Sign up

AcclaimIP-ad

Match Document Document Title
8549606 Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content  
There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and...
8549421 Apparatus and method for managing content  
A content management apparatus displays, on a display unit, a first display object representing a content item, at least one area for including the first display object, and a second display object...
8549585 Method and apparatus to implement secured, layered logout from a computer system  
A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of...
8548924 Self-authorizing token  
Self-authorizing tokens are disclosed. Typical embodiments employ a secure element and a secure element interrogator. Such tokens may be used for authorization of financial payments and other...
8549278 Rights management services-based file encryption system and method  
Windows Rights Management Services (RMS) are leveraged to provide protection and sharing of encryption keys to file systems. An encrypting file system (EFS) delegates key sharing, management and...
8542593 System and methods for error tolerant content delivery over multicast channels  
In one embodiment of the invention, a system and method for error tolerant delivery of data is provided. A data file is received for transmission which includes metadata and data. The metadata...
8543832 Service provision system and communication terminal  
A first memory unit is arranged outside a block that is under security control. The block includes: a second memory unit; an acquisition unit for acquiring biological information on a living body...
8544060 Method and system for detecting and protecting against potential data loss from unknown applications  
A system and method for detecting and protecting against potential data loss from unknown applications is described. In one embodiment, a method includes detecting, by an endpoint data loss...
RE44503 Memory device storing identifying information and memory card including the same  
In a memory system using a removable recording medium and data stored in the recording medium, identifying information for identifying each recording medium from others is held in the recording...
8539233 Binding content licenses to portable storage devices  
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage dev...
8539230 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method
 
An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command...
8539244 Server, authentication server, content delivery system, and program  
A service provider server has management means which manages a user ID corresponding to a service user and a device IDs corresponding to an information processing terminals of the service user in...
8538020 Hybrid client-server cryptography for network applications  
In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data can be encrypted at a client device...
8539228 Managing access to a resource  
Methods of managing access to at least one resource in a computer system. The methods may comprise the step of associating access rights with an application resource. The access rights may define a...
8533489 Searchable symmetric encryption with dynamic updating  
A Searchable Symmetric Encryption (SSE) mechanism is described which allows efficient dynamic updating of encrypted index information. The encrypted index information includes pointer information...
8533821 Detecting and defending against man-in-the-middle attacks  
A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records...
8533456 Accelerating stream cipher operations using single and grid systems  
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method separates the data into multiple file...
8533467 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8533837 System and method for network edge data protection  
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate...
8533466 Electronic file access control system and method  
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless...
8528082 Security disposing method and device for input data  
A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and mixing the input data with the...
8526608 Printing system and printer with electronic signature capability and method thereof  
A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the...
8527751 Systems and methods for secure and certified electronic messaging  
The present disclosure provides systems and methods for secure and certified electronic messaging from a plurality of users to one or more electronic mailboxes and the like using a combination of...
8528089 Known files database for malware elimination  
A method, system, and computer program product for identifying files that are found during a malware scan, thus enabling them to be excluded from further analysis. A method for handling a potential...
8528099 Policy based management of content rights in enterprise/cross enterprise collaboration  
Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an...
8527719 Concurrent access to a memory pool shared between a block access device and a graph access device  
A graph access device and block access device can simultaneously access a memory pool shared between the devices. The memory pool may include one or more memory arrays accessed as a single logical...
8527753 Method and device for determining a unique content instance identifier, unique content instance identifier and method and device for managing content licenses  
The present disclosure is directed to determining a unique content instance identifier (CIID) for each content item handled in a content management system. The content item has been received from...
8528098 Electronic file browsing system and control method thereof  
An electronic file browsing system includes an electronic file delivery device and a file processing server. When document file browsing is requested from a mobile phone, a mobile phone access...
8520850 Downloadable security and protection methods and apparatus  
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights...
8522018 Method and system for implementing a mobile trusted platform module  
A method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface. The method also includes authenticating the...
8522309 Security switch  
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully...
8522015 Authentication of binaries in memory with proxy code execution  
Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual...
8510792 Gated network service  
A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining...
8510557 Secure message and file delivery  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8510552 System and method for file-level data protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a...
8510840 Method and apparatus for detecting scans in real-time  
A method and apparatus for detecting scans are described. In one example, a plurality of flows is allocated into a plurality of bins associated with different source Internet protocol (SIP)...
8504820 Method for improving network application security and system thereof  
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises that client terminal application...
8504846 Method and apparatus for secure storing of private data on user devices in telecommunications networks  
A system for securely storing data is provided. The system includes a transformation component operable to scramble or encrypt the data, a dissection component operable to divide the data into a...
8503679 Short message encryption  
A method and system for securely communicating information via a low bandwidth channel uses encryption that adds comparatively little overhead to the size of the transmission. This method and...
8503677 Communication system and device  
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history...
8503672 Method and apparatus for protecting content consumer's privacy  
Provided is a method of protecting a content consumer's privacy. The method includes classifying contents into content groups, encrypting the contents using different encryption keys, generating a...
8498415 Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment  
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each...
8498006 Data processing apparatus including external memory storage of designation information  
A controller of a data processing apparatus recognizes connection of a USB memory to a USB terminal. The controller reads designation information stored in the USB memory. The designation...
8499152 Data positioning and alerting system  
A file policy is created for each confidential file in a server computer including a list of events and a corresponding action. The file policies for the confidential files are sent to each client...
8495741 Remediating malware infections through obfuscation  
A computer has a storage device that is infected with malicious software (malware). The malware uses stealth or rootkit techniques to hide itself in the storage device. A security module within the...
8495366 Secure kerberized access of encrypted file system  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
8495750 Filesystem management and security system  
A system to implement user-level filesystem related calls instead of an operating system kernel may include data processing applications executing via a computer processor. The system may also...
8495035 Systems and methods for providing data integrity protection in a storage medium  
A method for data integrity protection includes arranging data in a plurality of data blocks. A respective block signature is computed over each of the data blocks, thereby generating multiple...
8495755 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system  
Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified...
8490176 System and method for controlling a mobile device  
A system includes a controlling module for controlling a mobile device remotely A system includes a controlling module for controlling a mobile device remotely, wherein the controlling module...