Sign up


Match Document Document Title
8972723 Storage device and method for providing a partially-encrypted content file to a host device  
A storage device and method for providing a partially-encrypted content file to a host device are provided. In one embodiment, the storage device retrieves a content file from memory in the storage...
8972720 Information processing device and information processing method, and program  
An information processing system including a medium where a content to be played is stored; and a playing apparatus for playing contents stored in the medium; with the playing apparatus being...
8972750 Method and apparatus for securing transfer of secure content to a destination  
A computer implemented method and apparatus for securing transfer of secure content to a destination. The method comprises receiving a request to copy selected content from a secure source...
8972744 Preventing data imprinting in memory  
A method and system of preventing data imprinting. The data includes a payload and a token that may be stored in a memory. The token provides information about the payload format and determines how...
8972743 Computer security system and method  
A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to...
8971525 Method, module and system for providing cipher data  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
8972747 Managing information in a document serialization  
In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of...
8964978 Method and apparatus for efficiently fixing transformed part of content  
Provided are a method and apparatus for effectively fixing scrambled content. The method includes checking fixing information for a program map table (PMT) packet of packets constituting the...
8966646 Software license management  
A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the...
8966284 Hardware driver integrity check of memory card controller firmware  
A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of...
8966243 Method and system for data encryption and decryption in data transmission through the web  
This invention provides a method and system for data encryption and decryption in data transmission through the web. The method includes: a browser sends a cryptographic information acquisition...
8966286 Method, system and integrated circuit for enabling access to a memory element  
A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic...
8966288 System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services  
In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored...
8964976 Secure storage and retrieval of confidential information  
A secure information storage management system may securely manage the storage of confidential information. A randomizer module may randomly generate a schema that specifies a random number of...
8966283 Systems and methods for live migration of a data store to encrypted form  
This document describes methods and systems by which a data storage service migrates a volume of stored data from an unencrypted format to an encrypted format while still permitting user access to...
8966638 System, method, and computer program product for selecting a wireless network based on security information  
A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security...
8966287 Systems and methods for secure third-party data storage  
A computer-implemented method for secure third-party data storage may include 1) identifying, at a server-side computing device, a request from a client system to access an encrypted file stored...
8966285 Securing implementation of a cryptographic process having fixed or dynamic keys  
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against attack by protecting the round keys by (1) combining several...
8959641 Foiling a document exploit attack  
A method of foiling a document exploit type attack on a computer, where the attack attempts to extract malware code from within a document stored on the computer. The method includes monitoring the...
8959331 Systems for provisioning universal integrated circuit cards  
A system that incorporates the subject disclosure may include, for example, a system for receiving a request to modify a universal integrated circuit card, generating a package comprising...
8959606 Key updating method and system thereof  
A key updating method and system are provided. In the method, (1) a back-end authentication system receives a current dynamic password generated by a dynamic token and authenticates the current...
8959615 Storage system in which fictitious information is prevented  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
8959640 Controlling anti-virus software updates  
The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting...
8959363 Systems, methods, and apparatus to virtualize TPM accesses  
Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a software program, a manageability engine...
8958554 Unicode-compatible stream cipher  
A process and system for enciphering and deciphering Unicode characters that is compatible with scripting languages such as JAVASCRIPT®, JSCRIPT® and VBSCRIPT®. The process and system can en...
8959365 Methods of providing fast search, analysis, and data retrieval of encrypted data without decryption  
Methods and systems of providing remote coded data storage, data analysis, and search and retrieval, with assurance of data security are described. Data security is such that it protects the data...
8954755 Memory address translation-based data encryption with integrated encryption engine  
A method and circuit arrangement utilize an integrated encryption engine within a processing core of a multi-core processor to perform encryption operations, i.e., encryption and decryption of...
8955134 Malicious code infection cause-and-effect analysis  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
8954760 Authentication of solution topology  
A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution...
8954758 Password-less security and protection of online digital assets  
Digital assets stored on an asset server by an asset owner are protected without a password. Instead, the digital assets are functionally handicapped by removing at least a portion of digital data...
8954759 Secure spin torque transfer magnetic random access memory (STTMRAM)  
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the...
8955085 Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device  
In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if...
8954757 Method, host, storage, and machine-readable storage medium for protecting content  
Methods and apparatus are provided for protecting content of a storage. First authentication information regarding a first module is acquired. The first module is one of a plurality of modules...
8954756 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8955158 Method and apparatus for transmitting rights object information between device and portable storage  
A method and apparatus for transmitting rights object information between a device and a portable storage are provided. The method includes transmitting a predetermined request from the device to...
8955135 Malicious code infection cause-and-effect analysis  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
8954753 Encrypting data in volatile memory  
Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. An unencrypted memory allocation function requests...
8955125 Snoop echo response extractor  
A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be...
8955086 Offline authentication  
A computer system determines whether the computer system is able to access an authentication server. If the computer system is able to access the authentication server, the computer system...
8950005 Method and system for protecting content of sensitive web applications  
A web page running on a client computing device accesses a web application hosted by a remote server. The local application receives data from the web application. The client computing device uses...
8949624 Method and system for secure access to non-volatile memory  
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical...
8949964 Security key entry using ancillary input device  
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user...
8949625 Systems for structured encryption using embedded information in data strings  
A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving...
8948375 Systems for embedding information in data strings  
A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving...
8949622 Secure removable drive system  
A data storage system comprises a removable drive with memory for storing data, and an identifier for identifying the removable data cartridge. A host computer can be coupled in data communication...
8949623 Security processor and methods for registering access entitlements and cryptographic keys  
This security method for scrambled multimedia signal decoder comprises at least one rewritable lock (62, 64), the value of which can be toggled at least between a first and a second value in...
8949626 Protection of security parameters in storage devices  
Security parameters used to encrypt data stored on a storage device may be protected using embodiments of systems and methods described herein. During a resize operation, data stored on a memory...
8949933 Centralized management of technical records across an enterprise  
A method, system and computer-readable medium for managing technical records across an enterprise are presented. The method includes controlling access to a technical records repository through a...
8943332 Audit-log integrity using redactable signatures  
A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit...
8943550 File system access for one or more sandboxed applications  
Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed...