Hybrid contact mode scanning cantilever system
This invention addresses a contact mode hybrid scanning system (HSS), which can be used for measuring topography. The system consists of a cantilever or a...
Software installation system and method for copy protection
The present invention relates to a software installation system and a method for copy protection. The software installation system includes a support server in...
Associating code to a target through code inspection
Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time...
Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
Discovering network services
A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data...
Method for managing keys and/or rights objects
One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file...
Information processing apparatus, image forming apparatus, image forming
system, information processing method,...
An information processing apparatus determines whether an authentication portion on an image forming apparatus side can authenticate user authentication...
Method and apparatus for setting access restriction information
Access restriction information that an old storage device has is transferred to a new storage device. A management server 2200 obtains a port management TL 2445...
Method and apparatus for providing a border guard between security domains
The present invention discloses an apparatus and method for defining and enforcing rules of transition between two security domains, e.g., a transport domain...
Systematic approach to uncover GUI logic flaws
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is...
Mechanism for evaluating security risks
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the...
Protection against reflection distributed denial of service attacks
A method includes monitoring outgoing request packets transmitted by a node in a protected network over a link connecting the protected network to an external...
Method and apparatus for providing mobile honeypots
A method and apparatus for detecting an originator of traffic of interest is provided. One or more honeypots are established. Mobility is then provided to the...
Information processing apparatus, information processing method,
information providing medium, information...
An information processing apparatus, an information processing method, and an information providing medium are provided. Encrypted information, an encrypted...
Method and system for verifying identification of an electronic mail
A method and system for verifying identification of an electronic mail message. An electronic mail message including a signature and a key is received, the...
Systems and methods for correlating log messages into actionable security
incidents and managing human responses
Systems and methods for correlating log messages into actionable incidents. Some embodiments implement a method which includes comparing a plurality of...
Method, computer software, and system for providing end to end security
protection of an online transaction
A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an...
Preventing network traffic blocking during port-based authentication
A network device is allowed to transmit only authentication protocol traffic and no other traffic on an interface that is coupled to a port using port-based...
Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
Device independent authentication system and method
A system is disclosed which facilitates authentication processes with web-enabled wireless devices, including those that do not support the use of cookie files....
Identification and authentication system and method
An identification system 1 used for authenticating a user at a user station 30 requesting access to secure information at a base station 20, wherein the system...
Methods and systems for device-independent portable session
Aspects of the present invention relate to systems and methods for device-independent portable session synchronization between multiple devices connected to a...
System and method for flying squad re authentication of enterprise users
Enterprise users access several applications and services routinely to carry out their work-related activities on a day-to-day basis. These applications and...
Method and apparatus for authorizing a communication interface
A method and system for authorizing a communication interface between a first and second module comprises detecting a coupling between a first module and a...
System and method for a WPAN firewall
Systems and methodologies for implementing Wireless Personal Area Network (WPAN) security are provided herein. As disclosed herein, firewall functionality can...
Method and system for authenticating a party to a transaction
One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter,...
Conditional data delivery to remote devices
In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating...
System, method, and computer program product for identifying unwanted
activity utilizing a honeypot device...
A system, method, and computer program product are provided for identifying unwanted activity utilizing a honeypot accessible via virtual local area network...
System and method for managing feature enablement in an information
A system to manage a key license includes an information handling system having non-volatile memory accessible to a processor. The non-volatile memory stores...
Method and system for protecting a wireless network
A method and system for protecting a wireless network by establishing virtual walls to confine wireless connection to devices located within a three-dimensional...
Distribution of information protection policies to client machines
One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining...
Method and system for access control using resource filters
The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict...
Establishing secure communication sessions in a communication network
In one embodiment, a method for establishing a session between a first party and a second party in a communication network comprises issuing a request to...
Data rate compression device for cable television return path using
An apparatus for and a method of transmitting analog return signals in a digital return path of a cable television system (CATV) is disclosed. In one...
Seamless digital channel changing
Seamless channel changing in a digital-television-based entertainment network can be implemented, for example, by providing an intra frame to a client device...
Media transmission system and method
A media transmission system and method for the transmission of a desired one of a plurality of broadcast media channels to a remote client over a data...
Video program creation system, table providing device, terminal device,
terminal processing method, program,...
A video program production system of efficiently and flexibly producing a video program. For viewing, a composition table providing apparatus provides each...
Receiving device, server, television receiver, mobile terminal, system,
receiving method, information...
A receiving device receives broadcast, information, etc. in response to a user selection by manipulation, in order to present the broadcast, information, etc....
Method and apparatus for managing access plans
A system that incorporates teachings of the present disclosure may include, for example, a television having a controller to determine an access plan associated...
System and method for preprogrammed purchasing of television offered
In one embodiment, the present invention is an improved interactive television system and method for t-commerce. The data for upcoming products is pre-loaded...
Personal video recorder systems and methods
Systems and methods are disclosed for providing an interactive television system for recording television programming. The interactive television system may...
System and method for providing a unified programming guide
A method includes receiving data representative of a plurality of multimedia channels and associating channel numbers with at least a subset of the plurality of...
Apparatus and method for controlling screen layout in digital broadcast
receiver for receiving moving picture...
Disclosed is an apparatus and a method for screen display in a digital broadcast receiver for receiving moving picture contents. The method includes: receiving...
Information-processing system, information-processing device, and
In an information-processing system shown in FIG. 1, a server (106) for delivering remote-operation control information in accordance with an audio/video...
Content preference calculation method and content reception apparatus
A content preference degree calculating method and system that calculates preference degrees of viewers to contents such as broadcast programs in conformity...
System and method of providing television program sharing service
Disclosed is a system and method of providing a TV program sharing service that enables sharing of a TV program among EPG-based TV sets and/or set top boxes,...
Linked information system
A method of providing an interactive expert link within a linked information system configured to obtain a set of media content related to at least one tracked...
A receiver has a tuner for receiving a TV broadcast program and a modem for receiving an e-mail. Also, the receiver outputs a message if there exists any...
Methods and apparatus for presenting substitute content in an audio/video
stream using text data
Various embodiments of apparatus and/or methods are described for skipping, filtering and/or replacing content from an audio/video stream using text data...
System, method and computer program product for calculating the cost of an
A system, method and computer program product are provided for calculating the cost of an advertisement. Initially, data reflecting an advertisement and usage...