Match Document Document Title
9043900 Display device and method for controlling the same  
A display device is disclosed. The display device comprising: a display unit; a sensor unit; a storage unit; and a processor configured to: provide feedback for indicating a security on state of...
9043899 Variable domain resource data security for data processing systems  
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product...
9038128 Applying security category labels to multi-tenant applications of a node in a platform-as-a-service environment  
A mechanism for applying security category labels to multi-tenant applications of a node in a PaaS environment is disclosed. A method of embodiments includes generating, by a virtual machine (VM),...
9032493 Connecting mobile devices, internet-connected vehicles, and cloud services  
A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle...
9032174 Information processing apparatus for restricting access to memory area of first program from second program  
A processor determines whether a first program is under execution when a second program is executed, and changes a setting of a memory management unit based on access prohibition information so...
9032542 System and method for creating conditional immutable objects in a storage device  
A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the...
9031536 Method for mitigating the unauthorized use of a device  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
9021547 Fully integrated switching and routing in a security device  
This disclosure is directed toward an integrated switching and routing security device that provides zone-based security directly between layer two (L2) interfaces of L2 bridge domains and/or...
9021546 Systems and methods for workload security in virtual data centers  
A computer-implemented method for workload security in virtual data centers may include (1) identifying a virtual data center that hosts a plurality of workloads sharing a common computing...
9021258 Method and device for transcoding during an encryption-based access check on a database  
A device for transcoding during an encryption-based access check of a client device to a databank, which provides a data set in an encrypted area, has: a unit for assigning a specific access level...
9021559 Server-based architecture for securely providing multi-domain applications  
A Multilevel Security (MLS) server provides MLS functionality to single-level applications running on a remote Multiple Independent Level Security (MILS) or MLS client device. More specifically,...
9021593 XSS detection method and device  
The present invention discloses a XSS detection method for detecting the XSS vulnerabilities in a web page, comprising for each parameter-value pair in a set of parameter-value pairs that can be...
9015495 Telecommunications device security  
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment and a secure execution environment The mobile terminal enables the software...
9013740 Information processing apparatus, control method therefor and computer-readable storage medium  
This invention provides a mechanism which improves the operability by speeding up an operation of displaying a personal address book. To accomplish this, an information processing apparatus...
9015472 Marking electronic messages to indicate human origination  
Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message...
9015791 Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same  
A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and...
9009798 System, method and computer program product for providing unified authentication services for online applications  
A system and method remotely enrolls, authenticates and provides unified authentication services in an ASP setting to a user to access requested information via a communication medium. A filter is...
RE45473 Copy protection using detailed copy control information  
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified...
9009785 System and method for implementing adaptive security zones  
A system for managing adaptive security zones in complex business operations, comprising a rules engine adapted to receive events from a plurality of event sources and a security manager coupled...
9003185 Client computer, remote control system, and remote control method  
A client computer that is connectable to a host computer by a network, includes a communication part to communicate with the host computer; a user input part; a system part to perform a function...
8997185 Encryption sentinel system and method  
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server...
8996866 Unobtrusive assurance of authentic user intent  
Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such...
8990560 Multiple independent levels of security (MILS) host to multilevel secure (MLS) offload communications unit  
Systems and methods for use in secure network communication. A physical network interface receives a network packet associated with a security level. The network packet is transmitted from the...
8990907 Managing security credentials for scaled-out services  
Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a...
8990571 Host device, semiconductor memory device, and authentication method  
According to one embodiment, encrypted secret identification information (E-SecretID) and the key management information (FKB) are read from a memory device. Encrypted management key (E-FKey) is...
8990893 Enterprise application session control and monitoring in a large distributed environment  
Mechanisms are provided for performing centralized control of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an...
8990955 Controlling access to a shared file  
A shared data store may be accessible to a plurality of electronic devices and used to share files in a collaboration setting. A shared file is shared by a first electronic device with a second...
8984269 Migrating data among cloud-based storage networks via a data distribution service  
Embodiments relate to systems and methods for migrating data between cloud networks via a data distribution service. In aspects, an administrator of a data payload may wish to migrate the data...
8977849 Systems and methods for creating a rights management system (RMS) with superior layers and subordinate layers  
A computer-implemented method for creating a rights management system (RMS) with superior layers and subordinate layers is described. A separate trust network for one or more layers of the RMS is...
8977848 Method and system for reconciling safety-critical and high assurance security functional requirements between safety and security domains  
Systems and methods for providing safety and security functions are disclosed. The system includes a computing device that provides at least a first partition and a second partition. The computing...
8978155 Apparatus, methods, and computer program products providing dynamic provable data possession  
In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file; and maintaining a skip list for the data. The skip list is an...
8970400 Unmanned vehicle civil communications systems and methods  
A mass notification push application and a civic-communication application combined into one with the primary purpose of allowing up-to-the-minute UAV aerial imagery as selected by drone...
8972725 Security infrastructure for cloud services  
A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's...
8973144 System and method for kernel rootkit protection in a hypervisor environment  
A method includes creating a soft whitelist having an entry corresponding to a first guest kernel page in a guest operating system (OS) in a hypervisor environment including a hypervisor. The...
8966648 Method and apparatus for variable privacy preservation in data mining  
Improved privacy preservation techniques are disclosed for use in accordance with data mining. By way of example, a technique for preserving privacy of data records for use in a data mining...
8959304 Management of data processing security in a secondary processor  
A data processing apparatus comprises a primary processor, a secondary processor configured to perform secure data processing operations and non-secure data processing operations and a memory...
8959339 Method and system for preventing unauthorized processor mode switches  
A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple...
8954736 Limiting the functionality of a software program based on a security model  
Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the...
8955104 Method and system for monitoring system memory integrity  
A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and...
8954727 Security control in a communication system  
A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The...
8955032 Assessing network and device compliance with security policies  
All of the transit services that each device is expected to provide are determined and contrasted with the transit configuration of each device. Because the transit configuration of each device...
8955047 Method client and system for authentication of a low-security client and a high-security client in a mobile radio network  
A method for authentication of a high-security client and a low-security client in a high-security mobile radio network includes: transmitting a request for authentication from a base station to...
8954756 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8955150 Apparatus and method for managing digital rights using virtualization technique  
The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to...
8955056 Terminal and method for assigning permission to application  
A terminal to assign permission to an application includes a storage device to store an application list including information of applications authorized to receive manager permission, and an...
8947211 Communication data protection method based on symmetric key encryption in RFID system, and apparatus for enabling the method  
A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency...
8949951 Generating modular security delegates for applications  
Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple...
8949813 Systems and methods for facilitating activation of operating systems  
Systems and methods are disclosed that may be implemented to install and use a replacement BIOS code stored in non-volatile memory of the system BIOS to facilitate activation of a new or...
8942719 Locating a nearby mobile device without using GPS  
A method, system, and medium are provided for locating a lost mobile device utilizing a radio frequency signal associated with the lost mobile device. One embodiment of the method includes...
8938612 Limited-access state for inadvertent inputs  
Techniques for a computing device operating in access-states are provided. One example method includes receiving, by the computing device operating in a first access state, an indication of first...