Sign up


Match Document Document Title
9015498 Information processing apparatus and control method thereof  
An information processing apparatus capable of communicating with a document management service and a terminal device, the apparatus comprises: acceptance means for accepting, from the terminal...
9014375 Method and apparatus for supporting multiple broadcasters independently using a single conditional access system  
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The...
9014372 Video file encryption and decryption method, device, and mobile terminal  
This discloses a video file encryption and decryption method, device, and mobile terminal. The encryption method can include: obtaining a to-be-encrypted video file and an encryption key,...
9015499 Verifying data integrity utilizing dispersed storage  
A method begins by a processing module retrieving at least a threshold number of error coded data slices of a set of error coded data slices from storage units of a dispersed storage network (DSN)...
9015480 Systems and methods for secure multi-tenant data storage  
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a distribution of data from an encrypted...
9015858 Graphical user interface for seamless secure private collaboration  
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored...
9009496 Method and apparatus for implementing secure and selectively deniable file storage  
A method for writing data to a memory device comprising a first and a second memory device the first memory device comprises data blocks numbered with block numbers and the second memory device...
9009495 High speed cryptographic combining system, and method for programmable logic devices  
A system, apparatus, method, and/or computer program product is disclosed for decreasing side channel signal leakage and increasing speed of cryptographic combining operations. An exemplary method...
9009497 Secure methods for generating content and operating a drive based on identification of a system on chip  
A method of operating a system on chip. The system on chip includes a controller. The method includes: receiving, at the system on chip and in a storage drive, encrypted content and an encrypted...
9009567 Encrypting distributed computing data  
A method begins by a dispersed storage (DS) processing module encoding data to produce slices and redundancy slices and selecting primary and redundancy storage and execution units. The method...
RE45473 Copy protection using detailed copy control information  
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified...
9009525 Methods and systems for NAS device pairing and mirroring  
One embodiment is a system, comprising a first NAS device, a second NAS device. The first and second NAS devices may be configured to be paired with one another to enable an ongoing secure exchange...
9009494 Memory system for portable telephone  
A memory system is constituted of a file storage flash memory storing a control program required for a control portion and a large amount of data, and a random access memory storing a program used...
9009487 Device archiving of past cluster binding information on a broadcast encryption-based network  
Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or...
9009489 Device archiving of past cluster binding information on a broadcast encryption-based network  
Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or...
9009492 Prevention of playback attacks using OTP memory  
A method for data security includes receiving, in a processor having a one-time programmable (OTP) memory, which includes multiple bits and has a current state defined by the bits of the OTP that...
9003503 Virtual computer and service  
A virtual computer service includes receiving, at a network server computer over a network, an encrypted image and user credentials for a user of a computer, and storing the encrypted image and the...
9003201 Hardware protection for encrypted strings and protection of security parameters  
In one embodiment, a disk drive is provided that is adapted for security authentication. The disk drive includes: a non-volatile memory storing object code; a processor for retrieving the stored...
9003538 Method and system for associating database content for security enhancement  
A system and method for associating database content for security enhancement is provided, the method being applicable to a system comprising a computer configured to process a data management...
9003202 Memory control device, semiconductor memory device, memory system, and memory control method  
A technique for improving data security is provided. To be specific, in a memory system including an information processing apparatus and a semiconductor memory device, the semiconductor memory...
9003203 Storage encryption  
Storage associated with a virtual machine or other type of device may be migrated between locations (e.g., physical devices, network locations, etc.). To maintain the security of the storage, a...
9003204 Optimal re-encryption strategy for joins in encrypted databases  
Methods, systems, and computer-readable storage media for selecting columns for re-encryption in join operations. In some implementations, actions include determining a first column and a second...
9002002 Method and apparatus of high speed encryption and decryption  
A hardware architecture for encryption and decryption device can improve the encryption and decryption data rate by using parallel processing, and pipeline operation, and save footprint by sharing...
9003519 Verifying transactions using out-of-band devices  
The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user device...
9003147 Electronic device and save data recording method  
A virtual capacity acquisition unit acquires a size of virtual capacity of a save data area from an application. A storage capacity acquisition unit acquires a size of save data of the application....
9003184 Computing device and method for protecting software of the computing device  
In a method for protecting software of a computing device, a hypertext preprocessor (PHP) software program of the computing device is encrypted using an encryption rule to obtain an encrypted file....
8996888 Mobile device using secure spin torque transfer magnetic random access memory (STTMRAM)  
A mobile device includes an application processor, an RF modem for connection to cellular networks, wireless device for connection to wireless networks, a display coupled to the application...
8996885 Secure virtual machine manager  
Secure processing systems providing host-isolated security are provided. An exemplary secure processing system includes a host processor and a virtual machine instantiated on the host processor. A...
8996887 Log structured volume encryption for virtual machines  
Methods, systems, and apparatus, including a method for providing data. The method comprises receiving a first request from a first virtual machine (VM) to store data, obtaining the data and an...
8997174 Configuring browser policy settings on client computing devices  
Systems and methods for configuring browser policy settings on client computing devices are provided. In some aspects, a method includes receiving login credentials from a client computing device....
8996889 Portable computing device with methodologies for client-side analytic data collection  
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having...
8996872 Contactless seed programming method and system thereof  
The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains...
8996851 Host device and method for securely booting the host device with operating system code loaded from a storage device  
A host device and method for securely booting the host device with operating system code loaded from a storage device are provided. In one embodiment, a host device is in communication with a...
8997251 Virtual write protection system  
An optical medium containing virtual write protect information can be recorded in drives and systems without first changing the write protection from on to off by receiving valid user input. The...
8997209 Memory device comprising a plurality of memory chips, authentication system and authentication method thereof  
A memory device includes a plurality of memory chips, including one or more memory chips that store authentication information, and a controller including a first register that stores information...
8997199 Token-based security for links to media streams  
Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption...
8996886 Encrypted biometric data management and retrieval  
Aspects of the present invention provide a solution for managing and retrieving encrypted biometric data. A plurality of biometric entries is obtained and each one is encrypted with a unique...
8996744 Managing firmware update attempts  
Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure...
8990578 Password authentication circuit and method  
A password authentication circuit includes a timer that measures first and second periods of a password authentication period, a control circuit that, in a first period, disables writing of a...
8990589 System and method for robust full-drive encryption  
System and method for fault-recoverable full-drive encryption. A buffer is allocated to temporarily retain different subsets of the plurality of segments at various times. An encrypted space mask...
8990588 Storage system, storage control apparatus, and storage control method  
A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the...
8990576 Methods and apparatus for efficient computation of one-way chains in cryptographic applications  
Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of...
8990586 Method for selectively exposing subscriber data  
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital data storage is protected by a service...
8990583 Forensic investigation tool  
Methods and systems are disclosed a digital investigation tool capable of recovering and decrypting content. The tool combines digital techniques with decryption capability for a wide range of...
8990587 Method and apparatus for secure transport and storage of surveillance video  
Security information such as fixed or dynamically received camera location information, laser signature information, timestamp information, and network information, may be used to secure the...
8990955 Controlling access to a shared file  
A shared data store may be accessible to a plurality of electronic devices and used to share files in a collaboration setting. A shared file is shared by a first electronic device with a second...
8990585 Time based dispersed storage access  
A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues...
8990559 Automating the creation and maintenance of policy compliant environments  
Embodiments of the present invention provide for a method, system, and apparatus for creating a policy compliant environment on a computer. In an embodiment of the invention, an encrypted file can...
8990584 System and method for supporting task oriented devices in a client hosted virtualization system  
A client hosted virtualization system includes a task oriented device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes...
8990571 Host device, semiconductor memory device, and authentication method  
According to one embodiment, encrypted secret identification information (E-SecretID) and the key management information (FKB) are read from a memory device. Encrypted management key (E-FKey) is...