Match
|
Document |
Document Title |
|
US20120002234 |
Approach For Securely Printing Electronic Documents
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct... |
|
US20130042108 |
PRIVATE ACCESS TO HASH TABLES
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has... |
|
US20140013104 |
SYSTEMS AND METHODS FOR SECURELY SUBMITTING COMMENTS AMONG USERS VIA EXTERNAL MESSAGING APPLICATIONS IN A CLOUD-BASED PLATFORM
Systems and methods are disclosed for facilitating secure commenting on content items among collaborators via external messaging applications in a collaborative cloud-based environment. In one... |
|
US20150149762 |
Method and Apparatus for Unified Encrypted Messaging
A unified encrypted messaging system transmits messages from a first computer to a second computer by dividing the encrypted message into a plurality of encrypted message fragments. A first... |
|
US20130173908 |
Hash Table Organization
Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key... |
|
US20120317409 |
Mobile Printing
A method of printing comprising, at an imaging device, receiving a print-by-reference print request and an encryption key from a mobile device, transmitting the print-by-reference print request... |
|
US20120254606 |
Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models
A most likely sequence of states corresponding to an observation sequence stored at a client is determined securely with respect to a HMM stored at a server. An encryption of a log-probability of... |
|
US20110154010 |
SECURITY TO EXTEND TRUST
An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash... |
|
US20140019744 |
Right of Individual Privacy and Public Safety Protection Via Double Encrypted Lock Box
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or... |
|
US20110320803 |
Light-weight security solution for host-based mobility & multihoming protocols
A transport connection system is set forth. The system includes a first device adapted to send and receive messages. A second device, adapted to send and receive message, is also provided. A... |
|
US20150001298 |
Systems and Methods for RFID Security
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption... |
|
US20110119482 |
Method and system for establishing a communications pipe between a personal security device and a remote computer system
A method and a system is provided for establishing a communications path over a communications network between a personal security device (PSD) and a remote computer system without requiring the... |
|
US20140201516 |
AUTOMATED CONTROL PLANE FOR LIMITED USER DESTRUCTION
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network devices without user input. This... |
|
US20120144185 |
COUNTING DELEGATION USING HIDDEN VECTOR ENCRYPTION
Counting values can be encrypted as a set of counting value cyphertexts according to a hidden vector encryption scheme using sample values of a set of samples, where each of the samples can... |
|
US20140019748 |
LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or... |
|
US20110271108 |
METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS
Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the... |
|
US20130254530 |
SYSTEM AND METHOD FOR IDENTIFYING SECURITY BREACH ATTEMPT OF A WEBSITE
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity... |
|
US20100325417 |
RENDERING RIGHTS DELEGATION SYSTEM AND METHOD
Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a... |
|
US20150235011 |
DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server,... |
|
US20110087885 |
METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the... |
|
US20140122874 |
Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System
Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include... |
|
US20110087876 |
Dynamic Analytical Differentiator For Obfuscated Functions In Complex Models
Systems and methods are provided for providing secure transmission of software code, which includes a mathematical function, from a first computer to a second computer so that the mathematical... |
|
US20100313007 |
SYSTEM AND METHOD FOR THE GENERATION OF A CONTENT FINGERPRINT FOR CONTENT IDENTIFICATION
A system and method for the generation of a content fingerprint for content identification are described. Various embodiments include encoding content without any available identifying... |
|
US20130080763 |
PERSONAL MESSAGING SECURITY
A method may include creating, by a user device, an electronic message, the electronic message comprising destination information corresponding to an intended recipient of the electronic message.... |
|
US20110137803 |
SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS
The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital... |
|
US20150156177 |
METHOD AND SYSTEM FOR AUTOMATIC GENERATION OF CONTEXT-AWARE COVER MESSAGE
One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system receives, at the receiving device, a benign... |
|
US20100299515 |
TRACING COPIES OF AN IMPLEMENTATION
A system (600) for facilitating tracing copies (634) of an implementation of a computational method (602). A network generator (604) for generating a network of look-up tables representing steps... |
|
US20120254607 |
System And Method For Security Levels With Cluster Communications
