Sign up


Match Document Document Title
8533466 Electronic file access control system and method  
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless...
8528082 Security disposing method and device for input data  
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and mixing the input data with the...
8526608 Printing system and printer with electronic signature capability and method thereof  
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the...
8527751 Systems and methods for secure and certified electronic messaging  
The present disclosure provides systems and methods for secure and certified electronic messaging from a plurality of users to one or more electronic mailboxes and the like using a combination of...
8528089 Known files database for malware elimination  
A method, system, and computer program product for identifying files that are found during a malware scan, thus enabling them to be excluded from further analysis. A method for handling a potential...
8528099 Policy based management of content rights in enterprise/cross enterprise collaboration  
Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an...
8527719 Concurrent access to a memory pool shared between a block access device and a graph access device  
A graph access device and block access device can simultaneously access a memory pool shared between the devices. The memory pool may include one or more memory arrays accessed as a single logical...
8527753 Method and device for determining a unique content instance identifier, unique content instance identifier and method and device for managing content licenses  
The present disclosure is directed to determining a unique content instance identifier (CIID) for each content item handled in a content management system. The content item has been received from...
8528098 Electronic file browsing system and control method thereof  
An electronic file browsing system includes an electronic file delivery device and a file processing server. When document file browsing is requested from a mobile phone, a mobile phone access...
8520850 Downloadable security and protection methods and apparatus  
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights...
8522018 Method and system for implementing a mobile trusted platform module  
A method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface. The method also includes authenticating the...
8522309 Security switch  
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully...
8522015 Authentication of binaries in memory with proxy code execution  
Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual...
8510792 Gated network service  
A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining...
8510557 Secure message and file delivery  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8510552 System and method for file-level data protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a...
8510840 Method and apparatus for detecting scans in real-time  
A method and apparatus for detecting scans are described. In one example, a plurality of flows is allocated into a plurality of bins associated with different source Internet protocol (SIP)...
8504820 Method for improving network application security and system thereof  
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises that client terminal application...
8504846 Method and apparatus for secure storing of private data on user devices in telecommunications networks  
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component operable to divide the data into a...
8503679 Short message encryption  
A method and system for securely communicating information via a low bandwidth channel uses encryption that adds comparatively little overhead to the size of the transmission. This method and...
8503677 Communication system and device  
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history...
8503672 Method and apparatus for protecting content consumer's privacy  
Provided is a method of protecting a content consumer's privacy. The method includes classifying contents into content groups, encrypting the contents using different encryption keys, generating a...
8498415 Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment  
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each...
8498006 Data processing apparatus including external memory storage of designation information  
A controller of a data processing apparatus recognizes connection of a USB memory to a USB terminal. The controller reads designation information stored in the USB memory. The designation...
8499152 Data positioning and alerting system  
A file policy is created for each confidential file in a server computer including a list of events and a corresponding action. The file policies for the confidential files are sent to each client...
8495741 Remediating malware infections through obfuscation  
A computer has a storage device that is infected with malicious software (malware). The malware uses stealth or rootkit techniques to hide itself in the storage device. A security module within the...
8495366 Secure kerberized access of encrypted file system  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
8495750 Filesystem management and security system  
A system to implement user-level filesystem related calls instead of an operating system kernel may include data processing applications executing via a computer processor. The system may also...
8495035 Systems and methods for providing data integrity protection in a storage medium  
A method for data integrity protection includes arranging data in a plurality of data blocks. A respective block signature is computed over each of the data blocks, thereby generating multiple...
8495755 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system  
Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified...
8490176 System and method for controlling a mobile device  
A system includes a controlling module for controlling a mobile device remotely A system includes a controlling module for controlling a mobile device remotely, wherein the controlling module...
8489889 Method and apparatus for restricting access to encrypted data  
A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record...
8484464 Method and devices for providing secure data backup from a mobile communication device to an external computing device  
A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In accordance with one example embodiment, there is provided a...
8484309 Owner controlled access to shared data resource  
A method, system and computer program product for controlling an access to a data resource are disclosed. According to an embodiment, a method for controlling an access to a data resource...
8478995 Method of encrypting and transferring data between a sender and a receiver using a network  
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender an...
8479265 Usage based authorization  
Embodiments of the invention provide systems and methods for authorizing a request to access a resource based on a context of the request. According to one embodiment, a method of authorizing a...
8478996 Secure Kerberized access of encrypted file system  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
8474031 Access control method and apparatus  
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is...
8473739 Advanced content authentication and authorization  
An interactive multimedia presentation playable by a presentation system includes a media content component and an interactive content component. The interactive content component includes one or...
8468543 System and method for preventing DRM client crash using process separate execution  
A computer system includes a DRM client system in which a plurality of DRM clients are installed, comprising: a virtual OS managing unit that separates a kernel of an actual operating system...
8468345 Containerless data for trustworthy computing and data services  
A digital escrow pattern and trustworthy platform is provided for data services including mathematical transformation techniques, such as searchable encryption techniques, for obscuring data stored...
8468344 Enabling multi-level security in a single-level security computing system  
According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that...
8468607 Associating multiple security domains to application servers  
Multiple security domains can be created and associated with various scopes within the cell allowing security configurations of each scope to be managed collectively. Examples of scopes include the...
8462665 Shared community storage network  
A hardware and/or software facility for durably and securely storing data within a shared community storage network. A user may have a storage device that they intend to share with others in the...
8464051 Method, apparatus, terminal and system for channel encryption  
The disclosure discloses a method, an apparatus, a terminal and a system for channel encryption. The method includes that: a relay server receives a channel encryption request from a client, and...
8464328 Method for protecting personal data read in a terminal station by a server  
The invention concerns a method enabling a server manager to prove subsequently that the server was authorized to read a user's personal data in a terminal station (ST), comprising: transmitting...
8463776 Image file container  
An image container file has at least first and second multimedia streams (MSs). The first MS includes first image data representing an image. The second MS includes arbitrary data, which can for...
8464324 System and method for identity verification on a computer  
A system to verify user identity on a computer uses a server with a set of stored or created images. An image is selected and transmitted over a computer network to the computer whose user identity...
8464347 Software updating apparatus, software updating system, alteration verification method and alteration verification program  
Provided is a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules receives, from an external server (200), a...
8464050 Selective authorization of the loading of dependent code modules by running processes  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating...