Match Document Document Title
US20100146300 HEALTH MONITORING SYSTEM  
A health monitoring system includes a plurality of remote user sites, each remote user site comprising at least one health monitoring device for collection of user health monitoring data, an...
US20120144205 Cryptographic Architecture with Instruction Masking and other Techniques for Thwarting Differential Power Analysis  
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm...
US20050177742 Method and system for managing a data object so as to comply with predetermined conditions for usage  
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data,...
US20150381582 SECURE DATA PARSER METHOD AND SYSTEM  
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into...
US20130246808 SYSTEMS AND METHODS FOR SECURING DATA IN MOTION  
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for...
US20110179287 SECURE DATA PARSER METHOD AND SYSTEM  
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of...
US20160012238 A METHOD AND SYSTEM FOR PRIVACY-PRESERVING RECOMMENDATION TO RATING CONTRIBUTING USERS BASED ON MATRIX FACTORIZATION  
A method includes: receiving a set of records, wherein each record in the set of records is received from a respective user and includes a set of tokens and a set of items, and wherein each record...
US20130212405 SECURE DATA PARSER METHOD AND SYSTEM  
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of...
US20110040981 Synchronization of Buffered Audio Data With Live Broadcast  
Various techniques relating to the buffering of a live audio broadcast on an electronic device and the subsequently playback the buffered data are provided. In one embodiment, the playback speed...
US20070180266 Digital content cryptograph and process  
A digital cryptograph and encryption process encrypts and transmits in a digital format specific items of information requested by a user of a digital content transmission system by using key...
US20050144468 Method and apparatus for content protection in a personal digital network environment  
In some embodiments, the invention is a personal digital network (“PDN”) including hardware (sometimes referred to as Ingress circuitry) configured to transcrypt encrypted content that enters the...
US20150372806 ENCRYPTING OPERATING SYSTEM  
A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating system (EOS), which is a modified UNIX...
US20140281579 Systems and Methods for Decrypting Digital Art and Imaging for Display of the Same  
System and method for securing digital content comprising one or more display devices, each comprising a processing controller, a first memory, and a display screen, and configured to display...
US20080222427 DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE  
The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of...
US20080028464 Systems and Methods for Data Processing Anomaly Prevention and Detection  
Certain embodiments of the present invention provide a system for data processing anomaly detection including a database including anomaly data and an anomaly processing component adapted to...
US20170099134 DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING  
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is...
US20080148056 Systems and methods for secure transaction management and electronic rights protection  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20050204405 Method and system for digital rights management  
In a method and system for digital content management, in order for an end-user application on a consumer electronic device to be fully functional, the end-user must have a secure computing...
US20050182950 Network security system and method  
Disclosed herein is a network security system and method. The network security system includes a packet-dedicated processor for primarily performing hardware filtering on static attacks of network...
US20130268774 SYSTEMS AND METHODS FOR SECURING AND RESTORING VIRTUAL MACHINES  
Systems and methods are provided for securing a virtual machine by causing a plurality of shares of virtual machine files to be separately stored in response to a stop command. Systems and methods...
US20110047389 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20100171967 PERFORMING A SEARCH THROUGH SENSING A SEARCH FORM WITH A SENSING DEVICE  
A method of performing a search is disclosed. A search request form including information relating to a search request and coded data portions is printed. Each coded data portion is indicative of...
US20100169222 Method for Secure Storage and Delivery of Media Content  
The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the...
US20050144470 Method and apparatus for processing information, information storage medium, and computer program  
A content stored in an information recording medium is managed on a per unit basis and protected from unauthorized use. The content stored in the information recording medium is divided into...
US20130067241 CONTENTS DATA UTILIZATION SYSTEM AND METHOD, AND MOBILE COMMUNICATION TERMINAL USED FOR THE SAME  
The object of the present invention is to provide a contents data utilization system in which the contents data is shared between a plurality of mobile communication terminals while the copyright...
US20110154023 Protected device management  
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in...
US20110131422 Systems and Methods Using Cryptography to Protect Secure Computing Environments  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20100313013 SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20080144821 Secure video distribution  
Apparatus having corresponding methods, business methods, and computer programs comprises an input circuit to receive packets of encrypted encoded video data from a network; a storage device to...
US20070118762 Apparatus, method and system for generating a unique hardware adaptation inseparable from correspondingly unique content  
The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or...
US20060242429 In stream data encryption / decryption method  
The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably...
US20150381362 Encryption System in a Virtualized Environment  
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially...
US20150379280 Method and Apparatus for Dynamically Creating Encryption Rules  
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially...
US20140365783 METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AT LEAST PART OF AN EXECUTION ENVIRONMENT FOR EXECUTING A COMPUTER MODULE  
A system for verifying authenticity of at least part of an execution environment for executing a computer program module. The system includes a processor and a storage for storing the computer...
US20120284531 METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM  
When data is encrypted and stored for a long time, encryption key(s) and/or algorithm(s) should be updated so as not to be compromised due to malicious attack. To that end, stored encrypted data...
US20090222673 SYSTEM FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY  
Digital data protection is provided by a processor running an operating system programmed to generate one or more interrupts; an access mechanism detects one or more interrupts at or below a BIOS...
US20060277413 Data security  
Data Security methods, computer programs, and systems for encrypting and decrypting data, process sharing, and redundancy. The invention provides techniques for encryption including the encryption...
US20140089204 FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS  
Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating...
US20110078457 Method of Encrypted Communication with Restricted Rate of Stored Encryption Key Retrievals  
A method of encrypted communication between entities in a manner that frustrates side channel attacks attempting to determine an encryption key. The method involves providing a device with an...
US20100153205 METHOD AND APPARATUS FOR ELECTRONIC MESSAGE (COUPON) DISTRIBUTION  
A system and method for creating and retrieving coupons using an electronic coupon database includes registering coupons with the database by a vendor, and then registering cell phones, also with...
US20090313482 Apparatus, Method and System for Generating a Unique Hardware Adaptation Inseparable from Correspondingly Unique Content  
The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or...
US20070172053 Method and system for microprocessor data security  
Embodiments of the invention relate generally to methods and systems for microprocessor data security, involving data encryption and decryption of stored data in, or in communication with, a...
US20070061594 Systems and methods for secure transaction management and electronic rights protection  
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers...
US20140304525 KEY/VALUE STORAGE DEVICE AND METHOD  
One embodiment of the invention relates to a key/value storage device. The key/value storage device includes a storage medium for storing data, a network interface for receiving commands sent by...
US20140201538 SYSTEMS AND METHODS FOR SECURING DATA  
Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a multi-dimensional representation of...
US20090204823 METHOD AND APPARATUS FOR CONTROLLING SYSTEM ACCESS DURING PROTECTED MODES OF OPERATION  
A microprocessor to provide software development debugging capabilities while providing security for confidential and/or sensitive information. The processor may operate in one of an open, a...
US20050076229 Recognizer of digital signal content  
Described herein is a technology for recognizing the content of digital signals. The technology determines one or more hash values for the original content of a digital signal. The scope of the...
US20120204037 Method and apparatus for executing software applications  
Consumer electronic devices, such as e.g. high-definition movie players for removable storage media such as optical discs, may provide possibilities for advanced interactivity for the user,...
US20120060039 Code Download and Firewall for Embedded Secure Application  
A device includes a demodulator for receiving an encrypted content, an interface unit communicatively coupled to an external memory, and a hardware unit coupled to the demodulator and configured...
US20100205648 Secure Integrated Media Center  
A set-top media system is disclosed which can be combined with an open architecture personal computer (PC) to provide a feature-rich secure integrated media center while meeting security rules of...