Sign up

AcclaimIP-ad

Match Document Document Title
8700920 System and method for content protection on a computing device  
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data...
8701167 Method and system for fast access to advanced visualization of medical scans using a dedicated web portal  
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized databases employs a transmitter for...
8701193 Malware detection via signature indices  
A method, article of manufacture, and apparatus for efficiently processing information are disclosed. In some embodiments, a first signature index is received. The first signature index is compared...
8700921 Fault-resistant exponentiation algorithm  
A method for performing a m-ary right-to-left exponentiation using a base x, a secret exponent d and a modulus N, wherein m is a power of 2. A device having a processor and m+1 registers...
8700914 Method and system for changing safety-relevant data for a control device  
A system and method for changing safety-relevant data for a control device is provided wherein an authorized user inputs new or altered safety-relevant data, which is received on a data processing...
8694800 Apparatus and method for securing data on a portable storage device  
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device...
8695106 Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database  
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric...
8694598 Host device and method for accessing a virtual file in a storage device by bypassing a cache in the host device  
A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a...
8694761 System and method to secure boot both UEFI and legacy option ROM's with common policy engine  
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are...
8695056 Method for information tracking in multiple interdependent dimensions  
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, λI. The method provides a unified information-tracking framework ...
8694798 Generating and securing multiple archive keys  
A method and apparatus for generating multiple keys for a set of archives or portions of a set of archives. The process includes receiving a passphrase from a user and an indicator of a set of...
8694801 Method and computer program for securely storing data  
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different...
8694767 Method and system for NAND flash support in an autonomously loaded secure reprogrammable system  
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a...
8694799 System and method for protection of content stored in a storage device  
The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with...
8689013 Dual-interface key management  
In one embodiment, a device includes a first interface, a second interface, a memory, and a processor coupled to the first and second interfaces and to the memory. The processor is configured to...
8689279 Encrypted chunk-based rapid data encryption policy compliance  
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is...
8689012 Diagnostics for secure elements in a mobile device  
A method of diagnosing a mobile device is provided. The method comprises obtaining an access key from a key store based on an identity of the mobile device and based on an identity associated with...
8689015 Portable secure data files  
A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received,...
8689356 Content data delivery system, and method for delivering an encrypted content data  
A handheld device is configured to be connectable to a storage media that holds a unique media identifier and holds a content key data used to decrypt an encrypted content data. A content data...
8688703 Metadata cache supporting multiple heterogeneous systems  
A request for a metadata object is received. It is determined whether the metadata object is stored in a metadata cache. In the event the metadata object is not stored in the metadata cache, a...
8689011 System and method for content protection  
The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an...
8689008 Operating system  
A new and improved operating system comprising a series of self-contained interconnected modules and service layers for connecting proprietary systems together and extracting and translating data...
8689340 Disk protection system  
A method for protecting content on a medium including a token which implements at least a portion of a keyed function, providing a first encryption method and a first encryption key, inputting each...
8689010 Secure storage for digital rights management  
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these...
8689005 Method for managing and controlling access to confidential information contained in portable electronic media  
A method of the management for confidential information contained in portable memory media provides recognition by a biometric identification element of the individual who is the proprietor of the...
8689347 Cryptographic control for mobile storage means  
A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have...
8689323 Method for activating functions of a tachograph  
A method for activating functions of at least one tachograph having a control unit and an interface. The control unit is activated by a program to perform a first group of functions. First, a...
8689014 Data encryption device and control method thereof  
In an encryption device, in a case where predetermined first data is input, the first data is converted into second data that is data decrypted from the first data and, in a case where the second...
8689009 Authentication-secured access to a data carrier comprising a mass storage device and chip  
The invention provides a method for accessing the mass memory of a data carrier with a mass memory and a chip. The data carrier has been or is personalized by an individual date of a use device...
8683227 Communication system for updating old data with new data  
A communication system is provided with an information processing device, and a management device capable of updating old data stored in the information processing device by outputting new data to...
8683233 Motor vehicle control device  
The invention relates to a method for protecting at least one motor vehicle component against manipulation in a control device, which comprises at least one microcomputer (μC) and at least one ...
8681992 Monitoring and controlling access to electronic content  
Methods, systems and apparatuses for monitoring and controlling access to an electronic content are disclosed. One method includes creating, by an owner server, a group comprising generating a...
8683228 System and method for WORM data storage  
A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the user...
8683578 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8683549 Secure data storage and retrieval incorporating human participation  
A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper...
8683232 Secure user/host authentication  
A portable storage device has a storage peripheral interface connecting to a computer. An encrypted data storage is available to the computer connected to the interface. The encrypted data storage...
8683231 Obfuscating data stored in a dispersed storage network  
A method begins by a processing module dispersed storage error encoding secret data in accordance with first dispersed storage error encoding parameters to produce at least one set of encoded...
8683219 Method and apparatus for checking the integrity of data stored in a predetermined memory area of a memory  
A method checks the integrity of data stored in a predetermined memory area of a memory of a first device. The first device is coupled to at least one second device by a network The method involves...
8683596 Detection of DOM-based cross-site scripting vulnerabilities  
Testing a Web-based application for security vulnerabilities. At least one client request including a payload having a unique identifier can be communicated to the Web-based application. Response...
8683229 Data encryption device  
A portable data sensor tag includes a memory, a data communication circuit which receives a wireless activation signal from an external terminal, and, in an operation using electromotive force...
8683230 Saving and retrieving data based on public key encryption  
In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be...
8677152 Method and apparatus for encrypting media programs for later purchase and viewing  
A system and method for storing and retrieving program material for subsequent replay is disclosed. The method includes accepting a receiver ID associated with a receiver key stored in a memory of...
8677151 Content playback method and recording and playback device  
Where a follow-up playback is realized for content data that is recorded by changing an encryption key at predetermined intervals for copyright protection, fast feed and playback operations are...
8677496 Method and apparatus for automatic risk assessment of a firewall configuration  
A method and apparatus for Automatic Risk Assessment of a Firewall Configuration facilitates the automatic generation of a risk assessment of a given firewall configuration. The method scans the...
8676878 Domain managing method, domain extending method and reference point controller electing method  
A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request...
8677153 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Method for protecting a cryptographic module and a device having cryptographic module protection capabilities
 
A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a...
8677149 Method and system for protecting intellectual property in software  
A system and method for modifying material related to computer software. The system receives an original disclosure for a software system. A masquerading algorithm is applied to the original...
8677120 Communication between key manager and storage subsystem kernal via management console  
System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a hardware management console (HMC) to...
8675868 Encrypting an address-dependent value along with code to prevent execution or use of moved code  
A memory is organized into blocks. In a write operation, data to be stored is combined with an address-dependent value (ADV) to form a block of information, and this block is encrypted. The block...
8676576 Information processing system, information processing apparatus, information processing program and recording medium  
A copyright managing information processing apparatus includes a storage module for storing copyrighted content including audio data; a first topic module for recognizing audio data in content...