Sign up


Match Document Document Title
8943332 Audit-log integrity using redactable signatures  
A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit...
8943550 File system access for one or more sandboxed applications  
Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed...
8943564 Virtual computer and service  
A virtual computer service includes receiving, at a network server computer over a network, an encrypted image and user credentials for a user of a computer, and storing the encrypted image and the...
8943329 Method and apparatus for sharing an integrity security module in a dual-environment computing device  
A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a...
8938786 System and method for using a declarative approach to enforce instance based security in a distributed environment  
A system and method for using a declarative approach to enforce instance based security in a distributed environment is presented. The invention described herein includes security logic in...
8938625 Systems and methods for securing cryptographic data using timestamps  
Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment includes securely storing at least...
8938624 Encryption key destruction for secure data erasure  
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key material retained in a memory of a...
8938778 System and method for controlling user access to encrypted data  
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a security policy for the user device,...
8938626 Single command functionality for providing data security and preventing data access within a decommissioned information handling system  
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components...
8933786 RFID tag device and method of recognizing the same  
Provided is a radio frequency identification (RFID) tag device. The RFID tag device includes memory which stores ID information and a second count value, and a certification unit which performs a...
8935541 Method and apparatus for encrypting and processing data in flash translation layer  
A method and apparatus for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, by managing data associated with a flash memory...
8935540 Electronic device  
An electronic device causing a removable storage medium to store data, the electronic device includes a removable storage medium, a storage medium interface connecting to the storage medium, and a...
8935771 System, method, and computer security device having virtual memory cells  
A computer security system may include a removable security device adapted to connect to the input/output port of a computer. The security device may include: a random access memory (RAM) cell; and...
8935775 Method and apparatus for dishonest hardware policies  
A system implements dishonest policies for managing unauthorized access requests. The system includes memory management hardware to store a set of dishonest policy bits, each dishonest policy bit...
8935648 At least one die produced, at least in part, from wafer, and including at least one replicated integrated circuit  
An embodiment may include at least one die produced, at least in part, from a wafer, and may include at least one integrated circuit and/or at least one other integrated circuit. These integrated...
8929540 Information processing apparatus, information recording medium manufacturing apparatus, information recording medium, method, and computer program  
To provide a configuration in which a unit classification number corresponding to a content playback path is set based on various units. A unit classification number defining a playback path of...
8930716 Address translation unit, device and method for remote direct memory access of a memory  
A method for Remote Direct Memory Access (RDMA) of a memory of a processor. An address translation unit comprises an address translator and a signer. The address translator is configured to...
8930714 Encrypted memory  
A memory device is operable to perform channel encryption wherein for communication between devices, each includes cryptographic logic and performs cryptographic operations. In an illustrative...
8930687 Secure distributed deduplication in encrypted data storage  
In an encrypted storage system employing data deduplication, encrypted data units are stored with the respective keyed data digests. A secure equivalence process is performed to determine whether...
8930718 Apparatus for and a method of providing content data  
Apparatus and a method are described to enable reading apparatus to access content data of an optical disc such as a DVD where the content data carried by the DVD is encrypted by an encryption...
8930715 Address translation unit, device and method for remote direct memory access of a memory  
An address translation unit for Remote Direct Memory Access (RDMA) of a memory of a processor is provided. The address translation unit comprises an address translator and a signer. The address...
8930638 Method and apparatus for supporting target-side security in a cache coherent system  
A cache coherency controller, a system comprising such, and a method of its operation are disclosed. The coherency controller ensures that target-side security checking rules are not violated by...
8930693 Cluster federation and trust  
An improved scalable object storage system allows multiple clusters to work together. In one embodiment, a trust and federation relationship is established between a first cluster and a second...
8930719 Data protection method and device  
An apparatus and method for encoding and decoding additional information into a digital information in an integral manner. More particularly, the invention relates to a method and device for data...
