Match
|
Document |
Document Title |
|
US20100146300 |
HEALTH MONITORING SYSTEM
A health monitoring system includes a plurality of remote user sites, each remote user site comprising at least one health monitoring device for collection of user health monitoring data, an... |
|
US20120144205 |
Cryptographic Architecture with Instruction Masking and other Techniques for Thwarting Differential Power Analysis
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm... |
|
US20050177742 |
Method and system for managing a data object so as to comply with predetermined conditions for usage
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data,... |
|
US20150381582 |
SECURE DATA PARSER METHOD AND SYSTEM
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into... |
|
US20130246808 |
SYSTEMS AND METHODS FOR SECURING DATA IN MOTION
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for... |
|
US20110179287 |
SECURE DATA PARSER METHOD AND SYSTEM
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of... |
|
US20160012238 |
A METHOD AND SYSTEM FOR PRIVACY-PRESERVING RECOMMENDATION TO RATING CONTRIBUTING USERS BASED ON MATRIX FACTORIZATION
A method includes: receiving a set of records, wherein each record in the set of records is received from a respective user and includes a set of tokens and a set of items, and wherein each record... |
|
US20130212405 |
SECURE DATA PARSER METHOD AND SYSTEM
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of... |
|
US20110040981 |
Synchronization of Buffered Audio Data With Live Broadcast
Various techniques relating to the buffering of a live audio broadcast on an electronic device and the subsequently playback the buffered data are provided. In one embodiment, the playback speed... |
|
US20070180266 |
Digital content cryptograph and process
A digital cryptograph and encryption process encrypts and transmits in a digital format specific items of information requested by a user of a digital content transmission system by using key... |
|
US20050144468 |
Method and apparatus for content protection in a personal digital network environment
In some embodiments, the invention is a personal digital network (“PDN”) including hardware (sometimes referred to as Ingress circuitry) configured to transcrypt encrypted content that enters the... |
|
US20150372806 |
ENCRYPTING OPERATING SYSTEM
A method of and system for encrypting and decrypting data on a computer system is disclosed. In one embodiment, the system comprises an encrypting operating system (EOS), which is a modified UNIX... |
|
US20140281579 |
Systems and Methods for Decrypting Digital Art and Imaging for Display of the Same
System and method for securing digital content comprising one or more display devices, each comprising a processing controller, a first memory, and a display screen, and configured to display... |
|
US20080222427 |
DEVICE AND METHOD WITH REDUCED INFORMATION LEAKAGE
The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of... |
|
US20080028464 |
Systems and Methods for Data Processing Anomaly Prevention and Detection
Certain embodiments of the present invention provide a system for data processing anomaly detection including a database including anomaly data and an anomaly processing component adapted to... |
|
US20170099134 |
DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is... |
|
US20080148056 |
Systems and methods for secure transaction management and electronic rights protection
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the... |
|
US20050204405 |
Method and system for digital rights management
In a method and system for digital content management, in order for an end-user application on a consumer electronic device to be fully functional, the end-user must have a secure computing... |
|
US20050182950 |
Network security system and method
Disclosed herein is a network security system and method. The network security system includes a packet-dedicated processor for primarily performing hardware filtering on static attacks of network... |
|
US20130268774 |
SYSTEMS AND METHODS FOR SECURING AND RESTORING VIRTUAL MACHINES
Systems and methods are provided for securing a virtual machine by causing a plurality of shares of virtual machine files to be separately stored in response to a stop command. Systems and methods... |
|
US20110047389 |
Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services... |
|
US20100171967 |
PERFORMING A SEARCH THROUGH SENSING A SEARCH FORM WITH A SENSING DEVICE
A method of performing a search is disclosed. A search request form including information relating to a search request and coded data portions is printed. Each coded data portion is indicative of... |
|
US20100169222 |
Method for Secure Storage and Delivery of Media Content
The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the... |
|
US20050144470 |
Method and apparatus for processing information, information storage medium, and computer program
A content stored in an information recording medium is managed on a per unit basis and protected from unauthorized use. The content stored in the information recording medium is divided into... |
|
US20130067241 |
CONTENTS DATA UTILIZATION SYSTEM AND METHOD, AND MOBILE COMMUNICATION TERMINAL USED FOR THE SAME
The object of the present invention is to provide a contents data utilization system in which the contents data is shared between a plurality of mobile communication terminals while the copyright... |
