Patents

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,176,568 Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence...
US-8,176,567 Apparatus and method to limit access to selected sub-program in a software system
A method includes receiving at a sub-program a request from an external entity the request comprising at least one parameter and a return address, utilizing the...
US-8,176,566 Information distribution device, method and storage medium storing program, and data signal for information...
An information distribution device including a storage section, a reception section, a selection section and a distribution section. The storage section stores,...
US-8,176,565 Information processing apparatus, information processing method, and computer program
An information processing apparatus is provided. The information processing apparatus includes a cryptographic processor configured to generate encrypted data...
US-8,176,564 Special PC mode entered upon detection of undesired state
A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing...
US-8,176,563 Data security system and method with editor
The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in...
US-8,176,562 Privacy protection during remote administration
A remote access manager protects the privacy of identified local file system content while a local computer is being accessed by a remote administrator. A local...
US-8,176,561 Assessing network security risk using best practices
A method and appertaining system for implementing the method are provided that utilize predefined Best Practice Templates that are rules/criteria for assessing...
US-8,176,560 Evaluation of tamper resistant software system implementations
According to one embodiment of the present invention, a method for evaluating a software system includes defining a rating of the tamper resistance of a...
US-8,176,559 Obfuscated malware detection
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obfuscated malware. In one aspect, a method includes...
US-8,176,558 Anti-virus method, computer, and recording medium
In one computer system, causing the second virtual machine, which executes antivirus software for detecting and removing the virus, to monitor at least one...
US-8,176,557 Remote collection of computer forensic evidence
The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence...
US-8,176,556 Methods and systems for tracing web-based attacks
A computer-implemented method for tracing attacks. The method may include identifying a first website and determining that the first website loads an attack...
US-8,176,555 Systems and methods for detecting malicious processes by analyzing process names and process characteristics
A computer-implemented method for detecting a malicious process using file-name heuristics may comprise: 1) identifying a process, 2) identifying a process name...
US-8,176,554 Malware detection through symbol whitelisting
A security module identifies symbols within an executable file. The security module compares these identified symbols to a set of symbols expected to be present...
US-8,176,553 Secure gateway with firewall and intrusion detection capabilities
A system, method and computer program product are provided. Initially, data is received from a remote source which is destined for a target. A portion of such...
US-8,176,552 Computer system, computer program product and method for assessing a profile of a computer system
A method for maintaining a computer system on the basis of an access profile and a change profile is disclosed. The computer system includes at least one...
US-8,176,551 Detection of observer programs and countermeasures against observer programs
A system for detecting an observing program on a computer system is disclosed as including accessing instructions that access observer data. The observer data...
US-8,176,550 Authentication-capable apparatus and security system
The place where a user performs personal authentication includes a room into which entry is authenticated, and an apparatus for use of which authentication...
US-8,176,549 Unit using OS and image forming apparatus using the same
A chip mountable on a customer replaceable unit monitory (CRUM) unit used in an image forming job includes a central processing unit (CPU) to perform...
US-8,176,548 Protection system for display apparatus and method thereof
A protection system for a display apparatus and a method thereof are provided. The protection system includes an electronic key and a protection module. The...
US-8,176,547 System and method for controlling user access to an electronic device
A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a...
US-8,176,546 Time information management system
A rights validator system for controlling access to content, the system including a query processor to receive a rights query and to provide a result to the...
US-8,176,545 Integrated policy checking system and method
A system and method are provided for validating a security service associated with packets communicated on a network. A hash of a security service associated...
US-8,176,544 Network security system having a device profiler communicatively coupled to a traffic monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess...
US-8,176,543 Enabling network communication from role based authentication
Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive...
US-8,176,542 Validating the origin of web content
Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web...
US-8,176,541 Leveraging a persistent connection to access a secured service
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to...
US-8,176,540 Resource based non-interactive entity application proxy method and system
A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The...
US-8,176,539 Methods for protecting against cookie-poisoning attacks in networked-communication applications
The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods...
US-8,176,538 Information processing system, recording medium storing control program, and computer data signal embodied in a...
An information processing system, which includes: an information distribution server; a client apparatus; and a plurality of service providing servers that...
US-8,176,537 Image formation apparatus, function extension method, and a computer readable storage medium having function...
An image formation apparatus: previously stores first information allowing functions that a plurality of users are authorized to use, respectively, to be...
US-8,176,536 Network systems and methods for providing guest access
The present disclosure generally pertains to routers for providing guest access to networks. An integrated router in one exemplary embodiment comprises at least...
US-8,176,535 Information processing system, information processing method, and computer readable medium
An information processing system includes: an organization information storage that stores organization information which defines an organization including...
US-8,176,534 Method and apparatus for provisioning a device to access digital rights management (DRM) services in a...
A method and apparatus are provided for enabling a Universal Plug and Play (UPnP) device to be automatically provisioned to access services without the need for...
US-8,176,533 Complementary client and user authentication scheme
An authentication mechanism is provided to authenticate both client and user of a portable computing device when the user causes a client to request a protected...
US-8,176,532 Secure access point for scada devices
A programmable control unit interacts with a physical system. The physical system has a public network interface for communicating with remote computer systems....
US-8,176,531 System for eliminating unauthorized electronic mail
A system for eliminating unauthorized email sent to a user on a network employs an email-receiving server connected between the network and the user's email...
US-8,176,530 Preventing a non-head end based service provider from sending media to a media processing system
Systems and methods that prevent unauthorized access in a communications network are provided. In one embodiment, a system that prevents unauthorized access to...
US-8,176,529 Apparatus and method for controlling devices in one or more home networks
An apparatus for controlling devices in one or more home networks is provided. The apparatus includes an authentication unit, a control message generation unit,...
US-8,176,527 Correlation engine with support for time-based rules
A rules engine with support for time-based rules is disclosed. A method performed by the rules engine, comprises receiving security events generated by a number...
US-8,176,526 Configurable redundant security device failover
Techniques are described for managing failover in redundant network devices. In particular, each device in a set of redundant network devices includes redundant...
US-8,176,525 Method and system for trusted contextual communications
This invention provides a method, system and apparatus for allowing media context sensitive SIP signaling exchange (such as voice) and call establishment while...
US-8,176,524 System and method for wireless communication of video data having partial data compression
A system and method for wireless communication of video data are disclosed. One embodiment of the system transmits partially compressed video data from a...
US-8,176,523 Human factors based video compression
Systems and method to compress digital video based on human factors expressed as a desirability score are provided. A particular method includes selecting a...
US-8,176,522 Method for recovering a video-on-demand session
The present invention relates to a method for recovering a downloading section that has been interrupted, in a device comprising an interface with a network...
US-8,176,521 Client server based interactive television program guide system with remote server recording
An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for...
US-8,176,520 Communication system and method for a mobile platform
A communication system is provided for use with a mobile platform. The communication system can be configured to store video data on-board to allow pseudo-live...
US-8,176,519 Method and system for transmitting plural data in portable broadcasting service
A method and system for transmitting a plurality of ESG data to an MS over a communication network in a DVB-H CBMS portable broadcasting service are provided....
US-8,176,518 Systems and methods for providing fantasy sports contests based on subevents
Fantasy sports contests based on segments of a single sports event. A segment or subevent may be a portion of a single sports event. The users choose a roster...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →