Match Document Document Title
US20150154360 SYSTEMS AND METHODS FOR SECURE EXCHANGES OF INFORMATION  
The disclosure herein pertains to systems and methods for communicating information regarding patients which include authorizing a plurality of care providers to access an informational interface...
US20100299723 System and Method for Automated Clock Wind Back Recovery  
A method and system for automated clock wind-back recovery are disclosed. According to one embodiment, a computer-implemented method comprises requesting a license to access an application and...
US20150143536 SYSTEM AND METHOD FOR LOCATING AND RETRIEVING PRIVATE INFORMATION ON A NETWORK  
A system for document retrieval in a network environment is provided where documents are stored with corresponding privacy codes. A query server computer is in communication with the network and...
US20130347124 Accessing Restricted Resources In Computer Programming  
A computerized method for providing a computer code an access to a restricted resource of a computer program, comprising modifying an at least one duplicate of an at least one declaration file of...
US20150150146 PROVIDING CONTENT ITEMS FROM ALTERNATE SOURCES  
Systems and methods for providing content items to users. A computer system may provide to a first user an indication of a plurality of available content items. The computer system may receive...
US20140283108 PROVIDING CONTENT ITEMS FROM ALTERNATE SOURCES  
Systems and methods for providing content items to users. A computer system may provide to a first user an indication of a plurality of available content items. The computer system may receive...
US20120304305 SYSTEMS AND METHODS FOR A WEBSITE APPLICATION FOR THE PURPOSE OF TRADING, BARTERING, SWAPPING, OR EXCHANGING PERSONAL PROPERTY THROUGH A SOCIAL NETWORKING ENVIRONMENT  
A system is provided for facilitating a personal property trading system and social networking environment that allows users to interact and create dialogue and socialize in relation to possible...
US20140325673 LIVE BROADCAST CONTENT PROTECTION BASED ON WATERMARKING  
Techniques for thwarting piracy of real-time content such as broadcast streams are described. In one technique, when portions of a real-time content is received at a user device, the device embeds...
US20140173750 Provisioning a Computing System for Digital Rights Management  
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these...
US20140298481 ENTITLEMENTS DETERMINATION VIA ACCESS CONTROL LISTS  
Entitlements to resources can be determined by using access rules that are organized as respective ranges in an entitlement space. An access rule can represent a range between two rational numbers...
US20150229672 Online Music Networking System  
An online music networking system that utilizes the internet for coordinating the sharing and listening of music includes a computer having a processor connected to network such as the internet....
US20060168663 Secure transaction protocol  
A system for engaging in secure transactions over an internetwork, involving, a consumer, a merchant and a Transaction Authority as parties to a transaction. To initiate the transaction the...
US20110271108 METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS  
Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the...
US20130086693 CLASSIFICATION-BASED DIGITAL RIGHTS MANAGEMENT  
The present subject matter relates to a device for digital rights management. The device includes a classification module that assigns a classification tag to a document. The classification tag is...
US20130061282 Content Handling for Applications  
Techniques for content handling for applications are described. In one or more implementations, a first set of content handling policies is enforced for a first portion of an application that is...
US20140373113 Trust Based Digital Rights Management Systems  
A system and method for allowing access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights management systems may be used to grant...
US20150067884 METHOD AND SYSTEM FOR PROTECTING SOFTWARE  
Provided is a method for protecting software. Software license information of an authorized user is used to generate an identifying code of software license. The identifying code of software...
US20130340092 SOFTWARE LICENCE CONTROL  
A system for software license control is described that is particular useful for use in a virtualized system, such as a cloud computing system. A module can be made available for use within the...
US20150193607 USER BASED LICENSING FOR APPLICATIONS  
A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a...
US20150193606 USER BASED LICENSING FOR APPLICATIONS  
A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a...
US20150193605 USER BASED LICENSING FOR APPLICATIONS  
A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a...
US20150186625 USER BASED LICENSING FOR APPLICATIONS  
A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a...
US20130198856 USER BASED LICENSING FOR APPLICATIONS  
A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a...
US20140359786 MATCHED CONTENT USE RESTRICTION SYSTEM  
A system may be configured to receive an upload, from a first user device, of a basis content item that includes first content; determine whether a first user of the first user device has a right...
US20110197253 Method and System of Responding to Buffer Overflow Vulnerabilities  
The application discloses a method of protecting a computer against buffer overflow attacks by creating a security policy based on information about the buffer overflow. This results in a dynamic...
US20120272332 SYSTEMS AND METHODS FOR DYNAMICALLY GENERATING A PRIVACY SUMMARY  
A system and method for is provided. The present invention provides a system and method for dynamically generating a privacy summary. A profile for a user is created. One or more privacy setting...
US20110099639 METHOD AND APPARATUS FOR PREVENTING AUTORUN OF PORTABLE USB STORAGE  
Provided is a technology which creates an autorun file that is used in autorun for preventing the autorun of a USB-based portable storage, thereby allowing an arbitrary user or worm virus not to...
US20140033324 SYSTEM AND METHOD FOR ADVANCED CONTROL TOOLS FOR ADMINISTRATORS IN A CLOUD-BASED SERVICE  
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of an enterprise account. The advanced...
US20120023590 Systems and Methods Providing a Separable Digital Rights Management Application  
Systems and methods providing content having digital rights management (DRM) applications separable from other authorization applications are provided. A system may include a distribution service...
US20140137264 METHOD AND APPARATUS FOR PRIVACY-ORIENTED CODE OPTIMIZATION  
Methods and apparatuses are provided for automatically optimizing application program code for minimized access to privacy data. A privacy-oriented code optimizing module process and/or facilitate...
US20130247217 ON-DEMAND SERVICE SECURITY SYSTEM AND METHOD FOR MANAGING A RISK OF ACCESS AS A CONDITION OF PERMITTING ACCESS TO THE ON-DEMAND SERVICE  
In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These...
US20130036476 RIGHTS-BASED SYSTEM  
A rights-based system is described in which vouchers are employed for creating, managing, distributing, and redeeming rights in digital contexts. A voucher is a digital, possession-based rights...
US20150178511 METHODS AND SYSTEMS FOR SHARING PSYCHOLOGICAL OR PHYSIOLOGICAL CONDITIONS OF A USER  
Methods and systems are disclosed herein for a media guidance application that responds to requests for biometric measurements of a user from various entities by referencing privacy settings...
US20150193626 METHOD AND SYSTEM FOR USER CONTENT VIEW PROTECTION  
A user content protection system and method that may include a content-sharing application associated with a user device and/or an access monitor configured to monitor access limitations placed on...
US20110066861 DIGITAL CONTENT MANAGEMENT AND DELIVERY  
Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one...
US20150074819 SHARING ARTIFACTS IN PERMISSION-PROTECTED ARCHIVES  
Among other things, we describe techniques for receiving a list of artifacts that are stored in an archive and are responsive to a search query issued by an entity. A set of artifacts are...
US20120198563 DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME  
Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion...
US20120198562 DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME  
Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion...
US20110137803 SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS  
The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital...
US20110113492 METHOD FOR CONTROLLING THE USE OF A CONDITIONAL ACCESS CONTENT AND MULTIMEDIA UNIT FOR IMPLEMENTING SAID METHOD  
The present invention concerns a method for controlling the use of a conditional access content (C0), said content being sent to a plurality of multimedia units (STB) connected to a management...
US20110191860 Midlet Signing and Revocatoin  
The present invention is related to a method of securing integrity and authenticating origin and privileges of a piece of code. According to the invention, a method of securing integrity and...
US20110161091 Systems and Methods for Connecting Entities Through Content  
Systems and methods for connecting entities through content. In one embodiment, a method for connecting entities through content can be provided. The method can include providing an interface for...
US20120317653 SYSTEM AND METHOD FOR UTILIZING CONTENT IN ACCORDANCE WITH USAGE RIGHTS  
Apparatus, method, and media for utilizing content. An exemplary method comprises storing, on a removable storage device, a description structure comprising one or more usage rights, storing, on a...
US20140373173 METHOD FOR REQUIRING USER ACTIONS FOR THE ACCESS OR DELIVERY OF ITEMS OF VALUE  
The present invention is directed to a method for providing items of value to consumers, and more specifically is a method that provisions access to items as the result of consumer action. Methods...
US20140229929 ACCESSING A PATCH FILE IN A SYSTEM CENTER CONFIGURATION MANAGER (SCCM) ENVIRONMENT  
A computer-implemented method for accessing a patch file for use in a system center configuration manager (SCCM) environment. The method includes accessing a patch file by a patch file agent,...
US20110035810 SYSTEM AND METHOD FOR GRANTING ACCES TO AN ITEM OR PERMISSION TO USE AN ITEM BASED ON CONFIGURABLE CONDITIONS  
A method, system, device, and computer program product for processing plural rights expressions associated with an item for use in a system for controlling use of the item in accordance with the...
US20150052618 EMERGENCY INFORMATION ACCESS ON PORTABLE ELECTRONIC DEVICES  
Improved techniques for facilitating emergency access to one or more contacts stored on a portable electronic device are disclosed. One or more contacts on the portable electronic device are...
US20120084869 CLAIMS-AWARE ROLE-BASED ACCESS CONTROL  
The formulation of a security token that specifies role information corresponding to one or more roles of a requesting entity that is to request an action to be performed on a resource. The...
US20120266257 SYSTEM AND METHOD FOR BLOCKING OBJECTIONABLE COMMUNICATIONS IN A SOCIAL NETWORK  
A system and method blocks objectionable communications in a social network. A first user of the social network determines when communications from a second user to the first user that are...
US20130007893 PREVENTING ON-LINE VIOLATIONS OF LEGAL REGULATIONS ON USERS OF A COMMUNICATION SYSTEM  
A system for preventing on-line violations of open meeting regulations and similar laws, in which one or more special classes of users are defined for an electronic communication system. The...