Match Document Document Title
9043887 Adaptive secondary authentication criteria based on account data  
An authentication challenge system for performing secondary authentication for an account associated with an online store is described. In one embodiment, the authentication challenge system...
9043915 System and method for detecting malicious executable files based on similarity of their resources  
Disclosed are systems, methods and computer program products for detection of malicious executable files based on the similarity of various types of extractable resources of the executable files....
9043934 System, method, and device for delivering communications and storing and delivering data  
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded...
9043632 Security enclave processor power control  
An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more...
9043870 Automated sign up based on existing online identity  
An automated system for signing up users invited to join a site based on their existing identity includes an invitation generator, an invite processor, a federated authentication module, a user...
9043928 Enabling web page tracking  
Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request...
9043926 Identifying primarily monosemous keywords to include in keyword lists for detection of domain-specific language  
Techniques are described for generating a monosemous (i.e., single sense) keyword list associated with a particular domain (e.g., a medical or financial domain) for document classification. An...
9043250 Privacy-preserving aggregated data mining  
An apparatus, system and method are introduced for preserving privacy of data in a dataset in a database with a number n of entries. In one embodiment, the apparatus includes memory including...
9043861 Method and system for managing security policies  
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input indicating a high-level security...
9042551 Electronically programmable fuse security encryption  
A semiconductor structure including a device configured to receive an input data-word. The device including a logic structure configured to generate an encrypted data-word by encrypting the input...
9043925 Method and apparatus for prevention of tampering and unauthorized extraction of information from microdevices  
A system for protection of information on a secured microdevice, including a control unit, an obliteration driver, and a circuit arranged to conduct the at least one pulse of electric current. The...
9043866 Security systems and methods for encoding and decoding digital content  
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as...
9043927 Method and apparatus for authenticating location-based services without compromising location privacy  
A method and an apparatus for authenticating location-based services without compromising location privacy, which comprises a comprehensive solution that preserves unconditional location privacy...
9037854 Privileged cryptographic services in a virtualized environment  
A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other...
9036172 Image forming apparatus, image forming method, and storage medium  
An image forming includes a predetermined-act acquisition unit, an output control unit, and an image forming unit. The predetermined-act acquisition unit is configured to obtain a predetermined...
9037848 Mobile IPTV service system using downloadable conditional access system and method thereof  
An apparatus and method associated with an Internet Protocol Television (IPTV) service in a mobile environment are provided. A streaming server may provide a mobile terminal with a mobile...
9038140 Integrated collaboration environment  
Described herein is a technology for facilitating the integration of a collaboration environment. In some implementations, an activity associated with a business object is accessed via a work...
9038190 Communication apparatus that communicate in different security levels and computer-readable media for controlling such apparatus  
A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first...
9037867 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
9038127 Physical interaction with virtual objects for DRM  
Technology is provided for transferring a right to a digital content item based on one or more physical actions detected in data captured by a see-through, augmented reality display device system....
9038192 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
9038191 Method and apparatus for providing DRM service  
Methods and apparatus are provided for providing a DRM service by a user terminal apparatus consuming DRM content in a service environment that provides the DRM content using a plurality of...
9038189 System and method for programming a trading system  
A trading system includes a server co-located at a financial exchange, a programmable logic device, a logic programmer, a user account that is accessible over a network connection a code storage...
9038188 Protecting data stored in a chip card interface device in the event of compromise  
A chip card interface device (CCID) is configured for protecting data stored at the CCID in the event of a compromise. The CCID has a housing and a compromise detection system including one or...
9037796 System and method for optimizing data remanence over hybrid disk clusters using various storage technologies  
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming...
9037855 Method for reproducing content data and method for generating thumbnail image  
A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information;...
9032536 System and method for incapacitating a hardware keylogger  
A system, device and method for incapacitating a keylogger. An inactivity of an input device may be detected. A flow of information from an input device to a computing device may be manipulated. A...
9032544 System and method for controlling communication of private information over a network  
A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information...
9031919 Content monitoring and compliance enforcement  
Responding to a use of controlled content is disclosed. Responding includes receiving an indication of the use of the controlled content including a context of the use of the controlled content,...
9032542 System and method for creating conditional immutable objects in a storage device  
A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the...
9032535 Storage device and method for providing a scalable content protection system  
A storage device and method for providing a scalable content protection system are disclosed. In one embodiment, a storage device is provided comprising a memory operative to store a plurality of...
9032546 Enforcing conditions of use associated with disparate data sets  
Techniques are described herein that are capable of enforcing conditions of use associated with disparate data sets. For example, content may be published. Conditions of use that are associated...
9032539 Automatic recovery of license key information  
A method, system, and computer program product to manage license key information in a system including a feature requiring the license key information are described. The method includes storing,...
9032537 Secure active element machine  
Based upon the principle of Turing incomputability, and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. This new computing machine is a...
9032221 Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system  
An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is...
9032525 System and method for below-operating system trapping of driver filter attachment  
A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a...
9031876 Managing keys for encrypted shared documents  
A system administrator, while logged into a system-administrator account, creates and configures a key-administrator account and a member account. A key administrator, while logged into said...
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9032538 Relay apparatus, program of relay apparatus and transmitting apparatus  
A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being...
9027147 Verification of serialization codes  
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to...
9026793 Method for installing rights object for content in memory card  
A method of receiving, by a memory card, a rights object (RO) from a rights issuer (RI) via a terminal. The method includes: receiving from the terminal, a provisioning setup request message...
9027149 Secret sharing system, apparatus, and storage medium  
According to one embodiment, a secret sharing system of an embodiment includes a secret sharing apparatus, a plurality of first storage server apparatuses, and at least one second storage server...
9027151 Inhibiting denial-of-service attacks using group controls  
A sandbox tool can cooperate with components of a secure operating system (OS) to create an isolated execution environment for accessing content without exposing other processes and resources of...
9027144 Semantic-based business events  
Semantic-based processing techniques are disclosed. Semantic processing of content data comprising a content item is performed. A semantic processing-triggered event is triggered based at least in...
9027136 Automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP...
9027161 System, method, and computer-readable recording medium for supporting license acquirement  
A system including a computer and having a part that stores identification data and status data in association with the identification data, a part that receives a request to acquire a license...
9027150 System and method of integrating modules for execution on a computing device and controlling during runtime an ability of a first module to access a service provided by a second module  
A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A...
9027143 System and method for multipronged authentication  
Various embodiments of a system and method for multipronged authentication are described. Embodiments may include a client system that implements a runtime component configured to consume content....
9026507 Methods and systems for analyzing data related to possible online fraud  
Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine...
9027126 Method and apparatus for baiting phishing websites  
A cyber fraud phish baiting system for baiting a phishing website is disclosed. The cyber fraud phish baiting system is configured to store a plurality of URLs in a database and enter each of the...