8930720 Authentication method  
According to one embodiment, an authentication method includes generating a second key by a first key, the first key being stored in a memory and being prohibited from being read from outside;...
8924743 Securing data caches through encryption  
Encryption techniques for securing data in a data cache are generally disclosed. Example methods may include one or more of reading the cache to identify data, determining whether the data is...
8925098 Data security and access tracking in memory  
A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the non-volatile memory array on the...
8924742 Multi-level data storage  
Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be determined. Subsequently, distinct types of...
8918880 Plant security managing device, managing method and managing program  
A technology is provided which ensures a high security without affecting a plant operation. A plant security managing device includes a determining unit that determines which one of control units...
8918897 Dispersed storage network data slice integrity verification  
A method begins with a processing module issuing a retrieval request, receiving secret shares of a set of secret shares to produce received secret shares, and receiving encoded data slices of a set...
8918651 Cryptographic erasure of selected encrypted data  
Exemplary method, system, and computer program product embodiments for cryptographic erasure of selected encrypted data are provided. In one embodiment, by way of example only, data files are...
8918868 Compartmentalization of the user network interface to a device  
A device has physical network interface port through which a user can monitor and configure the device. A backend process and a virtual machine (VM) execute on a host operating system (OS). A front...
8918655 Data whitening for writing and reading data to and from a non-volatile memory  
Systems, apparatuses, and methods are provided for whitening and managing data for storage in non-volatile memories, such as Flash memory. In some embodiments, an electronic device such as media...
8918654 Information processing device, program verification method, and recording medium  
A first storage unit stores a plurality of security functions each defining a first protection attribute requiring a storage of a value of an argument for input/output of data. A second storage...
8913721 Systems and methods for preventing sensitive information from being communicated into a non-secure environment  
A telecommunication system is arranged between a trusted automated interactive system and a non-secure agent. The trusted automated interactive portion is operable for bidirectional communications...
8914647 Method and system for protecting data  
Methods and systems for protecting data may include controlling encryption and/or decryption and identifying a destination of corresponding encrypted and/or decrypted data, utilizing rules based on...
8914906 Method and apparatus for identifying installed software and regulating access to content  
A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is...
8914892 Method and system to enhance accuracy of a data leak prevention (DLP) system  
A Data Loss Prevention (DLP) system is enhanced according to this disclosure by augmenting the information obtained from OS API hooking with “context” information obtained from other sources, suc...
8914908 Completely automated computer implemented system and method for piracy control based on update requests  
An automated system and method for piracy control based on user generated updates is described. The system and method described renders human intervention for piracy control superfluous and,...
8908859 Cryptographic apparatus and memory system  
According to one embodiment, a cryptographic apparatus includes: cryptographic cores (“cores”), an assigning unit, a concatenating unit, and an output controlling unit. If a CTS flag thereof is on,...
8909941 Programmable integrated circuit and a method of enabling the detection of tampering with data provided to a programmable integrated circuit  
A method of enabling detection of tampering with data provided to a programmable integrated circuit is described. The method comprises modifying a portion of the data to establish randomness in the...
8909942 MRAM-based security for data storage systems  
A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be prevented without having to erase or modify...
8909943 Verifying identity  
Techniques for encrypting documents in a search index may include: receiving a document for inclusion in a search index of a search system, where the document has an associated access control list...
8910288 Network managed antivirus appliance  
Data can be scanned using a network managed appliance. The network managed appliance may integrate commercial hardware elements connected through a basic or simplified operating system environment...
8909940 Extensible pre-boot authentication  
In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and...
8908866 Method and apparatus to provide authentication and privacy with low complexity devices  
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8909944 Storage device  
A storage device started when connected to a computer so as to be able to communicate. The storage device includes: an interface for controlling communication with the computer, a data storage unit...
8904188 Trusted storage systems and methods  
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and...
8904170 System and method for enabling bulk retrieval of certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to...