Sign up


Match Document Document Title
8707435 Method and system for identifying compromised nodes  
The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain...
8705739 On-the-fly encryption on a gaming machine  
Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an...
8707056 Security provision for a subject image displayed in a non-secure domain  
A data processing device is provided with a processor core 8 that can operate in either a secure domain or a non-secure domain. Data stored within a secure region 34 of a memory 10 can only be...
8707034 Method and system for using remote headers to secure electronic files  
An improved file security system that manages secured files (documents) is disclosed. The file security system provides centralized management and storage of security information that can be...
8707051 Method and system for embedded high performance reconfigurable firmware cipher  
A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while accelerating their processing. This firmware...
8707055 Recording medium with copy protection information formed in intermittent or alternate wobbled pits and apparatus and methods for forming, recording, and reproducing the recording medium  
A recording medium, such as a high-density and/or read-only recording medium, such as BD-ROM, which contains copy protection information encoded in intermittent or alternate wobbled pits, and to...
8707058 Systems and methods for cryptographic masking of private data  
Systems and methods for cryptographically masking private data are described. The apparatus may include a masking engine to hash private data and a masking values table to provide a masked value...
8707057 Data processing apparatus and data processing method  
A data processing apparatus includes an address bus, a scramble unit, and a data bus. The address bus outputs address data to be given to a memory apparatus. The scramble unit scrambles write-in...
8707438 System and method for providing storage for electronic records  
Techniques for providing storage for electronic records are described herein. According to one embodiment, a command is received from a client through an interface of a storage system. An approval...
8705075 Image processing device having erase control  
An image processing device comprises an image data input means 2, an image data storage means 12 for storing the image data being input, an image data processing means 6 having multiple processing...
8700920 System and method for content protection on a computing device  
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data...
8701167 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal  
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized databases employs a transmitter for...
8701193 Malware detection via signature indices  
A method, article of manufacture, and apparatus for efficiently processing information are disclosed. In some embodiments, a first signature index is received. The first signature index is compared...
8700921 Fault-resistant exponentiation algorithm  
A method for performing a m-ary right-to-left exponentiation using a base x, a secret exponent d and a modulus N, wherein m is a power of 2. A device having a processor and m+1 registers...
8700914 Method and system for changing safety-relevant data for a control device  
A system and method for changing safety-relevant data for a control device is provided wherein an authorized user inputs new or altered safety-relevant data, which is received on a data processing...
8694800 Apparatus and method for securing data on a portable storage device  
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device...
8695106 Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database  
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric...
8694598 Host device and method for accessing a virtual file in a storage device by bypassing a cache in the host device  
A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a...
8694761 System and method to secure boot both UEFI and legacy option ROM's with common policy engine  
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are...
8695056 Method for information tracking in multiple interdependent dimensions  
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, λI. The method provides a unified information-tracking framework ...
8694798 Generating and securing multiple archive keys  
A method and apparatus for generating multiple keys for a set of archives or portions of a set of archives. The process includes receiving a passphrase from a user and an indicator of a set of...
8694801 Method and computer program for securely storing data  
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different...
8694767 Method and system for NAND flash support in an autonomously loaded secure reprogrammable system  
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a...
8694799 System and method for protection of content stored in a storage device  
The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with...
8689013 Dual-interface key management  
In one embodiment, a device includes a first interface, a second interface, a memory, and a processor coupled to the first and second interfaces and to the memory. The processor is configured to...
8689279 Encrypted chunk-based rapid data encryption policy compliance  
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is...
8689012 Diagnostics for secure elements in a mobile device  
A method of diagnosing a mobile device is provided. The method comprises obtaining an access key from a key store based on an identity of the mobile device and based on an identity associated with...
8689015 Portable secure data files  
A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received,...
8689356 Content data delivery system, and method for delivering an encrypted content data  
A handheld device is configured to be connectable to a storage media that holds a unique media identifier and holds a content key data used to decrypt an encrypted content data. A content data...
8688703 Metadata cache supporting multiple heterogeneous systems  
A request for a metadata object is received. It is determined whether the metadata object is stored in a metadata cache. In the event the metadata object is not stored in the metadata cache, a...
8689011 System and method for content protection  
The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an...
8689008 Operating system  
A new and improved operating system comprising a series of self-contained interconnected modules and service layers for connecting proprietary systems together and extracting and translating data...
8689340 Disk protection system  
A method for protecting content on a medium including a token which implements at least a portion of a keyed function, providing a first encryption method and a first encryption key, inputting each...
8689010 Secure storage for digital rights management  
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these...
8689005 Method for managing and controlling access to confidential information contained in portable electronic media  
A method of the management for confidential information contained in portable memory media provides recognition by a biometric identification element of the individual who is the proprietor of the...
8689347 Cryptographic control for mobile storage means  
A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have...
8689323 Method for activating functions of a tachograph  
A method for activating functions of at least one tachograph having a control unit and an interface. The control unit is activated by a program to perform a first group of functions. First, a...
8689014 Data encryption device and control method thereof  
In an encryption device, in a case where predetermined first data is input, the first data is converted into second data that is data decrypted from the first data and, in a case where the second...
8689009 Authentication-secured access to a data carrier comprising a mass storage device and chip  
The invention provides a method for accessing the mass memory of a data carrier with a mass memory and a chip. The data carrier has been or is personalized by an individual date of a use device...
8683227 Communication system for updating old data with new data  
A communication system is provided with an information processing device, and a management device capable of updating old data stored in the information processing device by outputting new data to...
8683233 Motor vehicle control device  
The invention relates to a method for protecting at least one motor vehicle component against manipulation in a control device, which comprises at least one microcomputer (μC) and at least one ...
8681992 Monitoring and controlling access to electronic content  
Methods, systems and apparatuses for monitoring and controlling access to an electronic content are disclosed. One method includes creating, by an owner server, a group comprising generating a...
8683228 System and method for WORM data storage  
A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the user...
8683578 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8683549 Secure data storage and retrieval incorporating human participation  
A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper...
8683232 Secure user/host authentication  
A portable storage device has a storage peripheral interface connecting to a computer. An encrypted data storage is available to the computer connected to the interface. The encrypted data storage...
8683231 Obfuscating data stored in a dispersed storage network  
A method begins by a processing module dispersed storage error encoding secret data in accordance with first dispersed storage error encoding parameters to produce at least one set of encoded...
8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory  
A method checks the integrity of data stored in a predetermined memory area of a memory of a first device. The first device is coupled to at least one second device by a network The method involves...
8683596 Detection of DOM-based cross-site scripting vulnerabilities  
Testing a Web-based application for security vulnerabilities. At least one client request including a payload having a unique identifier can be communicated to the Web-based application. Response...
8683229 Data encryption device  
A portable data sensor tag includes a memory, a data communication circuit which receives a wireless activation signal from an external terminal, and, in an operation using electromotive force...