Sign up


Match Document Document Title
8839391 Single token authentication  
A method that includes storing multiple, separate data sets where each data set is related to an access code that is based on a combination of data related to the user and data related to a service...
8839353 Attack protection for trusted platform modules  
A trusted platform module stores information in a protected object having an associated policy. A program requesting access to the information is allowed to access the information if the policy is...
8839439 Operation of a dual instruction pipe virus co-processor  
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A content...
8839004 Secure cloud computing infrastructure  
In one embodiment, a system for secure application hosting is provided. The system includes a memory, a first processor coupled to the memory, a second processor coupled to the first processor via...
8839003 Information management system, information management method and apparatus, and encryption method and program  
An information management system provided with an encrypting means for encrypting an original file to prepare an encrypted file, a data storage memory which stores the encrypted file, a decrypting...
8839002 Optical media recording device for protecting device keys and related method  
To protect device keys, an optical media recording device capable of performing AACS encryption on data does not have any device keys, and the optical media recording device performs AACS...
8838985 Method and apparatus for authenticating static transceiver data and method of operating an AIS transceiver  
A method and apparatus which ensures that static data entered into a communications device or apparatus is accurate, or at least consistent with data provided to an authentication service. In some...
8837734 Managing encrypted data and encryption keys  
A data module encrypts a first portion of a drive in a data center using a first encryption key. The data module encrypts the first encryption key using a second encryption key to obtain an...
8839359 Data processing device and data processing method  
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and...
8837717 Non-retained message system  
A system and method for non-retained electronic messaging is described. In one embodiment, the system includes a message receiver module, a message storing and identifier generation module, a...
8839354 Mobile enterprise server and client device interaction  
A system includes an application server that hosts a plurality of enterprise applications and stores enterprise data associated with each of the enterprise applications. A client device executes a...
8838998 Circuit personalization  
A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and...
8839451 Activation and security of software  
Methods, systems, and apparatus, including computer program products, for retaining the function of product activation schemes and other persistent state changes based on hardware identifiers, even...
8839450 Secure vault service for software components within an execution environment  
Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes...
8838996 Non-transitory computer readable medium, program protection apparatus, and program protection method  
Provided is a non-transitory computer readable medium causing a computer to function as a designation receiving unit that receives designation of a protection target section, a movement arranging...
8832828 Dynamic scanning based on compliance metadata  
In embodiments of the present invention improved capabilities are described for systems, methods, and devices that assess a metadata factor associated with metadata of code to determine a...
8832467 Digital rights management metafile, management protocol and applications thereof  
Methods, systems and computer program products to create and manage encapsulated Digital Rights Management (DRM) metafiles, also referred to as objects, are provided herein. Each object comprises a...
8832458 Data transcription in a data storage device  
A method of protecting information in a data storage device is provided. The method includes receiving, in the data storage device, encrypted data via a host computer in which the data storage...
8832457 Methods and apparatus for authenticating components of processing systems  
When a processing system boots, it may retrieve an encrypted version of a cryptographic key from nonvolatile memory to a processing unit, which may decrypt the cryptographic key. The processing...
8832795 Using a communications network to verify a user searching data  
Systems and methods of searching a plurality of data items which include selected data items with respective access tags defining access criteria for those data items. A search request token...
8832466 Methods for augmentation and interpretation of data objects  
Efficient methods for implementing security and manageability for stored data objects involve logical object reorganization, computation and injection of metadata, and specialized data access...
8831220 Processing module operating methods, processing modules, and communications systems  
A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve...
8832452 System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves  
An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one...
8832460 Inter-bus communication interface device and data security device  
There is provided an inter-bus communication interface device capable of efficiently performing transfer of data between a plurality of devices connected to different buses, respectively. When...
8826405 Trusting an unverified code image in a computing device  
A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to...
8826448 System, method and apparatus for electronically protecting data and digital content  
A system, method and apparatus for protecting sensitive data in a file that has been replaced with pointer(s) for each sensitive data. The sensitive data items are protected by restricting...
8826043 Removable, active, personal storage device, system and method  
A storage device is configured to communicate with a host device over a Bluetooth connection. The storage device includes a flash memory, a processor, and a Bluetooth controller. The memory stores...
8826035 Cumulative integrity check value (ICV) processor based memory content protection  
In general, in one aspect, the disclosure describes a process that includes a cryptographic engine and first and second registers. The cryptographic engine is to encrypt data to be written to...
8826449 Data security in a disconnected environment  
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and methods regulate access to sensitive...
8826409 Secure digital download storage device  
A secure USB flash drive employing digital rights management to implement secure digital media storage such as that provided by encrypted storage utilizing content protection for recordable media...
8826378 Techniques for authenticated posture reporting and associated enforcement of network access  
Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform...
8826435 Apparatus and methods for protecting removable storage devices from malware infection  
One embodiment relates to a computer-implemented method for protecting a removable storage device from malware on a computer apparatus. An indication is received that the removable storage device...
8826041 In-band detection mechanism for detecting intermediate layer in a storage I/O driver stack  
A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and...
8826407 System and method for access control and identity management  
A mechanism for the flow of access by derivation is provided. An access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access...
8826040 Product security system  
The present invention relates to a product information system and a corresponding method in a product information system with products 2, to which there are applied machine-readable items of...
8826039 Apparatus and method for providing hardware security  
A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of unauthorized accesses from external...
8826042 Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device  
A technique allowing an improvement in the confidentiality of information stored in a memory device. A memory controller includes a key generation part that newly generates key information for use...
8826019 Centralized authentication system with safe private data storage and method  
A token-based centralized authentication method for providing access to a service provider to user information associated with a user's relationship with the service provider includes the steps of:...
8826021 System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data  
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored information, which is accomplished by imposing...
8819451 Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks  
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that...
8819846 Making system constraints of a specified permission in digital rights management  
A method and a terminal device for making multi-system constraint of a specified permission in a digital rights. A rights object related to content object is obtained by an executing device. The...
8819455 Parallelized counter tree walk for low overhead memory replay protection  
A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks...
8819446 Support for secure objects in a computer system  
A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected from other software on the computer...
8819452 Efficient storage of encrypted data in a dispersed storage network  
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the...
8819453 Protection of user-generated information in the cloud  
Data is protected from unauthorized access with a combination of technological and legal means. A technological measure is used to control access to a user created data package including a work of...
8819456 Content receiving terminal, content exporting and reproducing method, and recording medium  
A content exporting and reproducing method includes i) a content export step of encrypting a decryption key for content, that is used for decrypting the encrypted content, by using an encryption...
8819450 System and method for providing data integrity  
Systems and methods for providing data integrity for stored data are disclosed. A method may include, in connection with the receipt of a read command at a storage resource, reading a data block...
8817988 Variable epoch scheduler for proactive cryptography systems  
An improved technique involves protecting a set of resources in a distributed computer system by scheduling epochs for replacing keys that have a variable duration. Along these lines, a Variable...
8819458 Information processing apparatus, program execution method, and computer program  
An information processing apparatus includes: a program executing unit which interprets and executes codes of a computer program created in a procedural language in an environment with a tamper...
8819457 Systems and methods for content playback and recording  
A method for content playback and recording may include using a computer to obtain media content from a recorded medium. Concurrently with obtaining the media content, the method may include...