Match Document Document Title
9043595 Selective shredding in a deduplication system  
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a...
9043898 Access management system  
An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is...
9043869 Aggregating the knowledge base of computer systems to proactively protect a computer from malware  
Techniques for aggregating a knowledge base of a plurality of security services or other event collection systems to protect a computer from malware are provided. In embodiments, a computer is...
9043867 Information sharing  
Systems and methods for the sharing of information between organizations are disclosed. Policies that govern the permissions for the sharing of information are represented as Boolean functions...
9043862 Policy control for encapsulated data flows  
Systems and methodologies are described that facilitate communicating encapsulation information for a related mobility protocol type utilized in communicating over a data flow with reduced...
9043865 Prioritized token based arbiter and method  
An apparatus and method for employing a token based arbiter. The apparatus includes a priority provider (26) comprising a processor for calculating an arbiter metric and an identity provider (18)...
9043868 Network security appliance  
Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server...
9043935 Techniques for personalizing content  
Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the...
9043863 Policy enforcing browser  
A web browser that includes a network policy enforcement unit, a storage policy enforcement unit, and an ancillary policy enforcement unit is disclosed. The network policy enforcement unit...
9043861 Method and system for managing security policies  
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input indicating a high-level security...
9043864 Constraint definition for conditional policy attachments  
Framework for conditionally attaching web service policies to a policy subject (e.g., a web service client or service endpoint) at subject runtime. In one set of embodiments, a constraint...
9043866 Security systems and methods for encoding and decoding digital content  
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as...
9043342 Method and system for policy driven data distribution  
A method, system and computer-usable medium are disclosed for controlling the distribution of data. Data stored in a datastore is filtered according to a data release policy to generate filtered...
9038128 Applying security category labels to multi-tenant applications of a node in a platform-as-a-service environment  
A mechanism for applying security category labels to multi-tenant applications of a node in a PaaS environment is disclosed. A method of embodiments includes generating, by a virtual machine (VM),...
9038125 Self identifying services in distributed computing  
A service policy is modified for a service in a distributed computing environment having a service oriented architecture. A client is notified of the modified service policy without use of a...
9038162 Creating secure interactive connections with remote resources  
Implementations of the present invention efficiently establish secure connections between a client and server, at least in part by authenticating the client and server early on in the connection...
9038126 Device and method of controlling and switching terminals provided with specific communication systems among a plurality of standard communication system  
A method for controlling and switching terminals includes a writing step and a logoff step. In the writing step, when there is a connection request from a given terminal, a processor of a...
9038129 Enforcing policies in wireless communication using exchanged identities  
Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first...
9038127 Physical interaction with virtual objects for DRM  
Technology is provided for transferring a right to a digital content item based on one or more physical actions detected in data captured by a see-through, augmented reality display device system....
9038187 Insider threat correlation tool  
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a...
9038131 System and method of valuating resource in a computer network for compliance with requirements for a computer system  
Disclosed are systems and methods for valuating compliance of computer resources, including valuating compliance of a hardware or software resource of a computer system with requirements for the...
9037716 System and method to manage a policy related to a network-based service  
A method of managing a policy related to a network-based service can include receiving a policy request at a policy creation system from a service creation and development (SCD) system, the...
9038191 Method and apparatus for providing DRM service  
Methods and apparatus are provided for providing a DRM service by a user terminal apparatus consuming DRM content in a service environment that provides the DRM content using a plurality of...
9038151 Authentication for software defined networks  
In one example, a controller device for a software defined network (SDN) includes one or more network interfaces configured to communicate with network devices of the SDN, and one or more...
9038130 Sensor aware security policies with embedded controller hardened enforcement  
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The...
9032473 Migration of credentials and/or domains between trusted hardware subscription modules  
Systems, methods, and instrumentalities are disclosed that allow a user to initiate migration of a credential from one domain to another domain. A request to initiate a migration of credentials...
