Sign up

AcclaimIP-ad

Match Document Document Title
9043595 Selective shredding in a deduplication system  
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
9043612 Protecting visible data during computerized process usage  
Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is...
9043613 Multiple volume encryption of storage devices using self encrypting drive (SED)  
A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating...
9043875 Contactless authentication of optical disk drives  
An optical disc drive (ODD) includes a radio-frequency identification (RFID) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation...
9043616 Efficient storage of encrypted data in a dispersed storage network  
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the...
9043615 Method and apparatus for a trust processor  
In an embodiment, an apparatus includes a cryptographic processor within a wireless device. The cryptographic processor includes at least one cryptographic unit. The cryptographic processor also...
9043610 Systems and methods for data security  
A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a...
9043611 Disk array device and data management method for disk array device  
A disk array device comprises a first storage unit that stores encrypted user data, a second storage unit that is different from the first storage unit and locks and stores configuration...
9043614 Discarding sensitive data from persistent point-in-time image  
A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data...
9041765 Systems and methods for security and privacy controls for videoconferencing  
A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of...
9037855 Method for reproducing content data and method for generating thumbnail image  
A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information;...
9037874 Semiconductor device with copyright protection function  
A semiconductor device includes a serial communication interface connector, a non-volatile semiconductor memory, a memory controller, and a memory reader/writer. The serial communication interface...
9037854 Privileged cryptographic services in a virtualized environment  
A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other...
9037870 Method and system for providing a rotating key encrypted file system  
A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other...
9037875 Key generation techniques  
In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key...
9037873 Method and system for preventing tampering with software agent in a virtual machine  
Techniques are disclosed for monitoring a software agent running in a virtual machine to prevent execution of the software agent from being tampered with. In one embodiment, the software agent...
9036891 Intrinsic physical layer authentication of integrated circuits  
A system and method of generating and comparing a fingerprint for an integrated circuit is provided. A sensor module captures electromagnetic emissions from the integrated circuit. A feature...
9037852 System and method for independent control of for-hire vehicles  
A computer system storing parameters pertaining to the regulatory restrictions placed on a for-hire vehicle compares the parameters to a current operating environment of the for-hire vehicle. In...
9032544 System and method for controlling communication of private information over a network  
A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information...
9032220 System and method for remote reset of password and encryption key  
Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may...
9026804 Methods and apparatus for protected distribution of applications and media content  
Methods, devices, apparatus, computer-readable media and processors are provided that protect the distribution of media content. Media content is encrypted and the associated cryptographic...
9026805 Key management using trusted platform modules  
Described herein are techniques for distributed key management (DKM) in cooperation with Trusted Platform Modules (TPMs). The use of TPMs strengthens the storage and processing security...
9027158 Download method of media contents  
A download method of media contents, and which includes receiving and storing, by an electronic book terminal, a DRM (Digital Right Management) code from a contents server, the DRM code being...
9027031 Allowing inter-process communication via file system filter  
In one embodiment, a method allows an application running in a first process to communicate with a second process. A file system filter driver receives a command from the application for a file....
9027150 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module  
A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A...
9026788 Managing credentials  
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and...
9021273 Efficient storage of encrypted data in a dispersed storage network  
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the...
9021603 Non-volatile memory for anti-cloning and authentication method for the same  
A method and a non-volatile memory apparatus for cloning prevention is provided. The non-volatile memory apparatus includes an Enhanced Media Identification (EMID) area, which is located in a...
9021571 Method and system for processing a data transfer related to a data-storing card  
In a method for processing a data transfer, an electronic device accesses card-specific data and a card account number from a data-storing card. The electronic device generates a device-generated...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9021259 Encrypted database system, client terminal, encrypted database server, natural joining method, and program  
A client terminal is provided with a column encryption unit that, from an encryption key, a table identifier, and a column identifier, generates a column private key, a column public key, and a...
9015498 Information processing apparatus and control method thereof  
An information processing apparatus capable of communicating with a document management service and a terminal device, the apparatus comprises: acceptance means for accepting, from the terminal...
9014375 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system  
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The...
9014372 Video file encryption and decryption method, device, and mobile terminal  
This discloses a video file encryption and decryption method, device, and mobile terminal. The encryption method can include: obtaining a to-be-encrypted video file and an encryption key,...
9015499 Verifying data integrity utilizing dispersed storage  
A method begins by a processing module retrieving at least a threshold number of error coded data slices of a set of error coded data slices from storage units of a dispersed storage network (DSN)...
9015480 Systems and methods for secure multi-tenant data storage  
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a distribution of data from an...
9015858 Graphical user interface for seamless secure private collaboration  
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored...
9009496 Method and apparatus for implementing secure and selectively deniable file storage  
A method for writing data to a memory device comprising a first and a second memory device the first memory device comprises data blocks numbered with block numbers and the second memory device...
9009495 High speed cryptographic combining system, and method for programmable logic devices  
A system, apparatus, method, and/or computer program product is disclosed for decreasing side channel signal leakage and increasing speed of cryptographic combining operations. An exemplary method...
9009497 Secure methods for generating content and operating a drive based on identification of a system on chip  
A method of operating a system on chip. The system on chip includes a controller. The method includes: receiving, at the system on chip and in a storage drive, encrypted content and an encrypted...
9009567 Encrypting distributed computing data  
A method begins by a dispersed storage (DS) processing module encoding data to produce slices and redundancy slices and selecting primary and redundancy storage and execution units. The method...
RE45473 Copy protection using detailed copy control information  
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified...
9009525 Methods and systems for NAS device pairing and mirroring  
One embodiment is a system, comprising a first NAS device, a second NAS device. The first and second NAS devices may be configured to be paired with one another to enable an ongoing secure...
9009494 Memory system for portable telephone  
A memory system is constituted of a file storage flash memory storing a control program required for a control portion and a large amount of data, and a random access memory storing a program used...
9009487 Device archiving of past cluster binding information on a broadcast encryption-based network  
Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or...
9009489 Device archiving of past cluster binding information on a broadcast encryption-based network  
Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or...
9009492 Prevention of playback attacks using OTP memory  
A method for data security includes receiving, in a processor having a one-time programmable (OTP) memory, which includes multiple bits and has a current state defined by the bits of the OTP that...
9003503 Virtual computer and service  
A virtual computer service includes receiving, at a network server computer over a network, an encrypted image and user credentials for a user of a computer, and storing the encrypted image and...
9003201 Hardware protection for encrypted strings and protection of security parameters  
In one embodiment, a disk drive is provided that is adapted for security authentication. The disk drive includes: a non-volatile memory storing object code; a processor for retrieving the stored...
9003538 Method and system for associating database content for security enhancement  
A system and method for associating database content for security enhancement is provided, the method being applicable to a system comprising a computer configured to process a data management...