AcclaimIP-ad

Match Document Document Title
9043934 System, method, and device for delivering communications and storing and delivering data  
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded...
9041812 Automated authorization to access surveillance video based on pre-specified events  
Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a...
9043928 Enabling web page tracking  
Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request...
9043400 Instantaneous recommendation of social interactions in a social networking system  
As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is...
9043944 System and methodology for selectively controlling the transmission of content  
According to one aspect of the present invention, a system and methodology is provided which controls whether or not content is permitted to be transmitted from a source device depending upon the...
9043927 Method and apparatus for authenticating location-based services without compromising location privacy  
A method and an apparatus for authenticating location-based services without compromising location privacy, which comprises a comprehensive solution that preserves unconditional location privacy...
9037656 Method and system for facilitating interaction with multiple content provider websites  
A method and system for facilitating interaction between an electronic device and a plurality of content provider websites are disclosed. In one embodiment, the method includes receiving at a...
9037867 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
9038192 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
9038191 Method and apparatus for providing DRM service  
Methods and apparatus are provided for providing a DRM service by a user terminal apparatus consuming DRM content in a service environment that provides the DRM content using a plurality of...
9037823 Protecting IAT/EAT hooks from rootkit attacks using new CPU assists  
The present disclosure provides systems and methods for hardware-enforced protection from malicious software. A device may include at least a security validator module and a security initiator...
9032544 System and method for controlling communication of private information over a network  
A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information...
9032214 System and method for providing an image to an information handling system  
A system and method for providing an image to an information handling system is disclosed. A method for delivering an image may include booting an information handling system with a provisioning...
9032035 Apparatus, and associated method, for alerting user of communication device of entries on a mail message distribution list  
Apparatus, and an associated method, for alerting a respondent that generates a reply to a received mail message of addressing of the reply message to a non-secure address. A detector detects...
9032547 Provisioning vehicle based digital rights management for media delivered via phone  
Embodiments relate generally to systems and methods for provisioning vehicle based digital rights management (DRM) for content delivered through a brought-in mobile device. Content may be...
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9027153 Operating a computer with a touchscreen  
Disclosed are computers and methods of operating those computers. In the methods, a computer in a touch lock state displays a lock screen image showing a cover layer superimposed over, and...
9027100 Client-side ad caching for lower ad serving latency  
Advertisements are served over the Internet to clients on demand. A client module executing on a client device fetches advertisements over the Internet from an advertisement server. The client...
9026786 System for ensuring that promises are kept in an anonymous system  
Described is a system, method, and computer program product for ensuring that promises are kept in an anonymous system. A verifiable interaction is established between at least two users. Each...
9027161 System, method, and computer-readable recording medium for supporting license acquirement  
A system including a computer and having a part that stores identification data and status data in association with the identification data, a part that receives a request to acquire a license...
9026580 Validation pipeline  
Techniques for configuring validation rules in a client-server architecture, and for enforcing such validation rules are provided. A developer is enabled to configure a display screen for an...
9027160 Access management system and access management method  
A secure element (SE) unit 102 holding service data used by an application is provided in a UIM card 100. Thus, when the user identify module (UIM) card 100 is transferred between portable...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021565 Authentication techniques utilizing a computing device  
A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a...
9021546 Systems and methods for workload security in virtual data centers  
A computer-implemented method for workload security in virtual data centers may include (1) identifying a virtual data center that hosts a plurality of workloads sharing a common computing...
9021605 Method and system for protecting sensitive data in a program  
To protect sensitive data in program code, a method includes providing a programming interface with a capability of allocating a protected region of memory which can only be accessed by authorized...
9021609 Apparatus and method for verifying integrity of firmware of embedded system  
An apparatus and method for verifying the integrity of firmware of an embedded system is provided. The apparatus for verifying the integrity of firmware of an embedded system includes a target...
9021559 Server-based architecture for securely providing multi-domain applications  
A Multilevel Security (MLS) server provides MLS functionality to single-level applications running on a remote Multiple Independent Level Security (MILS) or MLS client device. More specifically,...
9015856 Mobile-device user authentication  
In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second...
9015860 Behavioral fingerprinting via derived personal relation  
Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one...
9015826 Mobile platform security apparatus and method  
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third...
9015809 Establishing connectivity between an enterprise security perimeter of a device and an enterprise  
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security...
9009809 Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM  
A computer or microchip including a system BIOS located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall,...
9009856 Protected application programming interfaces  
Mechanisms are provided to allow particular parties and applications access to protected application programming interfaces (APIs) without the use of security domains. Trusted parties and...
9009859 Address exchange system and methods  
The present disclosure provides systems and methods for an address exchange system including a controller configured to provide an API configured to receive an identifier from a user and further...
9009785 System and method for implementing adaptive security zones  
A system for managing adaptive security zones in complex business operations, comprising a rules engine adapted to receive events from a plurality of event sources and a security manager coupled...
9009857 Temporally controlling access to software assets on user devices  
The availability of software assets on electronic devices, such as mobile devices of users, is restricted based on the time as determined by a managing server. An application that runs on the...
9009855 Generating developer license to execute developer application  
One or more techniques and/or systems are disclosed for generating a developer license that allows a developer application to run on developer machine. A user identification (userID) used to...
9009792 Method and apparatus for automatically configuring a secure wireless connection  
Methods, apparatus, and other embodiments associated with automatically configuring a secure wireless connection are described. According to one embodiment, an apparatus includes a security logic...
9009840 Validating machine images  
In a resource-on-demand environment, virtual machine images are validated before use. A provider or source of a virtual machine image may generate a manifest, indicating executable components of...
9009243 Tracking usage of and sharing data between mobile device applications  
Described herein are methods and systems for tracking usage of and sharing data between mobile device applications. A mobile device receives a first application to be installed on the mobile...
9009858 Systems and methods for providing and managing distributed enclaves  
A method for operating a distributed data management and control enclave comprises providing a policy that identifies a set of data to be managed and controlled. The policy further identifies...
9003490 Using entitlement certificates to manage product assets  
A server receives a consumer request from a client to access a product repository that is coupled to the server. The consumer request comprises an entitlement certificate and a uniform resource...
9003510 Computer or microchip with a secure system bios having a separate private network connection to a separate private network  
A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an...
9003552 Online privacy management  
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user...
9003558 Allowing degraded play of protected content using scalable codecs when key/license is not obtained  
Embodiments are directed towards enabling a portion of a protected content stream to be played in a degraded quality or experience at a client device when a key and/or license for some other...
8996873 Secure session capability using public-key cryptography without access to the private key  
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake...
8997242 Methods and apparatus for software license management  
Systems and techniques for managing software licensing are described. When a computing system service request is made, the request is intercepted and software information that may be more or less...
8994978 Image processing apparatus that facilitates printing of password-protected documents, and corresponding method for forming images  
An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an...
8995661 Information provision system, provision information copying device, user terminal device and user management device  
A content encryption device generates encrypted content and an encrypted content copying device copies the encrypted content on an information storage medium. The storage medium is sold at a...