Match
|
Document |
Document Title |
|
9141822 |
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific... |
|
9043595 |
Selective shredding in a deduplication system
Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a... |
|
9043588 |
Method and apparatus for accelerating connections in a cloud network
Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission... |
|
9038170 |
Logging access system events
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the... |
|
9038191 |
Method and apparatus for providing DRM service
Methods and apparatus are provided for providing a DRM service by a user terminal apparatus consuming DRM content in a service environment that provides the DRM content using a plurality of... |
|
9032542 |
System and method for creating conditional immutable objects in a storage device
A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the... |
|
9021557 |
System and method for security using a sibling smart card
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this... |
|
9020890 |
Smart archiving and data previewing for mobile devices
Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native... |
|
9021258 |
Method and device for transcoding during an encryption-based access check on a database
A device for transcoding during an encryption-based access check of a client device to a databank, which provides a data set in an encrypted area, has: a unit for assigning a specific access level... |
|
9021260 |
Malware data item analysis
Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware... |
|
9021545 |
Method and system to secure a computing device
In one embodiment, a first instruction prescribing a setting for a feature is defined. A second instruction prescribing a first action is defined. A third instruction prescribing a second action... |
|
9021259 |
Encrypted database system, client terminal, encrypted database server, natural joining method, and program
A client terminal is provided with a column encryption unit that, from an encryption key, a table identifier, and a column identifier, generates a column private key, a column public key, and a... |
|
9021593 |
XSS detection method and device
The present invention discloses a XSS detection method for detecting the XSS vulnerabilities in a web page, comprising for each parameter-value pair in a set of parameter-value pairs that can be... |
|
9014372 |
Video file encryption and decryption method, device, and mobile terminal
This discloses a video file encryption and decryption method, device, and mobile terminal. The encryption method can include: obtaining a to-be-encrypted video file and an encryption key,... |
|
9015797 |
System and method of isolation of resources using resource manager
Methods, systems, and computer program are provided for managing access to computer resources by receiving a request, from a client, for performing one or more operations on a computer resource;... |
|
9015858 |
Graphical user interface for seamless secure private collaboration
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored... |
|
9015844 |
Techniques for web application vulnerability scanning
Techniques for web application vulnerability scanning are disclosed. In one particular embodiment, the techniques may be realized as a method for web application vulnerability scanning comprising... |
|
9015472 |
Marking electronic messages to indicate human origination
Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message... |
|
9015791 |
Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same
A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and... |
|
9015826 |
Mobile platform security apparatus and method
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third... |
|
RE45473 |
Copy protection using detailed copy control information
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified... |
|
9009471 |
System and method for multi-layered sensitive data protection in a virtual computing environment
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine... |
|
9009469 |
Systems and methods for securing data in a cloud computing environment using in-memory techniques and secret key encryption
In one embodiment, a computer-implemented method comprises determining, by a controller, whether a first data store is in an initialization mode. The first data store stores client data. A second... |
|
9003183 |
Virtual storage system and file encryption methods
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic documents to be uploaded into a... |
|
9003184 |
Computing device and method for protecting software of the computing device
In a method for protecting software of a computing device, a hypertext preprocessor (PHP) software program of the computing device is encrypted using an encryption rule to obtain an encrypted... |
|
9003517 |
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in... |
|
8996884 |
High privacy of file synchronization with sharing functionality
Systems and methods for providing privacy of file synchronization with sharing functionality are presented. In embodiments, a file synchronization system comprises one or more folders associated... |
|
8997185 |
Encryption sentinel system and method
An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server... |
|
8994978 |
Image processing apparatus that facilitates printing of password-protected documents, and corresponding method for forming images
An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an... |
|
8996872 |
Contactless seed programming method and system thereof
The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains... |
|
8989388 |
Distribution of storage area network encryption keys across data centers
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another data center. A request is received to... |
|
8990559 |
Automating the creation and maintenance of policy compliant environments
Embodiments of the present invention provide for a method, system, and apparatus for creating a policy compliant environment on a computer. In an embodiment of the invention, an encrypted file can... |
|
8990585 |
Time based dispersed storage access
A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues... |
|
8990588 |
Storage system, storage control apparatus, and storage control method
A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the... |
|
8990882 |
Pre-calculating and updating data loss prevention (DLP) policies prior to distribution of sensitive information
A method and apparatus submitting information to be protected before permitting an outbound data transfer with the information is described. A DLP agent, incorporating a DLP submission tool,... |
|
8990558 |
Securing information in a cloud computing system
The method and system for secure data (information) inside a cloud computing system, allow data to be encrypted everywhere in the cloud on storage devices and in communication lines so that only... |
|
8990954 |
Distributed lock manager for file system objects in a shared file system
A method and apparatus are provided for mediating access to a shared object in a naive computer system having a shared-nothing operating system layered on a shared file system. At least one... |
|
8990921 |
Apparatus for processing with a secure system manager
Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of non-secure executable instructions on... |
|
8984629 |
Apparatus and method for preemptively protecting against malicious code by selective virtualization
In an apparatus and method for protecting resources of a computing system from a malicious code by selective virtualization, at least a part of the resources is classified as compulsory resources... |
|
8984652 |
Transfer of digital rights management information
A device including a communication interface and processing logic is provided. The communication interface may receive digital rights management security information and content from a source... |
|
8983074 |
Input content data managing system and method of managing input content data
An input content data managing system, includes a first electronic storing apparatus that stores encoded content data generated by encoding content data with a cryptographic key; a electronic... |
|
8978108 |
Method, device, and system for service presentation
A method, device and system for service presentation, which includes: receiving a presentation request message; acquiring presentation information from the presentation request message; storing... |
|
8977866 |
Security mechanism for increased personal data protection
Apparatus, systems, and methods provide a mechanism to enhance the management of data security in a system for users of the systems. Various embodiments include apparatus and methods to manage... |
|
8977756 |
SWAN: achieving high utilization in networks
Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer... |
|
8978140 |
System and method of analyzing web content
A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and... |
|
8978104 |
Access control center workflow and approval
Methods and systems are disclosed for providing indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control... |
|
8972723 |
Storage device and method for providing a partially-encrypted content file to a host device
A storage device and method for providing a partially-encrypted content file to a host device are provided. In one embodiment, the storage device retrieves a content file from memory in the... |
|
8973142 |
Compromised insider honey pots using reverse honey tokens
According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain unauthorized access to enterprise data provided... |
|
8972724 |
Digital content management system, digital watermark embedding device, digital watermark detection device, program, and digital content management method
A digital content management system (1) includes a digital watermark embedding device (100) which generates a file having a file name used as a digital watermark, and embeds it into a digital... |
|
8965926 |
Techniques for managing persistent document collections
Various technologies and techniques are disclosed for creating and managing persistent document collections. A data store is used for storing one or more persistent document collections. A content... |