Match Document Document Title
US20110016328 INFORMATION INTERCHANGE SYSTEM AND APPARATUS  
To overcome the drawback of difficulties when interchanging a patient's health record among different health information management systems and yet keep the patient's privacy, this invention...
US20110276806 Creation and Delivery of Encrypted Virtual Disks  
The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk attributes identified in the...
US20150100793 Method of Improving FPGA Security Using Authorization Codes  
A method for securely programming a population of authorized FPGAs includes defining the population of authorized FPGAs, generating an encrypted configuration bitstream for the population of...
US20120317421 Fingerprinting Executable Code  
Executable code may be fingerprinted by inserting NOP codes into the executable code in a pattern that may reflect a fingerprint. The NOP codes may be single instructions or groups of instructions...
US20140075203 METHOD FOR TESTING THE SECURITY OF AN ELECTRONIC DEVICE AGAINST AN ATTACK, AND ELECTRONIC DEVICE IMPLEMENTING COUNTERMEASURES  
A method of testing security of an electronic device against a combination of a side-channel attack and a fault-injection attack implemented during a method of cryptographic processing that...
US20120216050 MICROCODE AUTHENTICATION  
A microcode authentication unit provides access to a secure hardware unit. A microcode segment is provided to the microcode authentication unit, which generates a signature corresponding to the...
US20110047389 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20110047054 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20130268770 CRYPTOGRAPHIC HASH DATABASE  
A method for bursting a hash table of a key-value database comprises receiving a key and a value, traversing trie nodes of the key-value database from a root node to a leaf node by recursively...
US20130159730 ATTRIBUTE-BASED DIGITAL SIGNATURES  
An attribute-based digital signature system is disclosed. A first signature generating unit (1) is used for generating a first signature (10) for a document (11), based on a first signature key...
US20120311344 TECHNIQUES FOR SECURITY AUDITING OF CLOUD RESOURCES  
Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security...
US20150127954 OPERATING SYSTEM  
An example server-based system is provided, which includes at least one server configured with a clinical operating system having a plurality of application services, the application services...
US20150095656 APPARATUS FOR CODE OBFUSCATION AND METHOD THEREOF  
Disclosed is an apparatus for code obfuscation includes: an input unit that receives execution codes for android applications; a code analyzer that separates the input execution codes into...
US20110191593 Software License Embedded In Shell Code  
Software application protection methods and systems for protecting and verifying licensing of an original application. The system reads the original application executable, and generates a shelled...
US20140337639 STEGANOGRAPHIC EMBEDDING OF EXECUTABLE CODE  
A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on...
US20120131351 MANAGING ACCESS TO A SECURE DIGITAL DOCUMENT  
In a method for managing access to a secure digital document by workflow participants, in which a respective public key is associated with each of the workflow participants, an entry table is...
US20140122895 Providing Security Support for Digital Rights Management in Different Formats  
In accordance with some embodiments, technologies may be provided that is adaptable to any existing and potentially future digital rights management application. Thus, it is not necessary to...
US20110246786 Mechanism for Automatically Encrypting and Decrypting Virtual Disk Content Using a Single User Sign-On  
A mechanism for automatically encrypting and decrypting virtual disk content using a single user sign-on is disclosed. A method of embodiments of the invention includes receiving credentials of a...
US20120191983 MANAGING INFORMATION IN A DOCUMENT SERIALIZATION  
In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of...
US20110314297 EVENT LOG AUTHENTICATION USING SECURE COMPONENTS  
Some embodiments provide a system that facilitates use of a computing device. During operation, the system obtains an event description of an event on the computing device. Next, the system...
US20120011502 MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE  
Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend...
US20120159182 DRM PLUGINS  
Presented is a system and methods for receiving metadata, a decryption module and encrypted content from a cable headend, decrypting the encrypted content with the decryption module and presenting...
US20110125646 Methods and systems for managing personal health records by individuals  
A Data processing methods and systems adapted to manage personal health records by individuals. Wherein the patient undergoes encounters with a plurality of health care providers who generate...
US20140344584 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT  
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be...
US20130262874 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT  
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be...
US20140215225 METHOD FOR INCREASING THE SECURITY OF SOFTWARE  
A method for increasing security of software is provided. The method includes replacing a part of a code section comprised in a binary source file of the software with a pre-set special command,...
US20080152145 ASSET BRING-OUT MANAGEMENT SYSTEM, ASSET BRING-OUT MANAGEMENT METHOD, BROUGHT OUT ASSET, BROUGHT OUT ASSET CONTROL PROGRAM  
An asset bring-out management system includes a brought out asset, a managing system, an encryption determining unit, and a brought out information registering unit. The managing system manages...
US20110066861 DIGITAL CONTENT MANAGEMENT AND DELIVERY  
Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one...
US20100313007 SYSTEM AND METHOD FOR THE GENERATION OF A CONTENT FINGERPRINT FOR CONTENT IDENTIFICATION  
A system and method for the generation of a content fingerprint for content identification are described. Various embodiments include encoding content without any available identifying...
US20130138971 INTELLIGENT SECURITY CONTROL SYSTEM FOR VIRTUALIZED ECOSYSTEMS  
Resources of a virtualized ecosystem are intelligently secured by defining and analyzing object handling security control information for one or more logical resources in the virtualized ecosystem...
US20130031373 Product authentication based upon a hyperelliptic curve equation and a curve pairing function  
Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve...
US20120284527 METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING  
Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk...
US20130212406 TECHNIQUE FOR PROVIDING SECURE FIRMWARE  
A technique to verify firmware. One embodiment of the invention uses a processor's micro-code to verify a system's firmware, such that the firmware can be included in a trusted chain of code along...
US20110276807 REMOTE UPDATE METHOD FOR FIRMWARE  
The present invention relates to a remote update method for a firmware, in which the encoded firmware is decoded and updated using the XOR table, checksum, and signature stored in the header of...
US20120303967 DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD FOR PROTECTING DIGITAL CONTENT  
A digital content management system operative in a distributed network includes a SDP server and a client. The SDP server includes a content issuer and a right issuer. The content issuer is...
US20110238482 Digital Profile System of Personal Attributes, Tendencies, Recommended Actions, and Historical Events with Privacy Preserving Controls  
Embodiments of the invention provide a digital profile system for a user and a method for capturing, storing, and updating information about a user's attributes in a personal genome database. The...
US20150195082 COUNTERMEASURE TO POWER ANALYSIS ATTACKS THROUGH TIME-VARYING IMPEDANCE OF POWER DELIVERY NETWORKS  
A method and system for a countermeasure to power analysis attacks, where an impedance element is coupled to a power source providing power to a cryptographic module causing a measurable power...
US20130151861 SYSTEM AND METHOD TO PROTECT COMPUTER SOFTWARE FROM UNAUTHORIZED USE  
A system and method encrypt a license file associated with computer software using a private key. The license file includes one or more license keys, and each license key is associated with a...
US20120023027 AUTOMATED METHOD AND SYSTEM FOR PRINT HEAD WARRANTY VERIFICATION  
According to aspects of the embodiments, there is provided methods and systems for handling warranty services in a printing environment through use of an automatic process that writes all...
US20150178506 METHOD AND SYSTEM FOR DATABASE ENCRYPTION  
A method for encrypting a database, according to which a dedicated encryption module is placed inside a Database Management Software above a database cache. Each value of the database is encrypted...
US20120159191 METHOD AND APPARATUS FOR TRANSITIONING BETWEEN STATES OF SECURITY POLICIES USED TO SECURE ELECTRONIC DOCUMENTS  
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt...
US20120110347 METHOD OF RANDOMLY AND DYNAMICALLY CHECKING CONFIGURATION INTEGRITY OF A GAMING SYSTEM  
In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and...
US20150186681 METHOD OF ENCRYPTION AND DECRYPTION FOR SHARED LIBRARY IN OPEN OPERATING SYSTEM  
A method of encryption and decryption for shared libraries in an open operating system is provided. By encrypting a partial portion of an executable and linkable format (ELF) file, where the ELF...
US20140164784 INTEGRATED HEALTH CARE SYSTEMS AND METHODS  
Systems and methods described herein may store and analyze patient data sets. A processor in communication with a database may generate a plurality of patient data sets, each of the patient data...
US20130297946 SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES  
Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an...
US20100306552 SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED USE OF DIGITAL CONTENT  
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if...
US20110131422 Systems and Methods Using Cryptography to Protect Secure Computing Environments  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20100005316 BRANCH TRACE METHODOLOGY  
Method, system, and computer program product embodiments for performing a branch trace operation on a computer system of an end user are provided. An encrypted mapping macro is provided to the end...
US20110004765 LICENSE MANAGING METHOD AND DEVICE  
A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area,...
US20110145592 Virtual Token for Transparently Self-Installing Security Environment  
A virtual token for use in a virtual computer environment to implement the secure cryptographic facilities of a hardware security token within a computer without requiring custom installation or...