into a plurality of bins associated with different source Internet protocol (SIP)...
8504820 Method for improving network application security and system thereof  
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises that client terminal application...
8504846 Method and apparatus for secure storing of private data on user devices in telecommunications networks  
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component operable to divide the data into a...
8503679 Short message encryption  
A method and system for securely communicating information via a low bandwidth channel uses encryption that adds comparatively little overhead to the size of the transmission. This method and...
8503677 Communication system and device  
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history...
8503672 Method and apparatus for protecting content consumer's privacy  
Provided is a method of protecting a content consumer's privacy. The method includes classifying contents into content groups, encrypting the contents using different encryption keys, generating a...
8498415 Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment  
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each...
8498006 Data processing apparatus including external memory storage of designation information  
A controller of a data processing apparatus recognizes connection of a USB memory to a USB terminal. The controller reads designation information stored in the USB memory. The designation...
8499152 Data positioning and alerting system  
A file policy is created for each confidential file in a server computer including a list of events and a corresponding action. The file policies for the confidential files are sent to each client...
8495741 Remediating malware infections through obfuscation  
A computer has a storage device that is infected with malicious software (malware). The malware uses stealth or rootkit techniques to hide itself in the storage device. A security module within the...
8495366 Secure kerberized access of encrypted file system  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
8495750 Filesystem management and security system  
A system to implement user-level filesystem related calls instead of an operating system kernel may include data processing applications executing via a computer processor. The system may also...
8495035 Systems and methods for providing data integrity protection in a storage medium  
A method for data integrity protection includes arranging data in a plurality of data blocks. A respective block signature is computed over each of the data blocks, thereby generating multiple...
8495755 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system  
Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified...
8490176 System and method for controlling a mobile device  
A system includes a controlling module for controlling a mobile device remotely A system includes a controlling module for controlling a mobile device remotely, wherein the controlling module...
8489889 Method and apparatus for restricting access to encrypted data  
A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record...
8484464 Method and devices for providing secure data backup from a mobile communication device to an external computing device  
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one example embodiment, there is provided a...
8484309 Owner controlled access to shared data resource  
A method, system and computer program product for controlling an access to a data resource are disclosed. According to an embodiment, a method for controlling an access to a data resource...
8478995 Method of encrypting and transferring data between a sender and a receiver using a network  
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender an...
8479265 Usage based authorization  
Embodiments of the invention provide systems and methods for authorizing a request to access a resource based on a context of the request. According to one embodiment, a method of authorizing a...
8478996 Secure Kerberized access of encrypted file system  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
8474031 Access control method and apparatus  
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is...
8473739 Advanced content authentication and authorization  
An interactive multimedia presentation playable by a presentation system includes a media content component and an interactive content component. The interactive content component includes one or...
8468543 System and method for preventing DRM client crash using process separate execution  
A computer system includes a DRM client system in which a plurality of DRM clients are installed, comprising: a virtual OS managing unit that separates a kernel of an actual operating system...
8468345 Containerless data for trustworthy computing and data services  
A digital escrow pattern and trustworthy platform is provided for data services including mathematical transformation techniques, such as searchable encryption techniques, for obscuring data stored...
8468344 Enabling multi-level security in a single-level security computing system  
According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that...
8468607 Associating multiple security domains to application servers  
Multiple security domains can be created and associated with various scopes within the cell allowing security configurations of each scope to be managed collectively. Examples of scopes include the...
8462665 Shared community storage network  
A hardware and/or software facility for durably and securely storing data within a shared community storage network. A user may have a storage device that they intend to share with others in the...
8464051 Method, apparatus, terminal and system for channel encryption  
The disclosure discloses a method, an apparatus, a terminal and a system for channel encryption. The method includes that: a relay server receives a channel encryption request from a client, and...
8464328 Method for protecting personal data read in a terminal station by a server  
The invention concerns a method enabling a server manager to prove subsequently that the server was authorized to read a user's personal data in a terminal station (ST), comprising: transmitting...
8463776 Image file container  
An image container file has at least first and second multimedia streams (MSs). The first MS includes first image data representing an image. The second MS includes arbitrary data, which can for...
8464324 System and method for identity verification on a computer  
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity...
8464347 Software updating apparatus, software updating system, alteration verification method and alteration verification program  
Provided is a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules receives, from an external server (200), a...
8464050 Selective authorization of the loading of dependent code modules by running processes  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating...
8464049 Method and system of accessing copy-prevented encrypted data resources over a network  
A system of accessing a copy-prevented encrypted data file transmitted over a network includes a server apparatus having data files; and a client apparatus comprising a read apparatus and a...
8464314 Enforcing universal access control in an information management system  
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy...
8458463 Method for safe operation and a system thereof  
The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system to...
8458458 Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method  
A security module is provided in a data recording medium, data to be written to the data recording medium is encrypted with an content key different from one data to another, and the content key is...
8458467 Method and apparatus for adaptive application message payload content transformation in a network infrastructure element  
Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation...
8458778 System, method, and apparatus for on-demand limited security credentials in wireless and other communication networks  
A method includes storing a security credential associated with a communication network on a portable storage device. The method also includes detecting removal of the portable storage device from...
8452987 Method and system for disaster recovery in a secure reprogrammable system  
Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable...
8448228 Separating authorization identity from policy enforcement identity  
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the...
8447037 Key tree construction and key distribution method for hierarchical role-based access control  
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role...
8447974 Method and apparatus for managing access rights to information spaces  
An approach is provided for managing access rights of users to information spaces using signatures stored in a memory tag. A signature manager caused reading of a memory tag to initiate a request,...
8447973 System, server, and device for providing contents  
According to an aspect of the invention, a content providing system is provided that includes a client device configured to receive contents and a server connected to the client device that...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored...
8443189 Trust event notification and actions based on thresholds and associated trust metadata scores  
An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust...