Sign up


Match Document Document Title
8429401 Method and apparatus for virtually erasing data from WORM storage devices  
A storage device capable of selectively rendering certain data irretrievable is disclosed. The storage device includes Write Once Read Many (WORM) storage medium, a key generator, an encrypted...
8429425 Electronic backup and restoration of encrypted data  
Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes identifying an encrypted source disk image to be included...
8423780 Encryption based security system for network storage  
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access storage from the ability to access the...
8423765 System and method for remote device registration  
A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more...
8424106 Securing a communication protocol against attacks  
A method, system, and computer usable program product for securing a data communication against attacks are provided in the illustrative embodiments. A segment in the data communication is received...
8422674 Application-specific secret generation  
A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware...
8417946 Method and apparatus for accessing an electronic device by a data terminal  
This invention pertains to methods and apparatus for accessing an electronic device by a data terminal, as well as a computer program product, an electronic device and a data terminal.
8417868 Method, apparatus and system for offloading encryption on partitioned platforms  
A method, apparatus and system enable offloading of encryption on partitioned platforms. More specifically, a partitioned platform may include a user partition for user applications, including a...
8412935 Administration of storage systems containing three groups of data-operational, backup, and standby  
A storage system that administrates data to be mounted on a client terminal, the data being categorized into a plurality of generations, and that controls data in response to a request to mount...
8412934 System and method for backing up and restoring files encrypted with file-level content protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating a backup, backing up encrypted data, and restoring backed up encrypted data. The method for...
8412936 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Binding content licenses to portable storage devices
 
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage dev...
8413233 Authorizing local application activity using remotely defined security data  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A...
8407757 Specifying and enforcing run-time policies for application processes being executed on a computer  
The present invention provides a method and system of specifying and enforcing at least one run-time policy for at least one computer process executing on a computer system, where the computer...
8407469 Protection against unintentional file changing  
Files are protected against intrusion. A first embodiment protects certain files against changes. A second embodiment encrypts the files that are stored using user's personal information.
8407467 Ubiquitous audio reproducing and servicing method and apparatus  
A ubiquitous audio reproducing and servicing method and apparatus for streaming or downloading a lossless audio source from a Content Provider (CP) using a lossy audio source card as an...
8401181 Segment deduplication system with encryption of segments  
A system for storing encrypted data comprises a processor and a memory. The processor is configured to receive an encrypted segment. The encrypted segment is determined by breaking a data stream, a...
8402532 Host control of partial trust accessibility  
Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to...
8402269 System and method for controlling exit of saved data from security zone  
A system for controlling exit of saved data from a security zone, comprising an access control device, the access control device comprising an access detection module for detecting access of an...
8397069 Methods and systems for protecting media content  
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel and, in some embodiments, a secure data...
8397296 Server resource management, analysis, and intrusion negation  
A console host and intrusion negation system (CHAINS) includes a host component and a console component. The host component monitors resources at a server. Resources that are becoming overloaded...
8397066 Entitled data cache management  
Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located...
8397067 Mechanisms and techniques for protecting intellectual property  
Methods and apparatus for providing protection of pre-designed electronic components or modules (“intellectual property”) provided on target hardware devices are described herein. According to var...
8397026 Partition access control system and method for controlling partition access  
An access control system (10) is disclosed for controlling access to data stored on at least one data storage medium (14) of a computing system. The access control system (10) comprises...
8397083 System and method for efficiently deleting a file from secure storage served by a storage system  
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores...
8397068 Generic file protection format  
A file may contain an unencrypted and an encrypted portion. The unencrypted portion may contain a layout section that may point to a published license, metadata, and a contents section, where the...
8396220 System and method of mobile content sharing and delivery in an integrated network environment  
A system and method of mobile content sharing and delivery in an integrated network environment, comprising; a first mobile terminal serving as information provider, a home server, and a second...
8392705 Information source agent systems and methods for distributed data storage and management using content signatures  
Information source agent systems and methods for distributed content storage and management using content signatures that use file identicality properties are provided. A data management system is...
8392704 Input/output control and efficiency in an encrypted file system  
An approach for improving input/output control and efficiency in an encrypted file system (EFS) is provided. In this approach, a software application writes data to a first buffer and then requests...
8386389 Service delivery systems and methods  
Service delivery systems and methods are described. In one aspect, a service delivery system includes a set of tokens, a database, multiple terminals, and a service manager. Each of the tokens...
8387124 Wormhole devices for usable secure access to remote resource  
A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of...
8386793 Method and apparatus for implementing electronic seal  
A method provided herein includes the following steps: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external...
8387146 System and method for tracking computer viruses  
A method for collecting and distributing data on computer viruses identified on a plurality of computers during virus scanning includes receiving virus scan results from the plurality of computers...
8386768 High performance data encryption server and method for transparently encrypting/decrypting data  
High-performance data encryption/decryption server and method for transparently encrypting/decrypting data. System and method for encryption and/or decryption cryptographic services that have...
8385551 Highly available cryptographic key storage (HACKS)  
A system and method for managing trusted platform module (TPM) keys utilized in a cluster of computing nodes. A cluster-level management unit communicates with a local TPM agent in each node in the...
8381271 Method and system for providing user access to a secure application  
A method and system for providing remote user access to secure financial applications by deployment of SSO software (126) to client workstations (120), including receiving a password for...
8375419 Information processing apparatus, method for controlling information processing apparatus, and storage medium  
A method for controlling an information processing apparatus includes storing identification information to identify a type of authentication information which is necessary to use each of a...
8375454 Method for locking an application program  
A method for locking the application program includes: when running a application program stored in a terminal, it judges whether a first unlocking key of the application program exists in the...
8375418 Method of performing software updates (installations), on networked 32/64-bit microsoft computers in an automated environment without introducing a possible security threat  
A method of monitoring all network communications, including a real-time analysis of intercepting all networked connections and closing those network connections, including all connections across...
8374348 Device for secure transmission recording and visualisation of audiovisual programmes  
A method of distributing video sequences according to a nominal flow format including a succession of frames each including at least one I block corresponding to a complete digital I image and at...
8370628 Document collaboration system with alternative views  
A system provides document collaboration for a plurality of users. The system divides a central document into a plurality of sections. The system then assigns edit rights for a user for one or more...
8370954 Content management systems and methods including content usage restrictions  
Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which...
8369530 Network set-up device  
A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a...
8365307 Method and apparatus for storing copy protection information separately from protected content  
A copy protection apparatus and method enabling storage of copy protection information separately from protected content is disclosed. One embodiment includes a digital data signal receiver to...
8364983 Corralling virtual machines with encryption keys  
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more...
8363837 Data storage device with data transformation capability  
In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive includes...
8363258 Content transmission device, content transmission method, and computer program used therewith  
A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission...
8364955 Systems and methods for effectively removing access to individual files on magnetic tape media  
A method for effectively removing access to individual files on magnetic tape media may include: 1) encrypting a file, 2) storing the encrypted file on a tape medium, 3) storing a cryptographic key...
8365298 Comprehensive security architecture for dynamic, web service based virtual organizations  
A comprehensive security architecture for a virtual organization (VO) is disclosed. The comprehensive security architecture uses the same security mechanism or substantially similar security...
8364965 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8359467 Access control system and method  
Certain embodiments of the invention relate to an access control system for controlling access to file system objects stored in a digital file system store. The system provides a first compartment...