Sign up


Match Document Document Title
8874929 Cross domain discovery  
Aspects of the disclosure provide methods and systems for cross domain discovery. According to the disclosure, an object can include multiple entities defined by an originator. The multiple...
8875290 Systems and methods for aggressive window probing  
The present application is directed towards systems and methods for aggressively probing a client side connection to determine and counteract a malicious window size attack or similar behavior from...
8874891 Systems and methods for activation of applications using client-specific data  
Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location...
8874917 Storage system in which fictitious information is prevented  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
8874934 Nonvolatile memory device and operating method  
Disclosed is an operating method of a non-volatile memory device which comprises randomizing data to store the randomized data; erasing the randomized data; and outputting erase data according to...
8875268 Browser session privacy lock  
Techniques are shown for executing a web browser on a client computing device and requesting access to applications available from a hosting server over a network in communication with the client...
8874936 Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium  
The terminal device 600 comprises: a read unit configured to read encrypted content and a content signature from a regular region of a recording medium device 700, and to read a converted title key...
8874932 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects  
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query...
8872677 Method and apparatus for compressing data-carrying signals  
A compression method applies a selection rule to input symbols and generates a reduced partial set of symbols. The partial set is checked against a dictionary-index for a match. A match identifies...
8875281 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8875112 Implementing portable content protection to secure secrets  
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by shuffling associated data. The program...
8874935 Sector map-based rapid data encryption policy compliance  
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The...
8866581 Securing content using a wireless authentication factor  
A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from an external or separate device that...
8868929 Method of mass storage memory management for large capacity universal integrated circuit cards  
In one embodiment, a method for managing information in a large capacity UICC is provided comprising storing content of a file in a mass storage file system of the large capacity UICC, associating...
8868932 Apparatus for selecting and displaying a file associated with a current geographic location  
An apparatus includes a storage device, a position comparison processor coupled to the at least one storage device, and a display coupled to the position comparison processor. A plurality of files...
8868931 System and method of security function activation for a mobile electronic device  
A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions...
8869283 Resisting the spread of unwanted code and data  
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data...
8868904 Information processing device, disc, information processing method, and program  
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a...
8869255 Method and system for abstracted and randomized one-time use passwords for transactional authentication  
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security...
8869265 System and method for enforcing security policies in a virtual environment  
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual...
8868930 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8862903 Information processing apparatus, information processing method and program  
An information processing apparatus, including: a data processing section reproducing contents stored in a medium having a general purpose area in which encrypted contents and utilization...
8862902 Cascaded data encryption dependent on attributes of physical memory  
Apparatus and method for providing data security through cascaded encryption. In accordance with various embodiments, input data are encrypted in relation to a first auxiliary data value to provide...
8861723 Storage device, access device, and program product  
In general, according to one embodiment, a storage device includes a data storage, a key storage, a receiver, an acquisition unit, a first computing unit, and a second computing unit. The data...
8862866 Method and apparatus for providing an adaptable security level in an electronic communication  
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security...
8863227 Method and apparatus to create and manage a differentiated security framework for content oriented networks  
A network component comprising a receiver configured to receive a signed content item and an associated security information from a publisher, wherein the security information indicates which group...
8862899 Storage access authentication mechanism  
In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes...
8862893 Techniques for performing symmetric cryptography  
Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by...
8860890 Electronic device and control method thereof  
An electronic device and a control method thereof are disclosed, the electronic device including: an operation implementation unit conducting a predetermined operation; a first main controller...
8863310 Method and apparatus for improved digital rights management  
A method and apparatus for improved digital rights management is provided.
8863241 System and method for managing usage rights of software applications  
The present invention disclose a system for securing managing usage rights of plurality of software applications in plurality of client computers devices to be authorized by a server application....
8862876 Method and system for deleting data  
A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein, is provided. Each of the plurality of data segments is...
8863230 Methods of authenticating a programmable integrated circuit in combination with a non-volatile memory device  
Methods of authenticating a combination of a programmable IC and a non-volatile memory device, where the non-volatile memory device stores a configuration data stream implementing a user design in...
8856875 Software delivery models  
Generally, this disclosure describes software delivery systems (and methods). A server is provided that operates to provision software on a customer's local machine. The server system, in response...
8856553 Managing self-encrypting drives in decentralized environments  
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple different...
8856899 Systems and methods for obscuring entry of electronic security term  
A security service determines whether to grant a user access to a resource. The service receives from the user a security term in an obscured form derived from a revealed form of the security term...
8856548 Public cloud data at rest security  
An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service. The encryption switch develops a...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856515 Implementation of robust and secure content protection in a system-on-a-chip apparatus  
A content processing integrated circuit includes a system-on-a-chip (SoC) that further includes a processor to receive an authentication request from an external device for authenticating if the...
8856505 Malware management through kernel detection during a boot sequence  
A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing...
8856928 Protecting electronic assets using false profiles in social networks  
An improved technique utilizes a honeypot-style seeding of synthetic user identifiers which, if used by spear-phishing intruders, enable easy discovery of the intruders. Along these lines, an...
8856554 Information terminal and method of reducing information leakage  
An information terminal includes: a storage unit to store information; a data encryption unit to encrypt the information and decrypt the encrypted information using an encryption key; a...
8856536 Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system  
A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first...
8856926 Dynamic policy provisioning within network security devices  
The invention is directed to techniques for dynamic policy provisioning. A network security device may comprise a memory that stores a first policy that identifies a first set of patterns that...
8855297 Device and authentication method therefor  
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key...
8856552 Directory synchronization of a dispersed storage network  
A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded...
8850528 Organizing permission associated with a cloud customer in a virtual computing infrastructure  
Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is...
8850230 Cloud-based movable-component binding  
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing...
8850564 Printing system and image forming apparatus  
A printing system includes an image forming apparatus and a host terminal apparatus. The image forming apparatus is operated by a first user who picks up a printed output of the image forming...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...