Match
|
Document |
Document Title |
|
US20150220746 |
ENCRYPTED DATA STORE FOR RECORDS
A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record... |
|
US20110047054 |
Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services... |
|
US20140164792 |
Securing Encrypted Virtual Hard Disks
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an... |
|
US20120297206 |
Securing Encrypted Virtual Hard Disks
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an... |
|
US20110191598 |
DOCK FOR A PORTABLE HARD DISK AND A METHOD FOR ACCESSING CONTENT ON A HOST DEVICE USING THE DOCK
There is provided a first dock for a portable hard disk, where the first dock is connectable to a host device. There is also provided a corresponding method for accessing content on the host... |
|
US20070283168 |
Program, classification method and system
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected... |
|
US20150039908 |
System and Method for Securing A Credential Vault On A Trusted Computing Base
A method for utilizing a secure credential vault on a mobile computing device includes: prompting a user for and receiving from the user a credential vault password; prompting a user for and... |
|
US20120324244 |
KIOSK DISTRIBUTION OF LICENSED CONTENT TO PORTABLE DEVICE WITHIN DVD AVAILABILITY WINDOW
A system and method are disclosed for kiosk distribution of licensed content to one or more portable devices. The system stores and distributes licensed content in such a manner as to be... |
|
US20100318798 |
MESSAGE HANDLING AT A MOBILE DEVICE
A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with... |
|
US20110307709 |
MANAGING SECURITY OPERATING MODES
A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by... |
|
US20150220756 |
CRYPTOGRAPHIC METHOD AND SYSTEM OF PROTECTING DIGITAL CONTENT & RECOVERY OF SAME THROUGH UNIQUE USER IDENTIFICATION
A computer-implemented method and related system controls access to protected content with certificate-based access authorization. Protected content stored in a memory of a computer is enciphered... |
|
US20080148068 |
Storage Media to Storage Drive Centric Security
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage media and associated with data... |
|
US20140006789 |
DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored... |
|
US20150089247 |
STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF
A security method based on a memory unit for a user is provided. The security method includes receiving, from a server, a security code including a security service command for the user terminal... |
|
US20090164804 |
SECURED STORAGE DEVICE
A method of preventing unauthorized access to digital content includes obtaining from a trusted entity a public key of a public-private key pair, encrypting content being received by a storage... |
|
US20150220754 |
Document Security in Enterprise Content Management Systems
Methods for enhancing the security of content in a records management system. A document is received to be stored as a record in the records management system. A unique combination of an... |
|
US20100318807 |
SYSTEM AND METHOD FOR GENERATING A DISGUISED PASSWORD BASED ON A REAL PASSWORD
A system and method for generating a disguised password are provided. The method presets a real password via an input device, selects one or more characters from the real password as a... |
|
US20130145179 |
Corralling Virtual Machines With Encryption Keys
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more... |
|
US20130111221 |
STORAGE SYSTEM AND ITS MANAGEMENT METHOD
A plurality of storage devices with different functions and storage pools with different attributes are automatically associated with each other. A controller: divides a plurality of storage... |
|
US20090150682 |
Third Party Secured Storage for Web Services and Web Applications
A system and method for providing third party secure hosting of an application. The system and method includes providing a host system with a main memory and a third party secured memory, the... |
|
US20110055593 |
METHOD AND APPARATUS FOR PROTECTING ACCOUNT NUMBERS AND PASSWORDS
A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret... |
|
US20150205968 |
SHARED PREFERENCES IN A MULTI-APPLICATION ENVIRONMENT
Various aspects of the subject technology relate to a system configured to store preferences in a file that is accessible to other applications on a computing device. The preferences stored in the... |
|
US20110055582 |
HASH FUNCTION USING A DOMINO GAME PROCESS
In the computer data security field, cryptographic hash function processes are embodied in a computer system and may be keyless, but are highly secure. The processes are based on the type of... |
|
US20150193599 |
MULTIPLE CONTENT PROTECTION SYSTEMS IN A FILE
Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file.... |
|
US20140089684 |
METHOD AND APPARATUS FOR PROTECTING FILE
Embodiments of the present invention provide a method and a system for protecting a file, which belong to the field of information security. The method includes: replacing a secure file header of... |
|
US20140164790 |
STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING
Methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to host a plurality of volumes, each... |
|
US20070074292 |
Management of encrypted storage networks
A system and technique for managing security in storage networks is provided. A management server searches the storage system and compiles information about security in the system, including... |
|
US20140331063 |
Disrupting Password Attack Using Compression
Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using... |
|
US20090300371 |
SEMICONDUCTOR INTEGRATED DEVICE AND METHOD OF TESTING SEMICONDUCTOR INTEGRATED DEVICE
According to one embodiment, a semiconductor integrated device which stores secret data and is capable of operating in a test mode in which a scan test with respect to an internal circuit is... |
|
US20140351606 |
POLICY DRIVEN CLOUD STORAGE MANAGEMENT AND CLOUD STORAGE POLICY ROUTER
Techniques are disclosed for a policy driven cloud storage management broker and a cloud storage policy router, along with methods for registering tenant applications with the cloud storage... |
|
US20090150684 |
ANTI-ATTACKING METHOD FOR PRIVATE KEY, CONTROLLER, STORAGE DEVICE AND COMPUTER READABLE RECORDING MEDIUM HAVING THE SAME
An anti-attacking method for a private key is provided. The method includes using a plurality of storage areas for storing the same security information. The method also includes selecting one of... |
|
US20060179326 |
Security device using multiple operating system for enforcing security domain
A security device using multiple operating systems for enforcing security domain policies is provided. The device is installed in a computing device having a hard disk drive and allows multiple... |
|
US20150215120 |
Storage Encryption
Storage associated with a virtual machine or other type of device may be migrated between locations (e.g., physical devices, network locations, etc.). To maintain the security of the storage, a... |
|
US20080114992 |
Interoperable Digital Rights Management
The subject matter disclosed herein relates to a method and/or system for enabling access to media content using different digital rights management formats. |
|
US20080162948 |
Digital Information Storage System, Digital Information Security System, Method for Storing Digital Information and Method for Service Digital Information
Provided is a digital information storage system, a digital information security system, and a digital information storing method, and a digital information providing method, and more... |
|
US20130067242 |
MANAGING SELF-ENCRYPTING DRIVES IN DECENTRALIZED ENVIRONMENTS
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple... |
|
US20090327757 |
Computer system for managing storage area state of a storage system
There is provided a computer system, having a host and at least one storage system. The at least one storage system provides storage area includes at least one of an encrypted storage area and a... |
|
US20090199016 |
Storage system, and encryption key management method and encryption key management program thereof
A user no longer needs to restore key information upon restoring data. Proposed is a storage system having a storage apparatus, a tape library apparatus for backing up data stored in the storage... |
|
US20110040975 |
SYSTEM AND METHOD FOR CONTROLLED COPYING AND MOVING OF CONTENT BETWEEN DEVICES AND DOMAINS BASED ON CONDITIONAL ENCRYPTION OF CONTENT KEY DEPENDING ON USAGE STATE
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use... |
|
US20050257072 |
Credential roaming
Implementations are described and claimed herein to enable credential roaming among a plurality of different computing devices. An exemplary system may include an event handler to receive event... |
|
US20150229476 |
SELECTIVE SHREDDING IN A DEDUPLICATION SYSTEM
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a... |
|
US20090013194 |
TECHNIQUE FOR PROTECTING A DATABASE FROM AN ONGOING THREAT
A system for stopping an ongoing threat to a database is described. During operation, if an ongoing threat to the database is detected, the system modifies a threat-assessment condition. Then, the... |
|
US20070157032 |
Method for enabling an administrator to configure a recovery password
A method is provided for a enabling a user to initiate a password protected backup copy of the user's credentials. The method includes providing a user with a credential store containing... |
|
US20070016804 |
PASSWORD MANAGEMENT SYSTEM
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion... |
|
US20110185191 |
ELECTRONIC BOOK ELECTRONIC LINKS
The invention, an electronic book selection and delivery system, is a new way to distribute books and other textual information to bookstores, libraries and consumers. The primary components of... |
|
US20110019820 |
COMMUNICATION CHANNEL CLAIM DEPENDENT SECURITY PRECAUTIONS
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication... |
|
US20070079143 |
Secure recoverable passwords
A method and apparatus are disclosed that enable a user who forgets one of his two passwords to securely recover the forgotten password. After a user logs in using one of his two passwords, the... |
|
US20140136856 |
SYSTEM AND METHOD FOR UPDATING FIRMWARE
A mechanism that allows firmware for a computing device to be updated in a secure manner by utilizing an update validation procedure included in a ROM image is discussed. |
|
US20110004770 |
ENCRYPTION SYSTEM THAT PREVENTS ACTIVATION OF COMPUTER VIRUSES
System for preventing activation of computer viruses operates in such a way that all executable files must be kept separated from other files and encrypted when written to Hard Disk Drive or Solid... |
|
US20050278552 |
Secure virtual account
The invention relates to a method for storing data or a hierarchic folder structure on a selected number of computers and/or intelligent devices having storage capacity in a community of computers... |