Matches 1 - 50 out of 251 1 2 3 4 5 6 >


Match Document Document Title
US20110167259 SOFTWARE LICENSE ENFORCEMENT  
Systems and methods for performing software license enforcement are provided. According to one embodiment, file or operating system activity relating to a code module are intercepted by a kernel...
US20150256341 Management Control Method, Apparatus, and System for Virtual Machine  
A security control platform receives a virtual machine starting request message that is from user equipment and forwarded by a management platform, where the virtual machine starting request...
US20140208100 PROVISIONING AN APP ON A DEVICE AND IMPLEMENTING A KEYSTORE  
A keystore is installed on a mobile app where the keystore is created and provisioned on a server, such as an app wrapping server, under the control of an enterprise. A generic (non-provisioned)...
US20050038993 Information security model  
An information security model provides a set of schemas that ensure coverage of all securing components. All points are addressed and evaluated in a net of three-dimensional coorindate knots The...
US20130212384 ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE  
Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and...
US20130073848 ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE  
Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and...
US20140317405 SECURED COMMUNICATIONS ARRANGEMENT APPLYING INTERNET PROTOCOL SECURITY  
A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level...
US20130246787 MESSAGE STORAGE AND TRANSFER SYSTEM  
An electronic content exchange system includes a communications medium and at least two storage media. Each storage media includes an interface configured to send and receive messages, a memory...
US20140095867 DEVICE, METHOD, AND SYSTEM FOR SECURE TRUST ANCHOR PROVISIONING AND PROTECTION USING TAMPER-RESISTANT HARDWARE  
A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database...
US20140122875 CONTAINER-BASED MANAGEMENT AT A USER DEVICE  
An approach for facilitating container-based management at a user device is disclosed. In some embodiments, a request to establish a session between the user device and a network service may be...
US20150161402 COMPUTER ECOSYSTEM PROVIDING PRIVACY AND TRACKING IN SHARING USER-GENERATED CONTENT BY ENCRYPTING THE UGC AT THE IMAGING SOURCE  
Methods and apparatus are disclosed for securely sharing user-generated content using DRM principles, and for tracking statistics of content viewing. In this way, a user can generate protected...
US20140189347 VIRTUAL PAD  
A system and method for communicating information over an insecure communications network include one or more computing devices that may access a first server via the communication network. In...
US20140040615 MONITORING ENCRYPTED SESSION PROPERTIES  
The present disclosure includes methods and systems for monitoring encrypted session properties. A number of embodiments include receiving a number of encrypted session properties at a real user...
US20130198512 INTERCEPTING ENCRYPTED NETWORK TRAFFIC FOR INTERNET USAGE MONITORING  
An example method disclosed herein to monitor Internet usage comprises intercepting, using a kernel extension executing in an operating system kernel of a device, a first request to be sent to a...
US20080148048 Virtualization Hardware For Device Driver Isolation  
Hardware virtualization support is used to isolate kernel extensions. A kernel and various kernel extensions are executed in a plurality of hardware protection domains. Each hardware protection...
US20150082029 SHARED PORTAL CONTEXT SESSION  
The present disclosure involves systems, software, and computer implemented methods for sharing session state between portal application portlets associated with different domains. One example...
US20080294893 DEVICE AND METHOD FOR SECURITY RECONFIGURATION  
A security reconfigurable device is adapted for use in an integrated wireless network integrating at least two wireless networks, and includes a plurality of security modules and a control unit....
US20130326216 METHODS AND ARRANGEMENTS TO LAUNCH TRUSTED, COEXISTING ENVIRONMENTS  
Methods and arrangements to launch trusted, distinct, co-existing environments are disclosed. Embodiments may launch trusted, distinct, co-existing environments in pre-OS space with high...
US20060123229 Database integration platform for security systems  
A database integration platform configured to facilitate automatic population and continued synchronization of two or more databases, provide automatic execution of business rules to assign...
US20050044357 Fraud detection method and system  
A method for determining the legitimacy of an insurance claim includes the steps of receiving codes that identify a service for which payment is requested from an insurance provider. Services that...
US20100115223 Storage Area Allocation Method and a Management Server  
An object is to allocate a storage area to a business application by taking a security evaluation of the storage area and a security evaluation value of the business application into...
US20070101148 Secure prompting  
Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from...
US20140380044 ACCESSING LOCAL APPLICATIONS WHEN ROAMING USING A NFC MOBILE DEVICE  
A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification...
US20140047235 LOCAL TRUSTED SERVICE MANAGER  
A method for managing a secure element which is embedded into a host unit. The described method comprises (a) transmitting a request for a management script from the host unit to a program element...
US20110296175 SYSTEMS AND METHODS FOR SOFTWARE LICENSE DISTRIBUTION USING ASYMMETRIC KEY CRYPTOGRAPHY  
Methods and computer readable media for distributing a software license based on asymmetric cryptography via a network. An application publisher generates an asymmetric key-pair having an...
