Sign up


Match Document Document Title
8862903 Information processing apparatus, information processing method and program  
An information processing apparatus, including: a data processing section reproducing contents stored in a medium having a general purpose area in which encrypted contents and utilization...
8862902 Cascaded data encryption dependent on attributes of physical memory  
Apparatus and method for providing data security through cascaded encryption. In accordance with various embodiments, input data are encrypted in relation to a first auxiliary data value to provide...
8861723 Storage device, access device, and program product  
In general, according to one embodiment, a storage device includes a data storage, a key storage, a receiver, an acquisition unit, a first computing unit, and a second computing unit. The data...
8862866 Method and apparatus for providing an adaptable security level in an electronic communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
8863227 Method and apparatus to create and manage a differentiated security framework for content oriented networks  
A network component comprising a receiver configured to receive a signed content item and an associated security information from a publisher, wherein the security information indicates which group...
8862899 Storage access authentication mechanism  
In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes...
8862893 Techniques for performing symmetric cryptography  
Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by...
8860890 Electronic device and control method thereof  
An electronic device and a control method thereof are disclosed, the electronic device including: an operation implementation unit conducting a predetermined operation; a first main controller...
8863310 Method and apparatus for improved digital rights management  
A method and apparatus for improved digital rights management is provided.
8863241 System and method for managing usage rights of software applications  
The present invention disclose a system for securing managing usage rights of plurality of software applications in plurality of client computers devices to be authorized by a server application....
8862876 Method and system for deleting data  
A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein, is provided. Each of the plurality of data segments is...
8863230 Methods of authenticating a programmable integrated circuit in combination with a non-volatile memory device  
Methods of authenticating a combination of a programmable IC and a non-volatile memory device, where the non-volatile memory device stores a configuration data stream implementing a user design in...
8856875 Software delivery models  
Generally, this disclosure describes software delivery systems (and methods). A server is provided that operates to provision software on a customer's local machine. The server system, in response...
8856553 Managing self-encrypting drives in decentralized environments  
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple different...
8856899 Systems and methods for obscuring entry of electronic security term  
A security service determines whether to grant a user access to a resource. The service receives from the user a security term in an obscured form derived from a revealed form of the security term...
8856548 Public cloud data at rest security  
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service. The encryption switch develops a...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856515 Implementation of robust and secure content protection in a system-on-a-chip apparatus  
A content processing integrated circuit includes a system-on-a-chip (SoC) that further includes a processor to receive an authentication request from an external device for authenticating if the...
8856505 Malware management through kernel detection during a boot sequence  
A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing...
8856928 Protecting electronic assets using false profiles in social networks  
An improved technique utilizes a honeypot-style seeding of synthetic user identifiers which, if used by spear-phishing intruders, enable easy discovery of the intruders. Along these lines, an...
8856554 Information terminal and method of reducing information leakage  
An information terminal includes: a storage unit to store information; a data encryption unit to encrypt the information and decrypt the encrypted information using an encryption key; a...
8856536 Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system  
A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first...
8856926 Dynamic policy provisioning within network security devices  
The invention is directed to techniques for dynamic policy provisioning. A network security device may comprise a memory that stores a first policy that identifies a first set of patterns that...
8855297 Device and authentication method therefor  
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key...
8856552 Directory synchronization of a dispersed storage network  
A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded...
8850528 Organizing permission associated with a cloud customer in a virtual computing infrastructure  
Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is...
8850230 Cloud-based movable-component binding  
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing...
8850564 Printing system and image forming apparatus  
A printing system includes an image forming apparatus and a host terminal apparatus. The image forming apparatus is operated by a first user who picks up a printed output of the image forming...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...
8850596 Data leakage detection in a multi-tenant data architecture  
Embodiments relate to a process for identifying data leakage in a data storage system. A table is created with multiple units. Each unit in the table has a unique identifier as a leading key in a...
8848918 Method and system for deleting data  
A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein is provided. Each of the plurality of data segments is...
8850232 Method for protecting a cryptographic module and a device having cryptographic module protection capabilities  
A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a...
8850586 Operation of a dual instruction pipe virus co-processor  
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a content object is stored by a general purpose processor to a system...
8842836 System for and method of cryptographic provisioning  
A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted...
8843768 Security-enabled storage controller  
An apparatus and method are described for encrypting and decrypting information stored in a plurality of disk drives located within a large storage system. In various embodiments of the invention,...
8842825 Data encoding apparatus, data encoding method, data encoding program, and recording medium  
A disclosed data encoding apparatus includes: an arbitrary number of storage units; a data transfer control unit dividing input data into data blocks in accordance with the arbitrary number of...
8843742 Hypervisor security using SMM  
Methods, systems, apparatuses and program products are disclosed for protecting computers and similar equipment from undesirable occurrences, especially attacks by malware. Invariant information,...
8843769 Microcontroller with embedded secure feature  
A secure environment is established within a system on a chip (SoC) without the use of a memory management unit. A set of security parameters is produced by a configuration program executed by a...
8839391 Single token authentication  
A method that includes storing multiple, separate data sets where each data set is related to an access code that is based on a combination of data related to the user and data related to a service...
8839353 Attack protection for trusted platform modules  
A trusted platform module stores information in a protected object having an associated policy. A program requesting access to the information is allowed to access the information if the policy is...
8839439 Operation of a dual instruction pipe virus co-processor  
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A content...
8839004 Secure cloud computing infrastructure  
In one embodiment, a system for secure application hosting is provided. The system includes a memory, a first processor coupled to the memory, a second processor coupled to the first processor via...
8839003 Information management system, information management method and apparatus, and encryption method and program  
An information management system provided with an encrypting means for encrypting an original file to prepare an encrypted file, a data storage memory which stores the encrypted file, a decrypting...
8839002 Optical media recording device for protecting device keys and related method  
To protect device keys, an optical media recording device capable of performing AACS encryption on data does not have any device keys, and the optical media recording device performs AACS...
8838985 Method and apparatus for authenticating static transceiver data and method of operating an AIS transceiver  
A method and apparatus which ensures that static data entered into a communications device or apparatus is accurate, or at least consistent with data provided to an authentication service. In some...
8837734 Managing encrypted data and encryption keys  
A data module encrypts a first portion of a drive in a data center using a first encryption key. The data module encrypts the first encryption key using a second encryption key to obtain an...
8839359 Data processing device and data processing method  
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and...
8837717 Non-retained message system  
A system and method for non-retained electronic messaging is described. In one embodiment, the system includes a message receiver module, a message storing and identifier generation module, a...
8839354 Mobile enterprise server and client device interaction  
A system includes an application server that hosts a plurality of enterprise applications and stores enterprise data associated with each of the enterprise applications. A client device executes a...
8838998 Circuit personalization  
A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and...