Sign up


Match Document Document Title
8448228 Separating authorization identity from policy enforcement identity  
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the...
8447037 Key tree construction and key distribution method for hierarchical role-based access control  
A key tree construction and key distribution method for hierarchical role-based access control, includes: constructing a key tree including relationships between a hierarchical structure of role...
8447974 Method and apparatus for managing access rights to information spaces  
An approach is provided for managing access rights of users to information spaces using signatures stored in a memory tag. A signature manager caused reading of a memory tag to initiate a request,...
8447973 System, server, and device for providing contents  
According to an aspect of the invention, a content providing system is provided that includes a client device configured to receive contents and a server connected to the client device that...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored...
8443189 Trust event notification and actions based on thresholds and associated trust metadata scores  
An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust...
8442489 System and method for configuring devices for secure operations  
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices....
8443188 Using code access security for runtime accessibility checks  
Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private...
8438386 System and method for developing a risk profile for an internet service  
A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a...
8438647 Recovery of encrypted data from a secure storage device  
An exemplary software product to recover encrypted data from a target secure storage device can comprise software operational when executed by a processor to receive a recovery request to recovery...
8433927 Cryptographically-enabled privileged mode execution  
A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to...
8433899 System and method for authenticating data using incompatible digest functions  
A system for authenticating data of interest includes a digest locator engine capable to locate a first and a second digest result in a data file, including a set of data; a first digest creator...
8433901 System and method for wiping encrypted data on a device having file-level content protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing...
8429419 Method for securing authorized data entry and the device to perform this method  
A method and device for authorized data entry and securing the authenticity of such data when entering cryptographic operations in a computer requiring authorized data entry, sends a specific...
8429753 Controlling access to documents using file locks  
Examples are related to systems and methods for controlling access to document files on a document server. One example system includes document files stored on a document server, at least one of...
8429429 Computer security system and method  
A method is provided for protecting a computer system, comprising: attaching a security descriptor to a process running on a processor of the computer system; associating with the security...
8429414 Apparatus and method of generating and detecting prevention and control data for verifying validity of data  
A method of generating prevention and control data to verify validity of data to be transmitted, and an apparatus to perform the method, the method including generating the prevention and control...
8429755 System and method for receiving digital content  
A method and system for conducting a transaction involving digital content is provided. The system includes, a first user of a first mobile device connected to a network; a second user of a second...
8429401 Method and apparatus for virtually erasing data from WORM storage devices  
A storage device capable of selectively rendering certain data irretrievable is disclosed. The storage device includes Write Once Read Many (WORM) storage medium, a key generator, an encrypted...
8429425 Electronic backup and restoration of encrypted data  
Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes identifying an encrypted source disk image to be included...
8423780 Encryption based security system for network storage  
The presently preferred embodiment of the invention provides an encryption based security system for network storage that separates the ability to access storage from the ability to access the...
8423765 System and method for remote device registration  
A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more...
8424106 Securing a communication protocol against attacks  
A method, system, and computer usable program product for securing a data communication against attacks are provided in the illustrative embodiments. A segment in the data communication is received...
8422674 Application-specific secret generation  
A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware...
8417946 Method and apparatus for accessing an electronic device by a data terminal  
This invention pertains to methods and apparatus for accessing an electronic device by a data terminal, as well as a computer program product, an electronic device and a data terminal.
8417868 Method, apparatus and system for offloading encryption on partitioned platforms  
A method, apparatus and system enable offloading of encryption on partitioned platforms. More specifically, a partitioned platform may include a user partition for user applications, including a...
8412935 Administration of storage systems containing three groups of data-operational, backup, and standby  
A storage system that administrates data to be mounted on a client terminal, the data being categorized into a plurality of generations, and that controls data in response to a request to mount...
8412934 System and method for backing up and restoring files encrypted with file-level content protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for initiating a backup, backing up encrypted data, and restoring backed up encrypted data. The method for...
8412936 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Binding content licenses to portable storage devices
 
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage dev...
8413233 Authorizing local application activity using remotely defined security data  
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A...
8407757 Specifying and enforcing run-time policies for application processes being executed on a computer  
The present invention provides a method and system of specifying and enforcing at least one run-time policy for at least one computer process executing on a computer system, where the computer...
8407469 Protection against unintentional file changing  
Files are protected against intrusion. A first embodiment protects certain files against changes. A second embodiment encrypts the files that are stored using user's personal information.
8407467 Ubiquitous audio reproducing and servicing method and apparatus  
A ubiquitous audio reproducing and servicing method and apparatus for streaming or downloading a lossless audio source from a Content Provider (CP) using a lossy audio source card as an...
8401181 Segment deduplication system with encryption of segments  
A system for storing encrypted data comprises a processor and a memory. The processor is configured to receive an encrypted segment. The encrypted segment is determined by breaking a data stream, a...
8402532 Host control of partial trust accessibility  
Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to...
8402269 System and method for controlling exit of saved data from security zone  
A system for controlling exit of saved data from a security zone, comprising an access control device, the access control device comprising an access detection module for detecting access of an...
8397069 Methods and systems for protecting media content  
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel and, in some embodiments, a secure data...
8397296 Server resource management, analysis, and intrusion negation  
A console host and intrusion negation system (CHAINS) includes a host component and a console component. The host component monitors resources at a server. Resources that are becoming overloaded...
8397066 Entitled data cache management  
Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located...
8397067 Mechanisms and techniques for protecting intellectual property  
Methods and apparatus for providing protection of pre-designed electronic components or modules (“intellectual property”) provided on target hardware devices are described herein. According to var...
8397026 Partition access control system and method for controlling partition access  
An access control system (10) is disclosed for controlling access to data stored on at least one data storage medium (14) of a computing system. The access control system (10) comprises...
8397083 System and method for efficiently deleting a file from secure storage served by a storage system  
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores...
8397068 Generic file protection format  
A file may contain an unencrypted and an encrypted portion. The unencrypted portion may contain a layout section that may point to a published license, metadata, and a contents section, where the...
8396220 System and method of mobile content sharing and delivery in an integrated network environment  
A system and method of mobile content sharing and delivery in an integrated network environment, comprising; a first mobile terminal serving as information provider, a home server, and a second...
8392705 Information source agent systems and methods for distributed data storage and management using content signatures  
Information source agent systems and methods for distributed content storage and management using content signatures that use file identicality properties are provided. A data management system is...
8392704 Input/output control and efficiency in an encrypted file system  
An approach for improving input/output control and efficiency in an encrypted file system (EFS) is provided. In this approach, a software application writes data to a first buffer and then requests...
8386389 Service delivery systems and methods  
Service delivery systems and methods are described. In one aspect, a service delivery system includes a set of tokens, a database, multiple terminals, and a service manager. Each of the tokens...
8387124 Wormhole devices for usable secure access to remote resource  
A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of...
8386793 Method and apparatus for implementing electronic seal  
A method provided herein includes the following steps: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external...
8387146 System and method for tracking computer viruses  
A method for collecting and distributing data on computer viruses identified on a plurality of computers during virus scanning includes receiving virus scan results from the plurality of computers...