A cluster of computing nodes communicate through an unsecure network by selectively sending information in encrypted and unencrypted formats. Heartbeat packets are sent between the computing nodes... |
|
US20110167254 |
SYSTEM AND METHOD FOR ENSURING CONFORMANCE OF ONLINE MEDIA DISTRIBUTION TO COPYRIGHT RULES
A system and a method are described for presenting media content for users to view over the internet. Rights pertaining to said media to be viewed are uploaded to servers by users holding such... |
|
US20130080765 |
SECURE CLOUD STORAGE AND SYNCHRONIZATION SYSTEMS AND METHODS
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can... |
|
US20120023324 |
INSIDER THREAT CORRELATION TOOL
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a... |
|
US20110047081 |
SECURE REPORTS FOR ELECTRONIC PAYMENT SYSTEMS
A system, device, and method for generating and transmitting secure reports or documents in a retail environment or payment system comprising both secure and unsecure portions, where users of the... |
|
US20110296166 |
COMPUTER-BASED, AUTOMATED WORKFLOW SYSTEM FOR SENDING SECURE REPORTS
Computer-based systems and method for automating the workflow for generating and sending e-mails with attached reports to external recipients in order to reduce security breaches in certain... |
|
US20120151204 |
Efficient Routing for Reverse Proxies and Content-based Routers
Efficient routing for a client-server session or connection is provided in an application layer of multi-layered systems interconnect stack by caching a plurality of application-specific... |
|
US20140075183 |
SECURE AND SCALABLE MAPPING OF HUMAN SEQUENCING READS ON HYBRID CLOUDS
System and methods are provided for performing privacy-preserving, high-performance, and scalable DNA read mapping on hybrid clouds including a public cloud and a private cloud. The systems and... |
|
US20110191244 |
Secured Transaction System
The present invention relates to a secured transaction system. In one embodiment, a mobile transaction processing agent system includes a communication module configured to receive a secured... |
|
US20100325414 |
Method and transmitting device for securely creating and sending an electronic message and method and receiving device for securely receiving and processing an electronic message
The subject matter relates to a method for securely creating and sending an electronic message, whereby the message is created using a first application running in a secure operating system, the... |
|
US20110093695 |
SECURE OFFLINE RELOCATION OF PORTABLE SOFTWARE LICENSES
A method for the secure offline relocation of portable software licenses. The portable software license has an associated time limit. A license relocation record can be generated including the... |
|
US20120173867 |
METHOD OF AUTHENTICATION AT TIME OF UPDATE OF SOFTWARE EMBEDDED IN INFORMATION TERMINAL, SYSTEM FOR SAME AND PROGRAM FOR SAME
A load on a server or a network is suppressed at a minimum, the authentication server is not necessary, and download of falsified software is prevented. A server creates a time-limited... |
|
US20130332723 |
SYSTEMS AND METHODS FOR SECURE FILE PORTABILITY BETWEEN MOBILE APPLICATIONS ON A MOBILE DEVICE
Systems and methods for secure file portability between mobile applications in a cloud-based environment or cloud-based collaboration and file sharing environment. In one embodiment, a... |
|
US20090216552 |
SYSTEMS AND PROCESSES FOR MAINTAINING ROOFS
The process for maintaining a roof includes receiving a maintenance request and establishing an account in the database associated with the maintenance request. Next, a contractor is notified of... |
|
US20130159694 |
DOCUMENT PROCESSING METHOD AND SYSTEM
A document processing method and system are provided. A client divides at least one document into a plurality of document pages, and individually encrypts the document pages by a first key to... |
|
US20130290698 |
System and Method for Efficient Support for Short Cryptoperiods in Template Mode
System and method embodiments are provided herein for efficient representation and use of initialization vectors (IVs) for encrypted segments using template mode representation in Dynamic Adaptive... |
|
US20110087878 |
ENABLING QoS FOR MACsec PROTECTED FRAMES
Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network... |
|
US20120210121 |
SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction... |
|
US20110099363 |
SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction... |
|
US20150215291 |
SECURE DECENTRALIZED CONTENT MANAGEMENT PLATFORM AND TRANSPARENT GATEWAY
An apparatus and method for private, peer-to-peer, and end-to-end content delivery, management, and access is disclosed. Content examples may include encrypted email, Instant Messaging (IM), and... |
|
US20150195713 |
Secure and Automatic Connection to Wireless Network
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for... |
|
US20130262850 |
SECURE AND AUTOMATIC CONNECTION TO WIRELESS NETWORK
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for... |
|
US20110302406 |
METHOD AND SYSTEM FOR RECOVERING A SECURITY CREDENTIAL
A system and method for recovering a security credential is provided. A security credential stored in the storage of a computing device is encrypted using a first encryption key generated by a... |