Mechanically-coupled tuning fork-scanning probe vibrating system
Provided is a mechanically-coupled tuning fork-scanning probe vibrating system, the system including: a tuning fork vibrating due to an AC voltage applied...
Method and apparatus for detection of tampering attacks
A method for detecting an attempted attack on a security system. In one preferred embodiment of the present invention, the method includes the step of...
Method and system for preventing unauthorized reproduction of electronic
A method for selectively controlling access to electronic media disposed on a media storage device according to one embodiment is described. The method...
Fuzzy multi-level security
An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for...
System for a digital content distributing service and the method thereof
A method and system for a digital content distributing service, wherein the system comprises a central broadcast station, an audit trails unit, and a...
Using fuzzy classification models to perform matching operations in a web
application security scanner
A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending...
Management of computer security events across distributed systems
A computer receives a system event initiated by an initiating client associated with a user. The system event comprises a plurality of data elements associated...
Method for mitigating false positive generation in antivirus software
A method for mitigating false-positives as detected by antivirus software comprising accessing an operating system file that has been identified as malware;...
Wireless intrusion prevention system and method
A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors...
Security for scanning objects
Scanning is disclosed. A system is monitored to detect object events, and it is determined whether an object event requires an update to a scan list. If an...
Systems and methods for detecting a network sniffer
A device (110) records traffic in a communications network. The device (110) monitors traffic received by the device (110) and determines whether the received...
Apparatus for filtering server responses
A data processing apparatus, comprising at least one processor and a traffic monitor comprising logic which, when executed by the processor, causes the...
Selection of remotely located servers for computer security operations
A client computer may be configured to perform computer security operation services, such as malicious code scanning and protection against online threats,...
Inspection of downloadable contents for malicious codes
A web page available for download from a web server computer may include a reference to a web widget. When the web page is received in a client computer, the...
Byte-distribution analysis of file security
A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for...
With regard to data, stored in mobile phone 40, whose a security level is high and contents whose copyrights are protected, mobile phone 40 encapsulates data...
Information processing apparatus and security protection method
According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a...
Method and apparatus for preventing loading and execution of rogue
operating systems in a logical partitioned...
A method, apparatus, and computer instructions for managing operating systems. A request from an operating system is received in the multi-partitioned data...
Disconnected credential validation using pre-fetched service tickets
One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate...
One time password
A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value...
A system enabling an application desiring access to a resource addressable by a URI to produce a response to an authentication challenge to a request to access...
Provisioning of digital identity representations
A system and method for provisioning digital identity representations ("DIRs") uses various techniques and structures to ease administration, increase accuracy,...
Authentication method and system
An authentication method and system. A computing system generates an authentication table associated with a user. The computing system receives first...
Predictive method for multi-party strengthening of authentication
credentials with non-real time synchronization
A method and system for strengthening authentication credentials for accessing any number of applications across multiple access interfaces and across multiple...
Method, apparatus and computer program product providing bootstrapping
mechanism selection in generic...
In one exemplary and non-limiting aspect thereof this invention provides a method to execute a bootstrapping procedure between a node, such as a MN, and a...
Verifying access to a network account over multiple user communication
portals based on security criteria
A computer-implemented system and method for verifying access to a network account are provided. A first user communication portal is associated with a user...
Secure mobile platform system
The present invention is directed toward a secure platform which enables mobile devices, such as a cell phones, smartphones, or PDAs, to have relationships with...
Method and system for securing a commercial grid network
A method for securing a commercial grid network involves receiving a lease request from a client to lease a computing resource selected from multiple computing...
Method and system for implementing mandatory file access control in native
discretionary access control...
A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method...
Security extensions using at least a portion of layer 2 information or
bits in the place of layer 2 information
Using information applied to a packet at an ingress port of a network for enhancing security such as user authentication for example. Such authentication may be...
System and method for preservation of digital records
A method for digitally preserving an electronic record includes defining a preservation and service plan for the electronic record in a model, the preservation...
Method for restricting the use of an application program, system for
authenticating the user of a measuring...
A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement...
Resource-reordered remediation of malware threats
Systems and methods that mitigate affects of malware and facilitate remediation processes. An analysis engine generates a list of actions for resources...
Chaining information card selectors
A machine includes card stores to store information cards. For each card store, one or more card selectors can be provided. When performing a transaction...
System and method for recording and time-shifting programming in a
television distribution system with limited...
Various embodiments of the disclosed subject matter provide methods and systems to record broadcast programming for at least one television channel for a period...
HDTV subscriber verification
A system for providing television (TV) service including high definition television (HDTV) service, and for providing verification that a subscriber has...
Television converter device including an internet protocol interface
A television converter device is provided which includes a channel selector and an Internet Protocol (IP) interface. The channel selector is configured to...
Operating method of contents on demand system
A method of effectively operating a Content-On-Demand (COD) system is disclosed. Requests for content are received from COD clients. If the requested content...
Apparatus, and associated method, for facilitating distribution of
Apparatus, and an associated method, for facilitating formation of content streams formed of content for distribution to content consumers. A request detector...
Automated event content processing method and system
A method for organizing event content in the form of electronic signals is provided. In accordance with this method an event profile is determined. The event...
System and method for transmitting an animated figure
A system and a method for transmitting an animated figure between a transmitter and a receiver receives frameworks of animated figures over a communication...
Digital broadcasting system and method of processing data in digital
A digital broadcast receiver and a control method thereof are disclosed. The control method of the digital broadcast receiver includes receiving a broadcast...
Database management system and method for electronic program guide and
television channel lineup organization
Channel lineup information in a television system is efficiently managed with an internal electronic program guide manager (IEM). The IEM creates and maintains...
Client-server electronic program guide
A client-server interactive television program guide system is provided. An interactive television program guide client is implemented on user television...
Network-based service to provide on-demand video summaries of television
A network-based device allows customers to receive television programming and to view summaries of the programming. A method of providing the summaries...
Television program guide with a digital storage device
An interactive television program guide system with digital storage is provided. The program guide gives users the ability to select a program for recording...
Systems and methods for providing remote access to interactive media
Methods and systems for remotely accessing user equipment implementing an interactive media guidance application are provided. In particular, a method includes...
User interface for television schedule system
Screen (10) for a user interface of a television schedule system and process consists of an array (24) of irregular cells (26), which vary in length,...
Grouping advertisement subavails
Method and system for creating one or more advertising avail sections (subavails) and thereupon aggregating the subavails to form one or more groups of...
Methods, apparatus, and systems for managing the insertion of overlay
content into a video signal
Methods, apparatus, and systems for managing the insertion of overlay content into a video signal are provided. A video signal is received from a video source....