Sign up

AcclaimIP-ad

Match Document Document Title
8913721 Systems and methods for preventing sensitive information from being communicated into a non-secure environment  
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is operable for bidirectional communications...
8914647 Method and system for protecting data  
Methods and systems for protecting data may include controlling encryption and/or decryption and identifying a destination of corresponding encrypted and/or decrypted data, utilizing rules based on...
8914906 Method and apparatus for identifying installed software and regulating access to content  
A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is...
8914892 Method and system to enhance accuracy of a data leak prevention (DLP) system  
A Data Loss Prevention (DLP) system is enhanced according to this disclosure by augmenting the information obtained from OS API hooking with “context” information obtained from other sources, suc...
8914908 Completely automated computer implemented system and method for piracy control based on update requests  
An automated system and method for piracy control based on user generated updates is described. The system and method described renders human intervention for piracy control superfluous and,...
8908859 Cryptographic apparatus and memory system  
According to one embodiment, a cryptographic apparatus includes: cryptographic cores (“cores”), an assigning unit, a concatenating unit, and an output controlling unit. If a CTS flag thereof is on,...
8909941 Programmable integrated circuit and a method of enabling the detection of tampering with data provided to a programmable integrated circuit  
A method of enabling detection of tampering with data provided to a programmable integrated circuit is described. The method comprises modifying a portion of the data to establish randomness in the...
8909942 MRAM-based security for data storage systems  
A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be prevented without having to erase or modify...
8909943 Verifying identity  
Techniques for encrypting documents in a search index may include: receiving a document for inclusion in a search index of a search system, where the document has an associated access control list...
8910288 Network managed antivirus appliance  
Data can be scanned using a network managed appliance. The network managed appliance may integrate commercial hardware elements connected through a basic or simplified operating system environment...
8909940 Extensible pre-boot authentication  
In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and...
8908866 Method and apparatus to provide authentication and privacy with low complexity devices  
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8909944 Storage device  
A storage device started when connected to a computer so as to be able to communicate. The storage device includes: an interface for controlling communication with the computer, a data storage unit...
8904188 Trusted storage systems and methods  
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and...
8904170 System and method for enabling bulk retrieval of certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to...
8904546 Digital rights management method and digital rights management-enabled portable device  
A DRM method and DRM-enabled portable device for controlling playback of DRM content on the basis of content usage log is disclosed. A digital rights management method for a portable device of the...
8904194 Secure data parser method and system  
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into...
8904192 Method for protecting a programmable cryptography circuit, and circuit protected by said method  
A programmable cryptography circuit includes memory-based cells defining the logic function of each cell, integrating a differential network capable of carrying out calculations on pairs of binary...
8904537 Malware detection  
A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program...
8904193 Method for operating a security device  
A method for operating a security device includes a microcontroller, a protected memory area, in which at least one item of protection-worthy information is stored, and a unit, the microcontroller...
8903086 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection  
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from an activated sink. In response to the...
8904191 Multiple content protection systems in a file  
Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each...
8898756 System and method for password recovery  
A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password...
8898542 Executing partial tasks in a distributed storage and task network  
A method begins by a dispersed storage (DS) processing module receiving a partial task regarding an encoded data block grouping. The method continues with the DS processing module performing the...
8898467 Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection  
A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from an activated sink. In response to the...
8898465 System and method for fuse enablement of a secure client hosted virtualization in an information handling system  
A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the...
8894485 Electronic gaming system with ROM-based media validation  
Examples disclosed herein relate to systems and methods for validating the authenticity of one or more media associated with a gaming system. The systems and methods may utilize a public key in...
8898483 Born encrypted optical data  
A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has...
8898482 Encryption system using clients and untrusted servers  
In one embodiment of the present invention, a first user—the creator—uses a web browser to encrypt some information. The web browser provides to the creator a URL which contains the key used for...
8898805 Electronic identification  
A method may include forwarding, by a mobile device, a request for identification information associated with a user of the mobile device. The method may also include receiving, from an...
8892877 Method and device for accessing files of a secure file server  
A method and a device are provided for accessing data files of a secure file server, wherein a user or a process is authenticated; wherein access to the data files of the secure file server takes...
8892905 Method and apparatus for performing selective encryption/decryption in a data storage system  
One embodiment of the present invention provides a system for performing selective encryption/decryption in a data storage system. During operation, the system receives a data block from a storage...
8892906 Method and apparatus for improved information transactions  
Methods and systems for analyzing an image, such as a newspaper or magazine pager or the like including text by mapping the image to determine regions of text and analyzing portions of the image in...
8892907 Storage and recovery of cryptographic key identifiers  
Example embodiments provide various techniques for storing and recovering a cryptographic key identifier that may be used to recover encrypted data. The cryptographic key identifier may be stored...
8893285 Securing data using integrated host-based data loss agent with encryption detection  
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated...
8891302 Electronic equipment  
Electronic equipment according to the present disclosure includes a writable non-volatile memory, a plurality of volatile memories, and a sequencer. The writable non-volatile memory stores an...
8892866 Secure cloud storage and synchronization systems and methods  
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can...
8893263 Apparatus and method for securing data on a portable storage device  
A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device...
8891773 System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions  
Aspects of the disclosure pertain to a system and method for key wrapping via a storage system to allow secure access to media of the system by multiple authorities with modifiable permissions. The...
8892611 Assigning data for storage based on speed with which data may be retrieved  
A method, system, and apparatus for improving performance when retrieving data from one or more storage media. Files to be stored on the one or more storage media are classified into a ranking of...
8891764 Quarantine method for sellable virtual goods  
A method is disclosed for quarantining digital content data for a service in a terminal device. In an embodiment, the method includes creating a digital content data item, e.g. a digital still...
8886963 Secure relocation of encrypted files  
Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a tem...
8886962 Systems and methods for disk encryption with two keys  
Embodiments provide for using two encryption keys to encrypt data instead of only one as is customarily used in the industry. According to various embodiments, a default encryption key is generated...
8886964 Protecting remote asset against data exploits utilizing an embedded key generator  
Some embodiments include a method of using different keys from an embedded key generator for each update of a trusted storage to mitigate common user-based exploits (clone, restore, tamper) of the...
8887272 Medical device customization system  
A medical device customization system and method comprising medical device that receives signals from a biological probe having an operational parameter and that stores data based on the signals in...
8886711 File system adapted for use with a dispersed data storage network  
A computer a network interface and a central processing unit. The network interface communicates with a network. The central processing unit (CPU) is operable to receive a networked file system...
8880827 Method for executing security-relevant and non-security-relevant software components on a hardware platform  
A method for executing safety-relevant and non-safety-relevant software components on a hardware platform comprising a computer, memory and a monitoring component that operates independently of the...
8880898 Anti-roll-back mechanism for counter  
A method of maintaining a version counter indicative of a version of memory content stored in a processing device. The method comprises selectively operating the device in a first or second mode....
8880900 Memory system  
A memory system comprises: a memory device including an authentication data area storing authentication unit information and a verification value, and a contents data area storing contents; and a...