US20150113269 HIGHLY ACCURATE SECURITY AND FILTERING SOFTWARE  
A security software comprises administrative module for configuring access levels and creating types of accounts and application server for domain filtering by checking against friendly and...
US20130159707 Host Device and Method for Super-Distribution of Content Protected with a Localized Content Encryption Key  
In one embodiment, a host device creates a super-distribution token by encrypting a content encryption key with a super-distribution key and stores the super-distribution token and encrypted...
US20130283047 SYSTEM AND METHOD FOR SECURELY USING MULTIPLE SUBSCRIBER PROFILES WITH A SECURITY COMPONENT AND A MOBILE TELECOMMUNICATIONS DEVICE  
System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile...
US20060015732 Processing system using internal digital signatures  
A preferred embodiment of the invention uses local or internal public and private keys for signatures. The keys are obtained and managed internally by a kernel process having access to a secure...
US20050010761 High performance security policy database cache for network processing  
A security policy database cache includes at least one primary table including signature values that indicate that a packet's security policy database information may be in the cache and at least...
US20100318793 Permission-Based Dynamically Tunable Operating System Kernel  
A server includes a central processing unit and electronic memory communicatively coupled to the central processing unit. The memory stores a dynamically tunable operating system kernel that...
US20070283145 Multi-Factor Security System With Portable Devices And Security Kernels  
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them...
US20080046725 Fast system call method  
A method of a fast system call is provided. First, a logical operation to compute a kernel service routine is used. Then the logical operation result is compared with ciphertext from a key...
US20090193251 SECURE REQUEST HANDLING USING A KERNEL LEVEL CACHE  
The present invention discloses a system, method, apparatus, and computer usable product code for handling requests. The invention can include a kernel level cache, a request handling service, and...
US20090158036 PROTECTED COMPUTING ENVIRONMENT  
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for...
US20070189307 Predictive generation of a security network protocol configuration  
A method, system and computer program product for predictively configuring a security services protocol implementation can be provided. The method can include providing a set of network topology...
US20080104392 Information access system, reader/writer device and contactless information storage device  
In an information access system, a reader/writer device encrypts, with a first encryption key, an information request and a second encryption key to thereby generate first encrypted data, and...
US20140208097 SECURING RESULTS OF PRIVILEGED COMPUTING OPERATIONS  
A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to secure the...
US20140181505 Unified Mobile Security System and Method of Operation  
A mobile secure agent on a wireless device executes one or more authenticated data collection profiles provisioned by a private profile producer. Each data package can only be transmitted to a...
US20150143111 METHODS AND DEVICES FOR SECURING KEYS FOR A NONSECURED, DISTRIBUTED ENVIRONMENT WITH APPLICATIONS TO VIRTUALIZATION AND CLOUD-COMPUTING SECURITY AND MANAGEMENT  
The present invention discloses methods and devices for securing keys for a non-secure computing-environment. Methods include the steps of: providing a security-key framework which is adapted,...
US20050149746 SYSTEM FOR ACTIVELY UPDATING A CRYPTOGRAPHY MODULE IN A SECURITY GATEWAY AND RELATED METHOD  
A system for actively updating a cryptography module in a security gateway and related method is used in a security gateway, such as a VPN gateway according to an IPSEC protocol, which is...
US20090249066 Method for Safe Operation and A System Thereof  
The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system...
US20090089579 Secure Policy Differentiation by Secure Kernel Design  
A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are...
US20080046724 Method for governing interaction between code within a code base  
A separation management system (32) for governing interaction between code within a code base (50) operable on a computer (30) determines a region in a memory (44) of the computer (30) in which...
US20080301440 Updateable Secure Kernel Extensions  
A method, computer program product, and data processing system for providing an updateable encrypted operating kernel are disclosed. In a preferred embodiment, secure initialization hardware...
US20070143839 Access Unit Switching Through Physical Mediation  
A plurality of access units may be established with varying levels of privilege and access rights, such that the user may perform tasks carrying with them a high risk of viral infection in an...
US20050005101 Kernel cryptographic module signature verification system and method  
A computer operating system having a kernel with a kernel module signature verification unit is described herein. The kernel module signature verification unit automatically monitors kernel module...
US20080016340 SYSTEM FOR PROVIDING SECURITY FOR AD HOC NETWORKED COMPUTERIZED DEVICES  
A system adapted to provide communication security between computerized devices in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted...
US20080072042 Management system, management apparatus and management method  
The present invention relates to a management system, and this management system comprises a storage unit for storing information specifying a terminal apparatus and a restoration user information...
US20130339728 SECURE PRODUCT-SUM COMBINATION SYSTEM, COMPUTING APPARATUS, SECURE PRODUCT-SUM COMBINATION METHOD AND PROGRAM THEREFOR  
The efficiency of multiplication in secure function computation is increased to make the secret function computation faster than before. Three or more computing apparatuses cooperate to generate a...

Matches 1 - 50 out of 251 1 2 3 4 5 6 >