9032475 System and method for testing and configuring application control rules  
Disclosed are systems, methods and computer program products for configuring application control rules. The system creates a new application control rule that specifies restrictions or permission...
9032013 Unified policy over heterogenous device types  
A system and method are disclosed for enforcing a normalized set of policy-based behaviors across two or more disparate client devices. The policy definition can be a common description of...
9032544 System and method for controlling communication of private information over a network  
A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information...
9032546 Enforcing conditions of use associated with disparate data sets  
Techniques are described herein that are capable of enforcing conditions of use associated with disparate data sets. For example, content may be published. Conditions of use that are associated...
9032474 Policy application server for mobile data networks  
A policy application server and methods for use are described. The policy application server is a logical element of a policy-based control and charging system for a mobile data service network....
9032209 Optical network terminal management control interface-based passive optical network security enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
9026650 Handling of website messages  
Mechanisms for handling website messages (e.g., website certificate warnings and/or errors), while combating website users ignoring such messages (sometimes referred to as “click-through...
9027088 Systems and methods for protection of a SIP back-to-back user agent on modems  
Systems and methods are provided for authenticating Internet Protocol (IP) Multimedia Subsystem (IMS) applications in a User Equipment (UE). A method includes: receiving a first Session Initiation...
9027094 Associating data initially with devices and subsequently with accounts  
A technique for associating data with an account is described. During this technique, a user uploads data to a computer system from an electronic device one or more times without providing log-in...
9026793 Method for installing rights object for content in memory card  
A method of receiving, by a memory card, a rights object (RO) from a rights issuer (RI) via a terminal. The method includes: receiving from the terminal, a provisioning setup request message...
9027161 System, method, and computer-readable recording medium for supporting license acquirement  
A system including a computer and having a part that stores identification data and status data in association with the identification data, a part that receives a request to acquire a license...
9027077 Deploying policy configuration across multiple security devices through hierarchical configuration templates  
Deploying policy configuration across multiple security devices through hierarchical configuration templates is disclosed. In some embodiments, deploying policy configuration across multiple...
9027078 Systems and methods for enforcing data loss prevention policies on sandboxed applications  
A computer-implemented method for enforcing data loss prevention policies on sandboxed applications may include identifying an application process that is in a sandbox, wherein a broker process...
9027079 Method and system for dynamic security using authentication servers  
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from security databases and from Network...
9027076 Method and apparatus for context aware mobile security  
An approach is provided for causing a change in a security policy of a device based on contextual information. The approach involves determining context information associated with a device. The...
9027096 Method and device for enhancing security of user security model  
The disclosure discloses a method and system for enhancing the security of a user security model. In the solution of the disclosure, after a Simple Network Managing Protocol (SNMP) server acquires...
9027075 Enforcing security rules at runtime  
Various arrangements for implementing a security policy at runtime are presented. A plurality of calls in a syntax tree may be identified. Each call of the plurality of calls may be substituted...
9027140 Application malware filtering for advertising networks  
Application malware filtering for advertising networks is disclosed. For example, techniques for providing a system and process for detecting malicious ad content (e.g., or other undesirable ad...
9027112 Mobile device management  
Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of...
9026712 USB device control using endpoint type detection during enumeration  
Described herein are embodiments of USB device control using endpoint type detection during enumeration. An apparatus configured for USB device control using endpoint type detection during...
9021549 Method of generating security rule-set and system thereof  
There are provided a method of generation of a security rule-set and a system thereof. The method includes: obtaining a group of log records of communication events resulting from traffic related...
9021548 Method, apparatus and computer program to transition a user device security module to an unlocked lifecycle state and to a locked lifecycle state  
A method, computer program, apparatus and a secure module are described. By example, in the method there are steps of receiving a request from a first entity for a secure module to enter an unlock...
9021547 Fully integrated switching and routing in a security device  
This disclosure is directed toward an integrated switching and routing security device that provides zone-based security directly between layer two (L2) interfaces of L2 bridge domains and/or...
9021558 User authentication based on network context  
Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a...