Sign up


Match Document Document Title
8898756 System and method for password recovery  
A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password...
8898542 Executing partial tasks in a distributed storage and task network  
A method begins by a dispersed storage (DS) processing module receiving a partial task regarding an encoded data block grouping. The method continues with the DS processing module performing the...
8898467 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection  
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from an activated sink. In response to the...
8898465 System and method for fuse enablement of a secure client hosted virtualization in an information handling system  
A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the...
8894485 Electronic gaming system with ROM-based media validation  
Examples disclosed herein relate to systems and methods for validating the authenticity of one or more media associated with a gaming system. The systems and methods may utilize a public key in...
8898483 Born encrypted optical data  
A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has...
8898482 Encryption system using clients and untrusted servers  
In one embodiment of the present invention, a first user—the creator—uses a web browser to encrypt some information. The web browser provides to the creator a URL which contains the key used for...
8898805 Electronic identification  
A method may include forwarding, by a mobile device, a request for identification information associated with a user of the mobile device. The method may also include receiving, from an...
8892877 Method and device for accessing files of a secure file server  
A method and a device are provided for accessing data files of a secure file server, wherein a user or a process is authenticated; wherein access to the data files of the secure file server takes...
8892905 Method and apparatus for performing selective encryption/decryption in a data storage system  
One embodiment of the present invention provides a system for performing selective encryption/decryption in a data storage system. During operation, the system receives a data block from a storage...
8892906 Method and apparatus for improved information transactions  
Methods and systems for analyzing an image, such as a newspaper or magazine pager or the like including text by mapping the image to determine regions of text and analyzing portions of the image in...
8892907 Storage and recovery of cryptographic key identifiers  
Example embodiments provide various techniques for storing and recovering a cryptographic key identifier that may be used to recover encrypted data. The cryptographic key identifier may be stored...
8893285 Securing data using integrated host-based data loss agent with encryption detection  
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated...
8891302 Electronic equipment  
Electronic equipment according to the present disclosure includes a writable non-volatile memory, a plurality of volatile memories, and a sequencer. The writable non-volatile memory stores an...
8892866 Secure cloud storage and synchronization systems and methods  
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can...
8893263 Apparatus and method for securing data on a portable storage device  
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device...
8891773 System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions  
Aspects of the disclosure pertain to a system and method for key wrapping via a storage system to allow secure access to media of the system by multiple authorities with modifiable permissions. The...
8892611 Assigning data for storage based on speed with which data may be retrieved  
A method, system, and apparatus for improving performance when retrieving data from one or more storage media. Files to be stored on the one or more storage media are classified into a ranking of...
8891764 Quarantine method for sellable virtual goods  
A method is disclosed for quarantining digital content data for a service in a terminal device. In an embodiment, the method includes creating a digital content data item, e.g. a digital still...
8886963 Secure relocation of encrypted files  
Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a tem...
8886962 Systems and methods for disk encryption with two keys  
Embodiments provide for using two encryption keys to encrypt data instead of only one as is customarily used in the industry. According to various embodiments, a default encryption key is generated...
8886964 Protecting remote asset against data exploits utilizing an embedded key generator  
Some embodiments include a method of using different keys from an embedded key generator for each update of a trusted storage to mitigate common user-based exploits (clone, restore, tamper) of the...
8887272 Medical device customization system  
A medical device customization system and method comprising medical device that receives signals from a biological probe having an operational parameter and that stores data based on the signals in...
8886711 File system adapted for use with a dispersed data storage network  
A computer a network interface and a central processing unit. The network interface communicates with a network. The central processing unit (CPU) is operable to receive a networked file system...
8880827 Method for executing security-relevant and non-security-relevant software components on a hardware platform  
A method for executing safety-relevant and non-safety-relevant software components on a hardware platform comprising a computer, memory and a monitoring component that operates independently of the...
8880898 Anti-roll-back mechanism for counter  
A method of maintaining a version counter indicative of a version of memory content stored in a processing device. The method comprises selectively operating the device in a first or second mode....
8880900 Memory system  
A memory system comprises: a memory device including an authentication data area storing authentication unit information and a verification value, and a contents data area storing contents; and a...
8880903 Removable drive with data encryption  
A removable drive such as a USB drive or key is provided for connecting to computer devices to provide secure and portable data storage. The drive includes a drive manager adapted to be run by an...
8881264 Method for controlling the execution of an applet for an IC card  
A method for controlling the execution of an applet for an IC Card including a java card platform, includes a phase for downloading the applet inside the IC Card, a phase for executing the applet...
8881307 Electronic file security management platform  
According to some embodiments, an electronic file security management platform may receive a request from a user to access a first electronic file associated with a first application, such as a...
8881310 Remotely initiating lost mode on a computing device  
Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a...
8881244 Authorizing computing resource access based on calendar events in a networked computing environment  
An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing...
8880905 Methods for processing private metadata  
According to one aspect of the invention, a file received from a first user is stored in a storage device, where the file includes private metadata encrypted by a secret key associated with a...
8880904 System and method for securing data  
The invention relates to a system and method for making data secure. The inventive system is characterized in that it comprises:—a monotonic counter;—a computational entity;—a physical data mediu...
8881301 Protection of proprietary embedded instruments  
A network of storage units has a data path which is at least a portion of the network. The network also has a key storage unit and a gateway storage unit. If the key storage unit stores a key...
8880906 Storing encrypted contents in digital archives  
A digital archive for storing encrypted content includes a header section and a body. The header section includes real headers, wherein at least a portion of each real headers is encrypted, and...
8874929 Cross domain discovery  
Aspects of the disclosure provide methods and systems for cross domain discovery. According to the disclosure, an object can include multiple entities defined by an originator. The multiple...
8875290 Systems and methods for aggressive window probing  
The present application is directed towards systems and methods for aggressively probing a client side connection to determine and counteract a malicious window size attack or similar behavior from...
8874891 Systems and methods for activation of applications using client-specific data  
Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location...
8874917 Storage system in which fictitious information is prevented  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
8874934 Nonvolatile memory device and operating method  
Disclosed is an operating method of a non-volatile memory device which comprises randomizing data to store the randomized data; erasing the randomized data; and outputting erase data according to...
8875268 Browser session privacy lock  
Techniques are shown for executing a web browser on a client computing device and requesting access to applications available from a hosting server over a network in communication with the client...
8874936 Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium  
The terminal device 600 comprises: a read unit configured to read encrypted content and a content signature from a regular region of a recording medium device 700, and to read a converted title key...
8874932 Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects  
According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query...
8872677 Method and apparatus for compressing data-carrying signals  
A compression method applies a selection rule to input symbols and generates a reduced partial set of symbols. The partial set is checked against a dictionary-index for a match. A match identifies...
8875281 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8875112 Implementing portable content protection to secure secrets  
A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by shuffling associated data. The program...
8874935 Sector map-based rapid data encryption policy compliance  
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The...
8866581 Securing content using a wireless authentication factor  
A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from an external or separate device that...
8868929 Method of mass storage memory management for large capacity universal integrated circuit cards  
In one embodiment, a method for managing information in a large capacity UICC is provided comprising storing content of a file in a mass storage file system of the large capacity UICC, associating...