|
US20110154023 |
Protected device management
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in... |
|
US20110131422 |
Systems and Methods Using Cryptography to Protect Secure Computing Environments
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying... |
|
US20100313013 |
SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the... |
|
US20080144821 |
Secure video distribution
Apparatus having corresponding methods, business methods, and computer programs comprises an input circuit to receive packets of encrypted encoded video data from a network; a storage device to... |
|
US20070118762 |
Apparatus, method and system for generating a unique hardware adaptation inseparable from correspondingly unique content
The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or... |
|
US20060242429 |
In stream data encryption / decryption method
The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably... |
|
US20150381362 |
Encryption System in a Virtualized Environment
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially... |
|
US20150379280 |
Method and Apparatus for Dynamically Creating Encryption Rules
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially... |
|
US20140365783 |
METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AT LEAST PART OF AN EXECUTION ENVIRONMENT FOR EXECUTING A COMPUTER MODULE
A system for verifying authenticity of at least part of an execution environment for executing a computer program module. The system includes a processor and a storage for storing the computer... |
|
US20120284531 |
METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM
When data is encrypted and stored for a long time, encryption key(s) and/or algorithm(s) should be updated so as not to be compromised due to malicious attack. To that end, stored encrypted data... |
|
US20090222673 |
SYSTEM FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY
Digital data protection is provided by a processor running an operating system programmed to generate one or more interrupts; an access mechanism detects one or more interrupts at or below a BIOS... |
|
US20060277413 |
Data security
Data Security methods, computer programs, and systems for encrypting and decrypting data, process sharing, and redundancy. The invention provides techniques for encryption including the encryption... |
|
US20140089204 |
FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS
Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating... |
|
US20110078457 |
Method of Encrypted Communication with Restricted Rate of Stored Encryption Key Retrievals
A method of encrypted communication between entities in a manner that frustrates side channel attacks attempting to determine an encryption key. The method involves providing a device with an... |
|
US20100153205 |
METHOD AND APPARATUS FOR ELECTRONIC MESSAGE (COUPON) DISTRIBUTION
A system and method for creating and retrieving coupons using an electronic coupon database includes registering coupons with the database by a vendor, and then registering cell phones, also with... |
|
US20090313482 |
Apparatus, Method and System for Generating a Unique Hardware Adaptation Inseparable from Correspondingly Unique Content
The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or... |
|
US20070172053 |
Method and system for microprocessor data security
Embodiments of the invention relate generally to methods and systems for microprocessor data security, involving data encryption and decryption of stored data in, or in communication with, a... |
|
US20070061594 |
Systems and methods for secure transaction management and electronic rights protection
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers... |
|
US20140304525 |
KEY/VALUE STORAGE DEVICE AND METHOD
One embodiment of the invention relates to a key/value storage device. The key/value storage device includes a storage medium for storing data, a network interface for receiving commands sent by... |
|
US20140201538 |
SYSTEMS AND METHODS FOR SECURING DATA
Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a multi-dimensional representation of... |
|
US20090204823 |
METHOD AND APPARATUS FOR CONTROLLING SYSTEM ACCESS DURING PROTECTED MODES OF OPERATION
A microprocessor to provide software development debugging capabilities while providing security for confidential and/or sensitive information. The processor may operate in one of an open, a... |
|
US20050076229 |
Recognizer of digital signal content
Described herein is a technology for recognizing the content of digital signals. The technology determines one or more hash values for the original content of a digital signal. The scope of the... |
|
US20120204037 |
Method and apparatus for executing software applications
Consumer electronic devices, such as e.g. high-definition movie players for removable storage media such as optical discs, may provide possibilities for advanced interactivity for the user,... |
|
US20120060039 |
Code Download and Firewall for Embedded Secure Application
A device includes a demodulator for receiving an encrypted content, an interface unit communicatively coupled to an external memory, and a hardware unit coupled to the demodulator and configured... |
|
US20100205648 |
Secure Integrated Media Center
A set-top media system is disclosed which can be combined with an open architecture personal computer (PC) to provide a feature-rich secure integrated media center while meeting security rules of... |