Sign up


Match Document Document Title
8812517 Watermarking of structured results and watermark detection  
A way of detecting a watermark present in a structured result, such as a search result or a machine translation. The structured result is received and a hash is computed based upon at least part of...
8812877 Database encryption system, method, and program  
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration...
8813235 Expert system for detecting software security threats  
An instance of a vulnerability risk management (VRM) module and a vulnerability management expert decision system (VMEDS) module are instantiated in a cloud. The VMEDS module imports scan results...
8811615 Index-based coding with a pseudo-random source  
Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of...
8813247 Providing cryptographic security for objective-oriented programming files  
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and relational database via web pages are...
8812875 Virtual self-destruction of stored information  
A method and apparatus are utilized to conveniently and swiftly render stored information inaccessible. Sensitive information is stored in an encrypted form and by eliminating the key or keys which...
8812876 Enforcing restrictions related to a virtualized computer environment  
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general...
8813186 Modular device authentication framework  
Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes...
8812874 Content deduplication in enterprise rights management  
A system and method is disclosed for implementing an enterprise rights management (ERM) system that enables effective data deduplication of ERM-protected data. An ERM-aware application may segment...
8812869 Programmable logic device with improved security  
Techniques of the present invention impede power consumption measurements of an encryption engine on a logic device by running the encryption engine with an independent clock. This clock produces a...
8813243 Reducing a size of a security-related data object stored on a token  
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored in the token. The object is stored...
8806648 Automatic classification of security vulnerabilities in computer software applications  
Automatically classifying security vulnerabilities in computer software applications by identifying candidate security vulnerabilities in a learning set including at least a first computer software...
8806224 Low cost trusted platform  
A method and apparatus is described herein for emulating a physical trusted platform module (TPM) in a virtual monitor, such as a system management mode (SMM) or a system management interrupt (SMI)...
8804953 Extensive ciphertext feedback  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of...
8806199 Writing application data to a secure element  
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the...
8806208 Apparatuses and methods for enabling a user to consume protected contents of a content provider  
The embodiments of the present invention relate to apparatuses, in terms of a client device (110) and a server (120) and to methods in the client device (110) and in the server (120) respectively...
8806226 Automatic virtualization medium, automatic virtualization method, and information processing apparatus  
A computer-readable recording medium having stored therein a program for causing a computer to execute an automatic virtualization process includes creating a copy of information stored in a...
8806225 Mobile terminal and display controlling method therein  
A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configured to store at least first and second operating systems including at...
8806652 Privacy from cloud operators  
Aspects of the subject matter described herein relate to identity technology. In aspects, even though a cloud operator may control one or all of the entities with which a user device interacts, the...
8806625 Systems and methods for performing security scans  
A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash...
8806657 Method and apparatus for setting access restriction information  
The storage system includes a host computer; a management computer coupled to the host computer; a first storage device coupled to the host computer and the management computer, and including first...
8806220 Device side host integrity validation  
Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device...
8800036 Method and system for adaptive anomaly-based intrusion detection  
The input characteristics of a real-time IDS change continuously with time therefore setting a rigid (time and behavior invariant) classification threshold limits the accuracy that the IDS can...
8799604 Data storage apparatus, information processing apparatus, information processing method, and program  
An information storage apparatus that includes a memory unit, a first controller that reads data from the memory unit, and a second controller included in the memory unit that reads a first...
8798272 Systems and methods for managing multiple keys for file encryption and decryption  
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To...
8799682 Content data reproduction system and recording device  
To exclude any unauthorized device from a system and thereby prevent illegal use of content data, a memory card 10 stores a service key Ksrv for encrypting content key data Kc in a hidden area 14....
8799671 Techniques for detecting encrypted data  
Techniques are described that generally relate to methods for detecting encryption status of a data file or data stream and selectively encrypting the data file or data stream based on the...
8799680 Transactional sealed storage  
A transactional sealed storage system enables data to be accessed according to transactional properties and also enables access to the data to be restricted to secured applications. The...
8799677 Encrypted search database device, encrypted search data adding/deleting method and adding/deleting program  
The encrypted search result adding module of the encrypted search database device includes: a search result generating unit which generates a linear list as a list of search results for newly...
8799681 Redundant array of encrypting disks  
By placing an encryption function below a RAID function and requiring independence of encryption functionality along the same boundaries of data member independence of the RAID function, failures...
8793785 Revokeable MSR password protection  
A microprocessor includes a model specific register (MSR) having an address, fuses manufactured with a first predetermined value, and a control register. The microprocessor initially loads the...
8793510 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8793509 Web authorization with reduced user interaction  
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, from a web browser, a request for a token that authorizes a third party server to...
8793499 Nested digital signatures with constant file size  
A system and method are provided for implementing a digital signature scheme for embedding and validating multiple nested digital signatures in digitally produced documents without modifying a file...
8788907 Memory chip for converting data received from controller controlling reading and writing of data  
According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an external device, includes: a memory...
8788849 Method and apparatus for protecting cached streams  
A system and method for protecting cached streamed data is disclosed. The method may include the steps of generating an encryption key from the streamed data itself, encrypting the streamed data...
8788847 Secure data processing method and associated device  
A secure data processing method includes the following steps: padding (E206) a memory area (MAC′) with a pad value (A); writing (E208) a first datum in the memory area (MAC′); in the area, rea...
8789179 Cloud protection techniques  
Cloud protection techniques are provided. A security breach is detected in a source cloud environment. An enterprise system processing in the source cloud environment is immediately locked down and...
8788848 Optical DNA  
The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for...
8788507 Watermarking of structured results and watermark generation  
A way of generating a watermark for a structured result, such as a search result or a machine translation. A hash function is used to generate a bit sequence for each of a plurality of structured...
8782436 Method and system for transformation of logical data objects for storage  
A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8782428 Encryption device and encryption method  
Even if failure, or the like, occurs during the encryption process, the encryption process is surely resumed. A flag changing unit changes an encryption flag of one disk to being encrypted after an...
8782438 Secure storage and replay of media programs using a hard-paired receiver and storage device  
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream comprising the program material...
8782439 Securing a data segment for storage  
A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and performing a deterministic function on...
8782437 Content protection using block reordering  
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting...
8782435 System and method for validating program execution at run-time using control flow signatures  
A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow...
8781120 Method and device for supplying of a data set stored in a database  
Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which...
8782762 Building data security in a networked computing environment  
In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an...
8782441 Methods and systems for storage of large data objects  
A storage service receives a binary large object (blob) for storage, and the service creates first and second sets of data chunks from the blob. The chunks in the first set together equal the blob,...
8782440 Extending the number of applications for accessing protected content in a media using media key blocks  
Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of...