Sign up


Match Document Document Title
8866581 Securing content using a wireless authentication factor  
A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from an external or separate device that...
8868929 Method of mass storage memory management for large capacity universal integrated circuit cards  
In one embodiment, a method for managing information in a large capacity UICC is provided comprising storing content of a file in a mass storage file system of the large capacity UICC, associating...
8868932 Apparatus for selecting and displaying a file associated with a current geographic location  
An apparatus includes a storage device, a position comparison processor coupled to the at least one storage device, and a display coupled to the position comparison processor. A plurality of files...
8868931 System and method of security function activation for a mobile electronic device  
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions...
8869283 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8868904 Information processing device, disc, information processing method, and program  
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a...
8869255 Method and system for abstracted and randomized one-time use passwords for transactional authentication  
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security...
8869265 System and method for enforcing security policies in a virtual environment  
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual...
8868930 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8862903 Information processing apparatus, information processing method and program  
An information processing apparatus, including: a data processing section reproducing contents stored in a medium having a general purpose area in which encrypted contents and utilization...
8862902 Cascaded data encryption dependent on attributes of physical memory  
Apparatus and method for providing data security through cascaded encryption. In accordance with various embodiments, input data are encrypted in relation to a first auxiliary data value to provide...
8861723 Storage device, access device, and program product  
In general, according to one embodiment, a storage device includes a data storage, a key storage, a receiver, an acquisition unit, a first computing unit, and a second computing unit. The data...
8862866 Method and apparatus for providing an adaptable security level in an electronic communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
8863227 Method and apparatus to create and manage a differentiated security framework for content oriented networks  
A network component comprising a receiver configured to receive a signed content item and an associated security information from a publisher, wherein the security information indicates which group...
8862899 Storage access authentication mechanism  
In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes...
8862893 Techniques for performing symmetric cryptography  
Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by...
8860890 Electronic device and control method thereof  
An electronic device and a control method thereof are disclosed, the electronic device including: an operation implementation unit conducting a predetermined operation; a first main controller...
8863310 Method and apparatus for improved digital rights management  
A method and apparatus for improved digital rights management is provided.
8863241 System and method for managing usage rights of software applications  
The present invention disclose a system for securing managing usage rights of plurality of software applications in plurality of client computers devices to be authorized by a server application....
8862876 Method and system for deleting data  
A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein, is provided. Each of the plurality of data segments is...
8863230 Methods of authenticating a programmable integrated circuit in combination with a non-volatile memory device  
Methods of authenticating a combination of a programmable IC and a non-volatile memory device, where the non-volatile memory device stores a configuration data stream implementing a user design in...
8856875 Software delivery models  
Generally, this disclosure describes software delivery systems (and methods). A server is provided that operates to provision software on a customer's local machine. The server system, in response...
8856553 Managing self-encrypting drives in decentralized environments  
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple different...
8856899 Systems and methods for obscuring entry of electronic security term  
A security service determines whether to grant a user access to a resource. The service receives from the user a security term in an obscured form derived from a revealed form of the security term...
8856548 Public cloud data at rest security  
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service. The encryption switch develops a...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856515 Implementation of robust and secure content protection in a system-on-a-chip apparatus  
A content processing integrated circuit includes a system-on-a-chip (SoC) that further includes a processor to receive an authentication request from an external device for authenticating if the...
8856505 Malware management through kernel detection during a boot sequence  
A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing...
8856928 Protecting electronic assets using false profiles in social networks  
An improved technique utilizes a honeypot-style seeding of synthetic user identifiers which, if used by spear-phishing intruders, enable easy discovery of the intruders. Along these lines, an...
8856554 Information terminal and method of reducing information leakage  
An information terminal includes: a storage unit to store information; a data encryption unit to encrypt the information and decrypt the encrypted information using an encryption key; a...
8856536 Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system  
A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first...
8856926 Dynamic policy provisioning within network security devices  
The invention is directed to techniques for dynamic policy provisioning. A network security device may comprise a memory that stores a first policy that identifies a first set of patterns that...
8855297 Device and authentication method therefor  
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key...
8856552 Directory synchronization of a dispersed storage network  
A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded...
8850528 Organizing permission associated with a cloud customer in a virtual computing infrastructure  
Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is...
8850230 Cloud-based movable-component binding  
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing...
8850564 Printing system and image forming apparatus  
A printing system includes an image forming apparatus and a host terminal apparatus. The image forming apparatus is operated by a first user who picks up a printed output of the image forming...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...
8850596 Data leakage detection in a multi-tenant data architecture  
Embodiments relate to a process for identifying data leakage in a data storage system. A table is created with multiple units. Each unit in the table has a unique identifier as a leading key in a...
8848918 Method and system for deleting data  
A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein is provided. Each of the plurality of data segments is...
8850232 Method for protecting a cryptographic module and a device having cryptographic module protection capabilities  
A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a...
8850586 Operation of a dual instruction pipe virus co-processor  
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a content object is stored by a general purpose processor to a system...
8842836 System for and method of cryptographic provisioning  
A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted...
8843768 Security-enabled storage controller  
An apparatus and method are described for encrypting and decrypting information stored in a plurality of disk drives located within a large storage system. In various embodiments of the invention,...
8842825 Data encoding apparatus, data encoding method, data encoding program, and recording medium  
A disclosed data encoding apparatus includes: an arbitrary number of storage units; a data transfer control unit dividing input data into data blocks in accordance with the arbitrary number of...
8843742 Hypervisor security using SMM  
Methods, systems, apparatuses and program products are disclosed for protecting computers and similar equipment from undesirable occurrences, especially attacks by malware. Invariant information,...
8843769 Microcontroller with embedded secure feature  
A secure environment is established within a system on a chip (SoC) without the use of a memory management unit. A set of security parameters is produced by a configuration program executed by a...
8839391 Single token authentication  
A method that includes storing multiple, separate data sets where each data set is related to an access code that is based on a combination of data related to the user and data related to a service...
8839353 Attack protection for trusted platform modules  
A trusted platform module stores information in a protected object having an associated policy. A program requesting access to the information is allowed to access the information if the policy is...
8839439 Operation of a dual instruction pipe virus co-processor  
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A content...