Match Document Document Title
9043901 Intent-based clustering of medical information  
A medical information navigation engine (“MINE”) includes a medical information interface, a reconciliation engine and an intent-based presentation engine. The medical information interface...
9043902 Apparatus for controlling processor execution in a secure environment  
Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a...
9043898 Access management system  
An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is...
9043867 Information sharing  
Systems and methods for the sharing of information between organizations are disclosed. Policies that govern the permissions for the sharing of information are represented as Boolean functions...
9043747 Systems and methods for dynamic development and deployment of computing applications using blueprints  
Systems and methods for dynamic development and deployment of computing applications including a development framework, a visual design subsystem, and a deployment subsystem, where at runtime the...
9041812 Automated authorization to access surveillance video based on pre-specified events  
Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a...
9043891 Preserving privacy with digital identities  
A privacy-preserving identity system is described herein that combines low disclosure tokens with an identity metasystem to allow proof of a user's identity and other claims about the user in a...
9043863 Policy enforcing browser  
A web browser that includes a network policy enforcement unit, a storage policy enforcement unit, and an ancillary policy enforcement unit is disclosed. The network policy enforcement unit...
9043400 Instantaneous recommendation of social interactions in a social networking system  
As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is...
9038169 Method and system for managing and controlling direct access of an administrator to a computer system  
A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the...
9038144 Mobility protocol selection by an authorization system  
A wireless network authorization system receives an authorization request for a wireless communication device transmitted from a visited wireless network. A processing system selects one of a...
9038168 Controlling resource access based on resource properties  
Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from...
9037874 Semiconductor device with copyright protection function  
A semiconductor device includes a serial communication interface connector, a non-volatile semiconductor memory, a memory controller, and a memory reader/writer. The serial communication interface...
9038139 Multiple image reverse turing test  
In a Reverse Turing Test an applicant seeking access to a computer process is presented with an image containing human-readable data that is intended to be inaccessible to an automated process or...
9032546 Enforcing conditions of use associated with disparate data sets  
Techniques are described herein that are capable of enforcing conditions of use associated with disparate data sets. For example, content may be published. Conditions of use that are associated...
9032513 Systems and methods for event stream platforms which enable applications  
Systems and methods to generate a final event stream are provided. The system collects information from a wide variety of sources, and then parses, normalizes, and indexes the information. This...
9027084 Methods and apparatuses for securely operating shared host devices with portable apparatuses  
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable apparatus includes a data storage...
9027136 Automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP...
9027086 Securing organizational computing assets over a network using virtual domains  
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the...
9027119 Authentication frequency and challenge type based on application usage  
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g.,...
9027117 Multiple-access-level lock screen  
A multiple-access-level lock screen system allows different levels of functionality to be accessed on a computing device. For example, when a device is in a locked state, a user can select (e.g.,...
9025765 Data security  
A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content...
9027131 Refinement-based security analysis  
A method, computer program product, and computer system for assigning, by a computing device, a value to a first data-flow of a first summary associated with a control flow graph and assigning the...
9021581 Methods, systems, and computer program products for updating user permissions associated with object locations when an object changes locations in a virtualization environment  
A method of managing a virtualization system includes detecting a change in location of an object within a virtualization environment, determining user permission rights for a current location of...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9009777 Automatic role activation  
A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set...
9009705 Authenticated distribution of virtual machine images  
A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request...
9009814 Systems and methods for generating secure passwords  
A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a...
9009832 Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors  
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (ADs), which are coupled between HTTP clients and web application servers. The...
9009785 System and method for implementing adaptive security zones  
A system for managing adaptive security zones in complex business operations, comprising a rules engine adapted to receive events from a plurality of event sources and a security manager coupled...
9009299 Method and apparatus for identifying members of a peer-to-peer botnet  
A peer-to-peer (P2P) bot(s) in a network is identified using an already identified P2P bot. More specifically, such embodiments may facilitate determining a candidate set of computers, which may...
9009486 Biometric authentication apparatus, biometric authentication method, and computer readable storage medium  
An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by...
9009840 Validating machine images  
In a resource-on-demand environment, virtual machine images are validated before use. A provider or source of a virtual machine image may generate a manifest, indicating executable components of...
9009454 Secure operating system loader  
In one embodiment a computing device comprises a processor, a memory module coupled to the process and comprising logic instructions stored in a computer readable medium which, when executed,...
9003491 Secure push and status communication between client and server  
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client...
9003556 Techniques for in-app user data authorization  
Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be...
9003475 Systems and methods for applying data-loss-prevention policies  
A computer-implemented method for applying data-loss-prevention policies. The method may include (1) maintaining a list of applications whose access to sensitive data is controlled by...
9002966 Methods and systems for selecting and implementing digital personas across applications and services  
A persona determination approach can be utilized to apply digital personas across multiple communications domains. A service gateway can determine whether to transfer a request for communications...
8994982 Image forming device, image forming method, and image forming program  
The image forming device includes an image data input unit that receives image data of a document; a set password acquisition unit that acquires information regarding a password from the image...
8997190 Using metadata in security tokens to prevent coordinated gaming in a reputation system  
To prevent gaming of a reputation system, a security token is generated for a security module using metadata about the client observed during the registration of the security module. The...
8996860 Tolerance factor-based secret decay  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
8994979 Print relay system, image forming apparatus, system control method, and program  
A print relay system determines whether a printing function (capability) of an image forming apparatus corresponding to user authority setting has been registered in a printing service. Having...
8997184 Systems and methods for providing a one-time authorization  
Systems and methods for presenting a request are disclosed. The systems and methods may include one or more steps, such as receiving, by an electronic device, request information from an entity....
8997232 Iterative automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (AD), which are coupled between HTTP clients and web application servers. The...
8997216 Recording medium apparatus and control method for authenticating a device based on a revocation list  
A storage unit 601g of a recording medium device 600g stores a content and a revocation list. The revocation list includes a revocation identifier that is associated with the content and...
8990560 Multiple independent levels of security (MILS) host to multilevel secure (MLS) offload communications unit  
Systems and methods for use in secure network communication. A physical network interface receives a network packet associated with a security level. The network packet is transmitted from the...
8990890 Enabling presence information access and authorization for home network telephony  
In a first embodiment of the present invention, a method for operating a presence server in a home network is provided, the method comprising: receiving a request for presence information; sending...
8990884 Quantifying risk based on relationships and applying protections based on business rules  
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request...
8990319 System and method for coordinating communication events using computer-assisted structured interaction  
A computer-implemented method for negotiating a time and a medium for communications between users is described. The method is performed at a server including one or more processors and memory...
8990585 Time based dispersed storage access  
A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues...