Match Document Document Title
US20120002234 Approach For Securely Printing Electronic Documents  
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct...
US20130042108 PRIVATE ACCESS TO HASH TABLES  
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has...
US20140013104 SYSTEMS AND METHODS FOR SECURELY SUBMITTING COMMENTS AMONG USERS VIA EXTERNAL MESSAGING APPLICATIONS IN A CLOUD-BASED PLATFORM  
Systems and methods are disclosed for facilitating secure commenting on content items among collaborators via external messaging applications in a collaborative cloud-based environment. In one...
US20150149762 Method and Apparatus for Unified Encrypted Messaging  
A unified encrypted messaging system transmits messages from a first computer to a second computer by dividing the encrypted message into a plurality of encrypted message fragments. A first...
US20130173908 Hash Table Organization  
Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key...
US20120317409 Mobile Printing  
A method of printing comprising, at an imaging device, receiving a print-by-reference print request and an encryption key from a mobile device, transmitting the print-by-reference print request...
US20120254606 Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models  
A most likely sequence of states corresponding to an observation sequence stored at a client is determined securely with respect to a HMM stored at a server. An encryption of a log-probability of...
US20110154010 SECURITY TO EXTEND TRUST  
An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash...
US20140019744 Right of Individual Privacy and Public Safety Protection Via Double Encrypted Lock Box  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20110320803 Light-weight security solution for host-based mobility & multihoming protocols  
A transport connection system is set forth. The system includes a first device adapted to send and receive messages. A second device, adapted to send and receive message, is also provided. A...
US20150001298 Systems and Methods for RFID Security  
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption...
US20110119482 Method and system for establishing a communications pipe between a personal security device and a remote computer system  
A method and a system is provided for establishing a communications path over a communications network between a personal security device (PSD) and a remote computer system without requiring the...
US20140201516 AUTOMATED CONTROL PLANE FOR LIMITED USER DESTRUCTION  
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network devices without user input. This...
US20120144185 COUNTING DELEGATION USING HIDDEN VECTOR ENCRYPTION  
Counting values can be encrypted as a set of counting value cyphertexts according to a hidden vector encryption scheme using sample values of a set of samples, where each of the samples can...
US20140019748 LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20110271108 METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS  
Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the...
US20130254530 SYSTEM AND METHOD FOR IDENTIFYING SECURITY BREACH ATTEMPT OF A WEBSITE  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20100325417 RENDERING RIGHTS DELEGATION SYSTEM AND METHOD  
Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a...
US20150235011 DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION  
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server,...
US20110087885 METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK  
An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the...
US20140122874 Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System  
Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include...
US20110087876 Dynamic Analytical Differentiator For Obfuscated Functions In Complex Models  
Systems and methods are provided for providing secure transmission of software code, which includes a mathematical function, from a first computer to a second computer so that the mathematical...
US20100313007 SYSTEM AND METHOD FOR THE GENERATION OF A CONTENT FINGERPRINT FOR CONTENT IDENTIFICATION  
A system and method for the generation of a content fingerprint for content identification are described. Various embodiments include encoding content without any available identifying...
US20130080763 PERSONAL MESSAGING SECURITY  
A method may include creating, by a user device, an electronic message, the electronic message comprising destination information corresponding to an intended recipient of the electronic message....
US20110137803 SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS  
The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital...
US20150156177 METHOD AND SYSTEM FOR AUTOMATIC GENERATION OF CONTEXT-AWARE COVER MESSAGE  
One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system receives, at the receiving device, a benign...
US20100299515 TRACING COPIES OF AN IMPLEMENTATION  
A system (600) for facilitating tracing copies (634) of an implementation of a computational method (602). A network generator (604) for generating a network of look-up tables representing steps...
US20120254607 System And Method For Security Levels With Cluster Communications  
A cluster of computing nodes communicate through an unsecure network by selectively sending information in encrypted and unencrypted formats. Heartbeat packets are sent between the computing nodes...
US20110167254 SYSTEM AND METHOD FOR ENSURING CONFORMANCE OF ONLINE MEDIA DISTRIBUTION TO COPYRIGHT RULES  
A system and a method are described for presenting media content for users to view over the internet. Rights pertaining to said media to be viewed are uploaded to servers by users holding such...
US20130080765 SECURE CLOUD STORAGE AND SYNCHRONIZATION SYSTEMS AND METHODS  
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can...
US20120023324 INSIDER THREAT CORRELATION TOOL  
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a...
US20110047081 SECURE REPORTS FOR ELECTRONIC PAYMENT SYSTEMS  
A system, device, and method for generating and transmitting secure reports or documents in a retail environment or payment system comprising both secure and unsecure portions, where users of the...
US20110296166 COMPUTER-BASED, AUTOMATED WORKFLOW SYSTEM FOR SENDING SECURE REPORTS  
Computer-based systems and method for automating the workflow for generating and sending e-mails with attached reports to external recipients in order to reduce security breaches in certain...
US20120151204 Efficient Routing for Reverse Proxies and Content-based Routers  
Efficient routing for a client-server session or connection is provided in an application layer of multi-layered systems interconnect stack by caching a plurality of application-specific...
US20140075183 SECURE AND SCALABLE MAPPING OF HUMAN SEQUENCING READS ON HYBRID CLOUDS  
System and methods are provided for performing privacy-preserving, high-performance, and scalable DNA read mapping on hybrid clouds including a public cloud and a private cloud. The systems and...
US20110191244 Secured Transaction System  
The present invention relates to a secured transaction system. In one embodiment, a mobile transaction processing agent system includes a communication module configured to receive a secured...
US20100325414 Method and transmitting device for securely creating and sending an electronic message and method and receiving device for securely receiving and processing an electronic message  
The subject matter relates to a method for securely creating and sending an electronic message, whereby the message is created using a first application running in a secure operating system, the...
US20110093695 SECURE OFFLINE RELOCATION OF PORTABLE SOFTWARE LICENSES  
A method for the secure offline relocation of portable software licenses. The portable software license has an associated time limit. A license relocation record can be generated including the...
US20120173867 METHOD OF AUTHENTICATION AT TIME OF UPDATE OF SOFTWARE EMBEDDED IN INFORMATION TERMINAL, SYSTEM FOR SAME AND PROGRAM FOR SAME  
A load on a server or a network is suppressed at a minimum, the authentication server is not necessary, and download of falsified software is prevented. A server creates a time-limited...
US20130332723 SYSTEMS AND METHODS FOR SECURE FILE PORTABILITY BETWEEN MOBILE APPLICATIONS ON A MOBILE DEVICE  
Systems and methods for secure file portability between mobile applications in a cloud-based environment or cloud-based collaboration and file sharing environment. In one embodiment, a...
US20090216552 SYSTEMS AND PROCESSES FOR MAINTAINING ROOFS  
The process for maintaining a roof includes receiving a maintenance request and establishing an account in the database associated with the maintenance request. Next, a contractor is notified of...
US20130159694 DOCUMENT PROCESSING METHOD AND SYSTEM  
A document processing method and system are provided. A client divides at least one document into a plurality of document pages, and individually encrypts the document pages by a first key to...
US20130290698 System and Method for Efficient Support for Short Cryptoperiods in Template Mode  
System and method embodiments are provided herein for efficient representation and use of initialization vectors (IVs) for encrypted segments using template mode representation in Dynamic Adaptive...
US20110087878 ENABLING QoS FOR MACsec PROTECTED FRAMES  
Embodiments associated with enabling Quality of Service (QoS) for MACsec protected frames are described. One example method includes identifying a security indicator in an encrypted network...
US20120210121 SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES  
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction...
US20110099363 SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES  
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction...
US20150215291 SECURE DECENTRALIZED CONTENT MANAGEMENT PLATFORM AND TRANSPARENT GATEWAY  
An apparatus and method for private, peer-to-peer, and end-to-end content delivery, management, and access is disclosed. Content examples may include encrypted email, Instant Messaging (IM), and...
US20150195713 Secure and Automatic Connection to Wireless Network  
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for...
US20130262850 SECURE AND AUTOMATIC CONNECTION TO WIRELESS NETWORK  
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for...
US20110302406 METHOD AND SYSTEM FOR RECOVERING A SECURITY CREDENTIAL  
A system and method for recovering a security credential is provided. A security credential stored in the storage of a computing device is encrypted using a first encryption key generated by a...