Sign up


Match Document Document Title
8584237 Improper communication detection system  
An improper communication detection system that acquires packets that are circulated through a plant network by mirroring and detects improper communication includes a storage unit configured to...
8584208 Method and apparatus for providing a context resource description language and framework for supporting the same  
An apparatus for providing a framework for supporting a context resource description language may include at least one processor and at least one memory including computer program code. The at...
8578451 System and method for encapsulation of application aspects within an application information data format message  
A method and system for processing a data request from a watcher for a target at a server, the method receiving a request for information; searching through a policy for rules to be applied based...
8578478 Clustered file systems for mix of trusted and untrusted nodes  
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory...
8578164 Method of one-way access authentication  
A method of one-way access authentication is disclosed. The method includes the following steps. According to system parameters set up by a third entity, a second entity sends an authentication...
8578158 Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method  
An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a...
8578155 Address generating method and broadcast receiving apparatus  
A broadcast receiving apparatus comprises a broadcast receiving unit (1, 4˜13) for receiving a digital broadcast; a communication unit (1˜3) for performing two-way communication through a network;...
8572371 Discovery of kernel rootkits with memory scan  
A system and method are provided for detecting kernel level rootkits including scanning a kernel memory using a kernel level detector. The kernel level detector includes kernel level code...
8572370 Accessing a remote virtual environment without user authentication  
A method, system and computer program product for providing a secure connection between a client and a remote server to run a Virtual Environment (VE), including (a) establishing a repository for...
8572372 Method for selectively enabling access to file systems of mobile terminals  
Users of mobile terminals in a communication network are provided controlled access to files in a file system through the steps of configuring the files as a file body containing a file content...
8572379 Private access to hash tables  
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has...
8572757 Seamless secure private collaboration across trust boundaries  
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored...
8572754 System and method for facilitating unlocking a device connected locally to a client  
Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various...
8572389 System and method for protecting master encryption keys  
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices....
8572729 System, method and computer program product for interception of user mode code execution and redirection to kernel mode  
A system, method and computer program product are provided. In use, code is executed in user mode. Further, the execution of the code is intercepted. In response to the interception, operations...
8566960 System and method for adjustable licensing of digital products  
Techniques are provided for adjusting the number of devices allowed to use a digital product (e.g., software) under a license. In one embodiment, the technique may involve setting the allowed...
8566586 Methods and systems for network-based management of application security  
To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a process's token. The rule includes an application-criterion...
8566924 Method and system for controlling communication ports  
A method for limiting devices and controlling the applications executed from USB ports on personal computers (PCs). More specifically, the present invention relates to a method for ensuring that...
8566953 Named object view of electronic data report  
A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the...
8560846 Document security system and method  
A method and system for document security are described. The method decrypts a key-map file located a composite document with embedded access control, decrypts a content part from the composite...
8561151 Mobile software entitlements manager  
A mobile entitlements manager implemented on a mobile device stores the software entitlements belonging to a user of the mobile device. The mobile device communicates with client computers on...
8561152 Target-based access check independent of access request  
A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the...
8555410 External interface access control  
A method and apparatus of controlling access to a system containing vital corporation software and storing confidential data assets situated in an open accessible environment is provided. The...
8555070 External interface access control for medical systems  
A method and system of controlling access to a system in a medical environment is provided. The method includes calculating a signature value for at least one file usable with the medical system,...
8555059 Secure local update of content management software  
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys...
8554749 Data file access control  
In one embodiment, a data file and policy are generated. The policy is then associated with the data file, wherein the policy includes one or more unassigned accounts and an access control...
8555387 Apparatus and method for protecting asset in computer system  
Provided are an apparatus and method using spatial and temporal quarantine expansion to prevent important information from being leaked due to attacks such as viruses, hacking, and the like. The...
8555388 Heuristic botnet detection  
In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify suspicious network traffic; and...
8555060 Managing method, device and terminal for application program  
A managing method for an application program is disclosed, which includes that: a first terminal converts a file of a specified application program stored by the first terminal per se into an...
8547568 Approach for securely printing electronic documents  
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct...
8549606 Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content  
There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and...
8549421 Apparatus and method for managing content  
A content management apparatus displays, on a display unit, a first display object representing a content item, at least one area for including the first display object, and a second display...
8549585 Method and apparatus to implement secured, layered logout from a computer system  
A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of...
8548924 Self-authorizing token  
Self-authorizing tokens are disclosed. Typical embodiments employ a secure element and a secure element interrogator. Such tokens may be used for authorization of financial payments and other...
8549278 Rights management services-based file encryption system and method  
Windows Rights Management Services (RMS) are leveraged to provide protection and sharing of encryption keys to file systems. An encrypting file system (EFS) delegates key sharing, management and...
8542593 System and methods for error tolerant content delivery over multicast channels  
In one embodiment of the invention, a system and method for error tolerant delivery of data is provided. A data file is received for transmission which includes metadata and data. The metadata...
8543832 Service provision system and communication terminal  
A first memory unit is arranged outside a block that is under security control. The block includes: a second memory unit; an acquisition unit for acquiring biological information on a living body...
8544060 Method and system for detecting and protecting against potential data loss from unknown applications  
A system and method for detecting and protecting against potential data loss from unknown applications is described. In one embodiment, a method includes detecting, by an endpoint data loss...
RE44503 Memory device storing identifying information and memory card including the same  
In a memory system using a removable recording medium and data stored in the recording medium, identifying information for identifying each recording medium from others is held in the recording...
8539233 Binding content licenses to portable storage devices  
Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage...
8539230 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method
 
An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a...
8539244 Server, authentication server, content delivery system, and program  
A service provider server has management means which manages a user ID corresponding to a service user and a device IDs corresponding to an information processing terminals of the service user in...
8538020 Hybrid client-server cryptography for network applications  
In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data can be encrypted at a client device...
8539228 Managing access to a resource  
Methods of managing access to at least one resource in a computer system. The methods may comprise the step of associating access rights with an application resource. The access rights may define...
8533489 Searchable symmetric encryption with dynamic updating  
A Searchable Symmetric Encryption (SSE) mechanism is described which allows efficient dynamic updating of encrypted index information. The encrypted index information includes pointer information...
8533821 Detecting and defending against man-in-the-middle attacks  
A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that...
8533456 Accelerating stream cipher operations using single and grid systems  
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method separates the data into multiple file...
8533467 System and method of mobile lightweight cryptographic directory access  
A system for handling an LDAP service request to an LDAP server for an LDAP service comprises a client program executable on a client system and a handler program executable on a handler system....
8533837 System and method for network edge data protection  
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate...
8533466 Electronic file access control system and method  
A digital file is associated with a header in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless...