Sign up


Match Document Document Title
8793785 Revokeable MSR password protection  
A microprocessor includes a model specific register (MSR) having an address, fuses manufactured with a first predetermined value, and a control register. The microprocessor initially loads the...
8793510 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8793509 Web authorization with reduced user interaction  
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, from a web browser, a request for a token that authorizes a third party server to...
8793499 Nested digital signatures with constant file size  
A system and method are provided for implementing a digital signature scheme for embedding and validating multiple nested digital signatures in digitally produced documents without modifying a file...
8788907 Memory chip for converting data received from controller controlling reading and writing of data  
According to one embodiment, a memory chip, which is connected to a controller that controls reading and writing of data in response to a request from an external device, includes: a memory...
8788849 Method and apparatus for protecting cached streams  
A system and method for protecting cached streamed data is disclosed. The method may include the steps of generating an encryption key from the streamed data itself, encrypting the streamed data...
8788847 Secure data processing method and associated device  
A secure data processing method includes the following steps: padding (E206) a memory area (MAC′) with a pad value (A); writing (E208) a first datum in the memory area (MAC′); in the area, rea...
8789179 Cloud protection techniques  
Cloud protection techniques are provided. A security breach is detected in a source cloud environment. An enterprise system processing in the source cloud environment is immediately locked down and...
8788848 Optical DNA  
The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for...
8788507 Watermarking of structured results and watermark generation  
A way of generating a watermark for a structured result, such as a search result or a machine translation. A hash function is used to generate a bit sequence for each of a plurality of structured...
8782436 Method and system for transformation of logical data objects for storage  
A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8782428 Encryption device and encryption method  
Even if failure, or the like, occurs during the encryption process, the encryption process is surely resumed. A flag changing unit changes an encryption flag of one disk to being encrypted after an...
8782438 Secure storage and replay of media programs using a hard-paired receiver and storage device  
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream comprising the program material...
8782439 Securing a data segment for storage  
A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and performing a deterministic function on...
8782437 Content protection using block reordering  
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting...
8782435 System and method for validating program execution at run-time using control flow signatures  
A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow...
8781120 Method and device for supplying of a data set stored in a database  
Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which...
8782762 Building data security in a networked computing environment  
In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an...
8782441 Methods and systems for storage of large data objects  
A storage service receives a binary large object (blob) for storage, and the service creates first and second sets of data chunks from the blob. The chunks in the first set together equal the blob,...
8782440 Extending the number of applications for accessing protected content in a media using media key blocks  
Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of...
8776174 Security memory access method and apparatus  
Various embodiments comprise apparatuses and methods to allow access to a memory device by an external device. A method includes receiving, at the memory device, a request from the external device...
8775823 System and method for encrypting secondary copies of data  
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the...
8776229 System and method of detecting malicious traffic while reducing false positives  
A system comprises a traffic analysis device and a network device. The traffic analysis device is configured to analyze network traffic received over a communication network and duplicate at least...
8774410 Secret sharing in cryptographic devices via controlled release of plaintext information  
A first cryptographic device generates plaintext information characterizing at least one key or other secret value associated with that device. The first cryptographic device releases portions of...
8776212 Protecting computers using an identity-based router  
A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes a list of authorized devices that...
8775799 Apparatus and method of securely moving security data  
Provided is an apparatus and method of securely moving security data. An apparatus for securely moving security stored in a first apparatus to a second apparatus, includes a status setting unit...
8776210 Statistical message classifier  
A system and method are disclosed for improving a statistical message classifier. A message may be tested with a machine classifier, wherein the machine classifier is capable of making a...
8775827 Read and write optimization for protected area of memory  
A system (and method) to update content of a secure area of a secure digital (SD) card is disclosed. The system performs a first authenticated key exchange to access the secure area of the secure...
8775824 Protecting the security of secure data sent from a central processor for processing by a further processing device  
A data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said secure mode having access to secure data...
8769705 Method for flexible data protection with dynamically authorized data receivers in a content network or in cloud storage and content delivery services  
A networking system comprising an application service that runs on a cloud infrastructure and is configured to receive dual encrypted content from a content provider and re-encrypt the dual...
8769312 Tampering monitoring system, protection control module, and detection module  
Tampering monitoring system can detect whether protection control module is tampered with even if some of detection modules are tampered with. Tampering monitoring system includes protection...
8769681 Methods and system for DMA based distributed denial of service protection  
A method and system for protection against denial of service attacks to a server coupled to a network. The server may establish connections with client computers through the network. Packets are...
8769703 System and method for providing a mechanism to virtualize a perpetual, unique system identity on a partitioned computer system  
A computing system using a persistent, unique identifier may be used to authenticate the system that ensures software and configurations of systems are properly licensed while permitting hardware...
8768300 Remote control method and system for smart card  
The present invention provides a remote control method and system for a smart card. The remote control method for a smart card includes the following steps: a smart card management platform...
8769310 Encrypting data objects to back-up  
Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object...
8769307 Secure operation indicator  
A data processing apparatus and a method of indicating operation of a data processor within a secure domain. The apparatus comprising a display for displaying data; a processor operable in a secure...
8769308 Home (e)Node-B with new functionality  
A wireless communication device is configured as an in-home node-B (H(e)NB). The H(e)NB is configured to perform a locking function to control modification of carrier and user controlled...
8769638 Digital content authentication system, image display apparatus applied to the same, and digital content authentication controlling method of the same  
A digital content authentication system, an image display apparatus applied to the system, and a digital content authentication controlling method of the system are provided. The image display...
8769311 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8769309 Flash memory storage system, and controller and method for anti-falsifying data thereof  
A flash memory storage system is provided. The flash memory storage system includes a controller having a rewritable non-volatile memory and a flash memory chip. The rewritable non-volatile memory...
8769700 Method, apparatus and computer program for supporting determination on degree of confidentiality of document  
Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether...
8769260 Messaging system with user-friendly encryption and decryption  
Encryption of message content of an e-mail sent by way of a webmail service may be performed in response to activation of a user interface element. The message content may be encrypted using a...
8769635 Managing connections in a data storage system  
Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more...
8762282 Method for transferring encrypted useful data objects  
An apparatus and method for transferring encrypted useful data objects (NDO) to a first telecommunication terminal (TG1), wherein at least one encrypted useful data object is initially transferred...
8761403 Method and system of secured data storage and recovery  
A method and a system of secured data storage and recovery are provided. First, a secured key and an encrypted user password of a storage device are obtained by using a controller of a storage...
8762716 Image forming apparatus  
An image forming apparatus includes a main controller unit provided in a main body of the image forming apparatus. The main controller includes a replacement component management memory to store...
8762742 Security architecture for using host memory in the design of a secure element  
Embodiments of a security architecture for securely storing applications, such as Near Field Communication (NFC) applications, in host memory of a mobile device are provided. The mobile device...
8763131 Mobile application security score calculation  
The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications,...
8762741 Privacy-preserving communication  
Anonymous information sharing systems and methods enable communication of information to parties in a privacy-preserving manner such that no one other than the designated parties can know the...
8762743 Encrypting data objects to back-up  
Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object...