Sign up


Match Document Document Title
8996888 Mobile device using secure spin torque transfer magnetic random access memory (STTMRAM)  
A mobile device includes an application processor, an RF modem for connection to cellular networks, wireless device for connection to wireless networks, a display coupled to the application...
8996885 Secure virtual machine manager  
Secure processing systems providing host-isolated security are provided. An exemplary secure processing system includes a host processor and a virtual machine instantiated on the host processor. A...
8996887 Log structured volume encryption for virtual machines  
Methods, systems, and apparatus, including a method for providing data. The method comprises receiving a first request from a first virtual machine (VM) to store data, obtaining the data and an...
8997174 Configuring browser policy settings on client computing devices  
Systems and methods for configuring browser policy settings on client computing devices are provided. In some aspects, a method includes receiving login credentials from a client computing device....
8996889 Portable computing device with methodologies for client-side analytic data collection  
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having...
8996872 Contactless seed programming method and system thereof  
The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains...
8996851 Host device and method for securely booting the host device with operating system code loaded from a storage device  
A host device and method for securely booting the host device with operating system code loaded from a storage device are provided. In one embodiment, a host device is in communication with a...
8997251 Virtual write protection system  
An optical medium containing virtual write protect information can be recorded in drives and systems without first changing the write protection from on to off by receiving valid user input. The...
8997209 Memory device comprising a plurality of memory chips, authentication system and authentication method thereof  
A memory device includes a plurality of memory chips, including one or more memory chips that store authentication information, and a controller including a first register that stores information...
8997199 Token-based security for links to media streams  
Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption...
8996886 Encrypted biometric data management and retrieval  
Aspects of the present invention provide a solution for managing and retrieving encrypted biometric data. A plurality of biometric entries is obtained and each one is encrypted with a unique...
8996744 Managing firmware update attempts  
Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure...
8990578 Password authentication circuit and method  
A password authentication circuit includes a timer that measures first and second periods of a password authentication period, a control circuit that, in a first period, disables writing of a...
8990589 System and method for robust full-drive encryption  
System and method for fault-recoverable full-drive encryption. A buffer is allocated to temporarily retain different subsets of the plurality of segments at various times. An encrypted space mask...
8990588 Storage system, storage control apparatus, and storage control method  
A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the...
8990576 Methods and apparatus for efficient computation of one-way chains in cryptographic applications  
Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of...
8990586 Method for selectively exposing subscriber data  
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital data storage is protected by a service...
8990583 Forensic investigation tool  
Methods and systems are disclosed a digital investigation tool capable of recovering and decrypting content. The tool combines digital techniques with decryption capability for a wide range of...
8990587 Method and apparatus for secure transport and storage of surveillance video  
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network information, may be used to secure the...
8990955 Controlling access to a shared file  
A shared data store may be accessible to a plurality of electronic devices and used to share files in a collaboration setting. A shared file is shared by a first electronic device with a second...
8990585 Time based dispersed storage access  
A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues...
8990559 Automating the creation and maintenance of policy compliant environments  
Embodiments of the present invention provide for a method, system, and apparatus for creating a policy compliant environment on a computer. In an embodiment of the invention, an encrypted file can...
8990584 System and method for supporting task oriented devices in a client hosted virtualization system  
A client hosted virtualization system includes a task oriented device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes...
8990571 Host device, semiconductor memory device, and authentication method  
According to one embodiment, encrypted secret identification information (E-SecretID) and the key management information (FKB) are read from a memory device. Encrypted management key (E-FKey) is...
8984656 Sensitive data aliasing  
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive...
8984302 Information processing apparatus  
According to one embodiment, a first processor of an information processing apparatus switches between a secure mode and a non-secure mode and reports its mode. When the first processor is in the...
8983866 Automated encoding of delta operators  
In one example, a method includes: receiving a first input value associated with a first data field; responsive to determining the first data field is associated with a delta operation, selecting a...
8984660 Portable data carrier having an operating error counter  
A method in a portable data carrier for safeguarding the data carrier against external attacks on the data carrier, wherein at least one counter is employed in the data carrier. A specified command...
8983073 Method and apparatus for restricting the use of integrated circuits  
Approaches for restricting the use of an integrated circuit (IC) are described. In response to receiving an encrypted configuration bitstream, a cryptographic key is retrieved from an internal...
8984301 Efficient identification of entire row uniqueness in relational databases  
A method, system, and computer program product for efficiently comparing multiple columns of a row of a relational database to an incoming record. A computer creates a cryptographic sum for columns...
8983072 Portable data carrier featuring secure data processing  
Disclosed is a method for securely processing data in a portable data carrier. Said method is characterized by the following steps: a) the data to be processed is requested; b) the data to be...
8983074 Input content data managing system and method of managing input content data  
An input content data managing system, includes a first electronic storing apparatus that stores encoded content data generated by encoding content data with a cryptographic key; a electronic...
8977867 Corralling virtual machines with encryption keys  
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more...
8977866 Security mechanism for increased personal data protection  
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include apparatus and methods to manage...
8977868 Flexible printed cable and information processing device  
It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC (1) of this invention includes: a signal line pattern (2) for inputting a communication signal;...
8977865 Data encryption conversion for independent agents  
The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a...
8972723 Storage device and method for providing a partially-encrypted content file to a host device  
A storage device and method for providing a partially-encrypted content file to a host device are provided. In one embodiment, the storage device retrieves a content file from memory in the storage...
8972720 Information processing device and information processing method, and program  
An information processing system including a medium where a content to be played is stored; and a playing apparatus for playing contents stored in the medium; with the playing apparatus being...
8972750 Method and apparatus for securing transfer of secure content to a destination  
A computer implemented method and apparatus for securing transfer of secure content to a destination. The method comprises receiving a request to copy selected content from a secure source...
8972744 Preventing data imprinting in memory  
A method and system of preventing data imprinting. The data includes a payload and a token that may be stored in a memory. The token provides information about the payload format and determines how...
8972743 Computer security system and method  
A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to...
8971525 Method, module and system for providing cipher data  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
8972747 Managing information in a document serialization  
In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of...
8964978 Method and apparatus for efficiently fixing transformed part of content  
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the...
8966646 Software license management  
A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the...
8966284 Hardware driver integrity check of memory card controller firmware  
A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of...
8966243 Method and system for data encryption and decryption in data transmission through the web  
This invention provides a method and system for data encryption and decryption in data transmission through the web. The method includes: a browser sends a cryptographic information acquisition...
8966286 Method, system and integrated circuit for enabling access to a memory element  
A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic...
8966288 System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services  
In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored...
8964976 Secure storage and retrieval of confidential information  
A secure information storage management system may securely manage the storage of confidential information. A randomizer module may randomly generate a schema that specifies a random number of...