Sign up


Match Document Document Title
8826405 Trusting an unverified code image in a computing device  
A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to...
8826448 System, method and apparatus for electronically protecting data and digital content  
A system, method and apparatus for protecting sensitive data in a file that has been replaced with pointer(s) for each sensitive data. The sensitive data items are protected by restricting...
8826043 Removable, active, personal storage device, system and method  
A storage device is configured to communicate with a host device over a Bluetooth connection. The storage device includes a flash memory, a processor, and a Bluetooth controller. The memory stores...
8826035 Cumulative integrity check value (ICV) processor based memory content protection  
In general, in one aspect, the disclosure describes a process that includes a cryptographic engine and first and second registers. The cryptographic engine is to encrypt data to be written to...
8826449 Data security in a disconnected environment  
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and methods regulate access to sensitive...
8826409 Secure digital download storage device  
A secure USB flash drive employing digital rights management to implement secure digital media storage such as that provided by encrypted storage utilizing content protection for recordable media...
8826378 Techniques for authenticated posture reporting and associated enforcement of network access  
Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform...
8826435 Apparatus and methods for protecting removable storage devices from malware infection  
One embodiment relates to a computer-implemented method for protecting a removable storage device from malware on a computer apparatus. An indication is received that the removable storage device...
8826041 In-band detection mechanism for detecting intermediate layer in a storage I/O driver stack  
A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and...
8826407 System and method for access control and identity management  
A mechanism for the flow of access by derivation is provided. An access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access...
8826040 Product security system  
The present invention relates to a product information system and a corresponding method in a product information system with products 2, to which there are applied machine-readable items of...
8826039 Apparatus and method for providing hardware security  
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of unauthorized accesses from external...
8826042 Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device  
A technique allowing an improvement in the confidentiality of information stored in a memory device. A memory controller includes a key generation part that newly generates key information for use...
8826019 Centralized authentication system with safe private data storage and method  
A token-based centralized authentication method for providing access to a service provider to user information associated with a user's relationship with the service provider includes the steps of:...
8826021 System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data  
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored information, which is accomplished by imposing...
8819451 Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks  
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that...
8819846 Making system constraints of a specified permission in digital rights management  
A method and a terminal device for making multi-system constraint of a specified permission in a digital rights. A rights object related to content object is obtained by an executing device. The...
8819455 Parallelized counter tree walk for low overhead memory replay protection  
A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks...
8819446 Support for secure objects in a computer system  
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected from other software on the computer...
8819452 Efficient storage of encrypted data in a dispersed storage network  
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the...
8819453 Protection of user-generated information in the cloud  
Data is protected from unauthorized access with a combination of technological and legal means. A technological measure is used to control access to a user created data package including a work of...
8819456 Content receiving terminal, content exporting and reproducing method, and recording medium  
A content exporting and reproducing method includes i) a content export step of encrypting a decryption key for content, that is used for decrypting the encrypted content, by using an encryption...
8819450 System and method for providing data integrity  
Systems and methods for providing data integrity for stored data are disclosed. A method may include, in connection with the receipt of a read command at a storage resource, reading a data block...
8817988 Variable epoch scheduler for proactive cryptography systems  
An improved technique involves protecting a set of resources in a distributed computer system by scheduling epochs for replacing keys that have a variable duration. Along these lines, a Variable...
8819458 Information processing apparatus, program execution method, and computer program  
An information processing apparatus includes: a program executing unit which interprets and executes codes of a computer program created in a procedural language in an environment with a tamper...
8819457 Systems and methods for content playback and recording  
A method for content playback and recording may include using a computer to obtain media content from a recorded medium. Concurrently with obtaining the media content, the method may include...
8817975 Cryptographic processing apparatus and operation method  
According to one embodiment, a cryptographic processing apparatus is provided with first to fifth units. The first unit mask-converts input data from first temporary mask into first fixed mask (an...
8819454 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8819855 System and method for deploying handheld devices to secure an area  
A handheld security system comprises a set of handheld devices positioned at a group of access points to a secure area. The handheld device comprises a set of input/output devices including a text...
8819842 Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention  
A method and circuit for implementing conductive microcapsule rupture to generate a tamper event for data theft prevention, and a design structure on which the subject circuit resides are provided....
8812517 Watermarking of structured results and watermark detection  
A way of detecting a watermark present in a structured result, such as a search result or a machine translation. The structured result is received and a hash is computed based upon at least part of...
8812877 Database encryption system, method, and program  
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration...
8813235 Expert system for detecting software security threats  
An instance of a vulnerability risk management (VRM) module and a vulnerability management expert decision system (VMEDS) module are instantiated in a cloud. The VMEDS module imports scan results...
8811615 Index-based coding with a pseudo-random source  
Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of...
8813247 Providing cryptographic security for objective-oriented programming files  
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and relational database via web pages are...
8812875 Virtual self-destruction of stored information  
A method and apparatus are utilized to conveniently and swiftly render stored information inaccessible. Sensitive information is stored in an encrypted form and by eliminating the key or keys which...
8812876 Enforcing restrictions related to a virtualized computer environment  
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general...
8813186 Modular device authentication framework  
Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes...
8812874 Content deduplication in enterprise rights management  
A system and method is disclosed for implementing an enterprise rights management (ERM) system that enables effective data deduplication of ERM-protected data. An ERM-aware application may segment...
8812869 Programmable logic device with improved security  
Techniques of the present invention impede power consumption measurements of an encryption engine on a logic device by running the encryption engine with an independent clock. This clock produces a...
8813243 Reducing a size of a security-related data object stored on a token  
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored in the token. The object is stored...
8806648 Automatic classification of security vulnerabilities in computer software applications  
Automatically classifying security vulnerabilities in computer software applications by identifying candidate security vulnerabilities in a learning set including at least a first computer software...
8806224 Low cost trusted platform  
A method and apparatus is described herein for emulating a physical trusted platform module (TPM) in a virtual monitor, such as a system management mode (SMM) or a system management interrupt (SMI)...
8804953 Extensive ciphertext feedback  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of...
8806199 Writing application data to a secure element  
Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the...
8806208 Apparatuses and methods for enabling a user to consume protected contents of a content provider  
The embodiments of the present invention relate to apparatuses, in terms of a client device (110) and a server (120) and to methods in the client device (110) and in the server (120) respectively...
8806226 Automatic virtualization medium, automatic virtualization method, and information processing apparatus  
A computer-readable recording medium having stored therein a program for causing a computer to execute an automatic virtualization process includes creating a copy of information stored in a...
8806225 Mobile terminal and display controlling method therein  
A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configured to store at least first and second operating systems including at...
8806652 Privacy from cloud operators  
Aspects of the subject matter described herein relate to identity technology. In aspects, even though a cloud operator may control one or all of the entities with which a user device interacts, the...
8806625 Systems and methods for performing security scans  
A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash...