Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 110268. Отображено 100.
05-01-2012 дата публикации

Approach For Securely Printing Electronic Documents

Номер: US20120002234A1
Автор: Sam Wang, Seiichi Katano
Принадлежит: Individual

An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct printing of electronic documents, secure direct printing of electronic documents with remote user authentication and secure printing of electronic documents with remote data management. The particular information provided on the portable media varies, depending upon the implementation. Furthermore, the approach provides varying degrees of security and may be used in conjunction with conventional printing of electronic documents.

Подробнее
11-10-2018 дата публикации

Система удаления остаточной информации из памяти терминалов и серверов многоточечной конференцсвязи

Номер: RU0000184009U1

Полезная модель относится к области связи, в частности к системам для реализации конференцсвязи, и предназначена для обеспечения защищенности систем видео- и аудиоконференцсвязи от возможных утечек остаточной информации при снижении аппаратурных затрат и повышении надежности удаления остаточной информации. Предложенная система удаления остаточной информации из памяти терминалов и серверов многоточечной конференцсвязи состоит из блока фиксации запоминающих устройств, блока определения контрольной суммы файлов, блока коммутации, блока хранения контрольной суммы файлов, блока поддержки многоточечной конференцсвязи, блока перезагрузки, блока сравнения контрольных сумм файлов, блока выбора запоминающего устройства, блока сигнализации, блока выбора файла, блока удаления и перезаписи файла. Технический результат заключается в ликвидации аппаратурной избыточности и повышении надежности обеспечения защищенности систем видео- и аудиоконференцсвязи за счет сокращения количества однотипных устройств и многократной проверки наличия и последующего гарантированного удаления остаточной информации в оперативной и энергонезависимой памяти терминалов и серверов многоточечной конференцсвязи после каждого сеанса видео- и аудиоконференцсвязи. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 184 009 U1 (51) МПК G06F 21/64 (2013.01) H04L 12/955 (2013.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ (52) СПК G06F 21/64 (2006.01); H04L 12/00 (2006.01) (21)(22) Заявка: 2018120289, 31.05.2018 (24) Дата начала отсчета срока действия патента: Дата регистрации: Приоритет(ы): (22) Дата подачи заявки: 31.05.2018 (45) Опубликовано: 11.10.2018 Бюл. № 29 1 8 4 0 0 9 R U (56) Список документов, цитированных в отчете о поиске: RU 141240 U1, 27.05.2014. RU 2459371 C2, 20.08.2012. RU 2014117177 A, 10.11.2015. US 2014/0046912 A1, 13.02.2014. (54) Система удаления остаточной информации из памяти терминалов и серверов многоточечной конференцсвязи (57) Реферат: Полезная ...

Подробнее
12-01-2012 дата публикации

Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus

Номер: US20120011369A1
Принадлежит: Toshiba Corp

A digital signature generation apparatus includes memory to store finite field F q and section D(u x (s, t), u y (s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold A(x, y, s, t) which is expressed by x-coordinate, y-coordinate, parameter s, and parameter t and is defined on finite field Fq, x-coordinate and y-coordinate of section being expressed by functions of parameter s and parameter t, calculates hash value of message m, generates hash value polynomial by embedding hash value in 1-variable polynomial h(t) defined on finite field F q , and generates digital signature D s (U x (t), U y (t), t) which is curve on section, the x-coordinate and y-coordinate of curve being expressed by functions of parameter t, by substituting hash value polynomial in parameter s of section.

Подробнее
19-01-2012 дата публикации

Perimeter encryption method and system

Номер: US20120017078A1
Принадлежит: Computer Associates Think Inc

A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain.

Подробнее
19-01-2012 дата публикации

Secure Acknowledgment Device For One-Way Data Transfer System

Номер: US20120017079A1
Принадлежит: OWL Computing Technologies Inc

An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash number calculator for hashing the message from the inlet interface, an outlet interface for sending the hashed message to the second node, a first one-way data link for unidirectional transfer from the inlet interface to the hash number calculator, and a second one-way data link for unidirectional transfer from the hash number calculator to the outlet interface, is provided. While the apparatus is capable of bidirectional communications with either or both of the first and second nodes through the respective interfaces, the unidirectionality of data flow through the apparatus is strictly enforced by the hardware of the apparatus. The apparatus provides a secure mechanism and communication channel for relaying hashed acknowledgment messages from a receive node to a send node to inform the status of data transfer from the send node to the receive node across a one-way data link. The apparatus may be further implemented with the capability of comparing hashed messages from the two nodes.

Подробнее
09-02-2012 дата публикации

Data relay apparatus, print control method, and computer program product

Номер: US20120033244A1
Автор: Akira Kohno
Принадлежит: Ricoh Co Ltd

A data relay apparatus includes a connecting unit that connects an information processing apparatus to an image forming apparatus; a print control unit that receives output data from the information processing apparatus, produces print data based on the output data, and outputs the print data to the image forming apparatus; an information extracting unit that retrieves, from the output data, trigger data instructing execution of processing and extracts information within a preset data range subsequent to the trigger data; a setting unit that sets the data range according to an instruction from outside; a processing unit that executes the processing based on the trigger data and the information within the data range; a log-information generating unit that generates log information about the processing executed by the processing unit; and a log-information output unit that outputs the log information.

Подробнее
09-02-2012 дата публикации

Decryption and print flow control system and method

Номер: US20120036348A1
Принадлежит: Xerox Corp

A method and system for determining a data file's security classification, special handling instructions, and disposition, with the additional option of subsequently adding material to the print image contained within the document, is disclosed. The method and system provide control of sensitive information contained in print documents, wherein a first file is encrypted. A second document accompanies the first document containing information for decrypting the first document, control redaction, and/or provide for addition of content or restrictions as to which rendering device the first document may print on. The rendering device, upon receipt of both first and second documents, communicates with a host computer that determines the first document's classification and disposition. The host computer then processes the second document, sending decryption information over a secure line from the second document to the rendering device to enable decryption and modification of the first document, followed by rendering.

Подробнее
16-02-2012 дата публикации

Image forming apparatus, information processing apparatus, image forming system, and image forming method

Номер: US20120038941A1
Автор: Shunichi Megawa
Принадлежит: Toshiba Corp, Toshiba TEC Corp

According to one embodiment, an image forming apparatus includes: an input section configured to input information to be printed; a first printing section configured to perform printing with a toner unerasable by an erasing device; a second printing section configured to perform printing with a toner erasable by the erasing device; and a control section configured to control the image forming apparatus to print, using the first printing section, at least a keyword stored in a storing section in advance among the information to be printed input by the input section and control the image forming apparatus to print, using the second printing section, information not printed by the first printing section.

Подробнее
01-03-2012 дата публикации

System, method and computer program product for portal user data access in a multi-tenant on-demand database system

Номер: US20120054243A1
Принадлежит: Salesforce com Inc

In accordance with embodiments, there are provided mechanisms and methods for portal user data access in a multi-tenant on-demand database system. These mechanisms and methods for portal user data access in a multi-tenant on-demand database system can enable embodiments to provide portal-specific user accounts to the multi-tenant on-demand database system which have reduced configuration requirements than users directly accessing the multi-tenant on-demand database system. The ability of embodiments to provide portal-specific user accounts can reduce processing requirements of the database system.

Подробнее
01-03-2012 дата публикации

Method and apparatus determining certificate revocation status

Номер: US20120054487A1
Принадлежит: Cisco Technology Inc

A method is disclosed for obtaining certificate revocation information from a server, obtaining from a client a request for a revocation status of a certificate and notifying the client when the certificate identified in the client request has been revoked. The method may be performed by a networking device that is separate from the server and the client.

Подробнее
01-03-2012 дата публикации

Data transmission processing device and data transmission program

Номер: US20120054495A1
Принадлежит: Toshiba Corp

According to one embodiment, there is provided a data transmission processing device, including: a identifying portion configured to identify a module having sent out data; a storage portion configured to store a sending-out method definition list defined in accordance with each source module and indicating a processing method for the data, the processing method including a data conversion method or permission/prohibition of communication; a determining portion configured to determine a processing method corresponding to the source module identified by the identifying portion by referring to the sending-out method definition list; a converting portion configured to convert the data when the data conversion method is included in the processing method determined by the determining portion; and a transmission portion configured to send out the data or the converted data when the determining portion concludes that communication is permitted.

Подробнее
08-03-2012 дата публикации

Anonymous printer registration in a cloud-based print service

Номер: US20120057193A1
Принадлежит: Google LLC

A print server may include an anonymous printer registration module configured to receive, at a cloud print service, a registration request from a printer over a network and return a registration response to the printer over the network. The anonymous printer registration module may include a claim code provider configured to provide a claim code included within the registration response to the printer over the network, wherein the printer is configured to provide the claim code to a user of the printer, and a printer matcher configured to receive the claim code from the user over the network and match a user account of the user within the cloud print service with the printer, in response to the receipt of the claim code from the user.

Подробнее
15-03-2012 дата публикации

Apparatus and method for transferring data to remote printer

Номер: US20120062952A1
Автор: Naoyuki Nishikawa
Принадлежит: Canon Inc

Using a print response process block for generating a print job, a spool process block for spooling the print job and generating a print completion job, a transferring data convert process block for converting the print completion job into a format in which the print completion job can be transferred to a remote printer, a remote transfer process block for transferring the print completion job according to a predetermined transfer protocol, and an encipher block for enciphering the print completion job, a print process for performing remote printing is temporarily completed in a local network to suppress a delay in communications when remote printing is performed, a disconnection of a connected circuit, and a data leak during the remote transfer.

Подробнее
29-03-2012 дата публикации

Image recording apparatus

Номер: US20120075657A1
Автор: Shunsuke Yamamoto
Принадлежит: Brother Industries Ltd

An image recording apparatus, including: a recording device; discharge trays; a discharge mechanism; detectors; an input device through which is inputted authentication information relating to image data; and a controller including: an image-data reception portion; an authentication-information confirming portion to make a confirmation as to whether the authentication information contains specific information; a confirmation-necessity judging portion to judge whether the confirmation by the confirming portion with respect to the image data is necessary; a selecting portion to select one discharge tray on which the recording medium is not placed, wherein, where the judging portion judges that the confirmation is necessary, the controller permits selection of the one discharge tray, controls the recording device to record the image based on the image data after the confirmation that the authentication information contains the specific information, and controls the discharge mechanism to discharge, to the selected one discharge tray, the image-recorded recording medium.

Подробнее
29-03-2012 дата публикации

Key Agreement and Transport Protocol with Implicit Signatures

Номер: US20120079274A1
Принадлежит: Certicom Corp

A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.

Подробнее
12-04-2012 дата публикации

Method and apparatus for registering agents onto a virtual machine monitor

Номер: US20120090016A1
Принадлежит: Individual

A method for managing an agent includes verifying an integrity of the agent in response to a registration request. Memory protection is provided for the agent dining integrity verification. An indication is generated when registration of the agent has been completed. According to one aspect of the present invention, providing memory protection includes having a virtual machine monitor limit access to the agent. Other embodiments are described and claimed.

Подробнее
19-04-2012 дата публикации

Method and apparatus for generating an application program for a safety-related control unit

Номер: US20120096428A1
Принадлежит: Individual

A safety controller designed to control an automated installation having a plurality of sensors and a plurality of actuators. A method for generating a user program for the safety controller comprises the step of generating a source code having a number of control instructions for controlling the actuators and having a number of diagnosis instructions for producing diagnosis reports. Safety-related program variables are processed in failsafe fashion during execution of the control instructions. A machine code is generated on the basis of the source code. At least one checksum is determined for at least some of the machine code. The diagnosis instructions are ignored for the determination of the checksum.

Подробнее
19-04-2012 дата публикации

Image forming apparatus, information processing method, and program

Номер: US20120096528A1
Автор: Atsushi Daigo
Принадлежит: Canon Inc

To provide an authentication method of enabling a user to use a multifunction machine in which user information of the user is not registered on an authentication table thereof, without deteriorating a maintenance capability of the authentication table, the method is characterized to include steps of obtaining user information from the user, determining whether or not the obtained user information is included on a user information table, and transmitting, when the obtained user information is not included on the user information table, the user information to an image forming apparatus registered in a redirect destination list. The method is further characterized to cause the transmission-destination image forming apparatus to authenticate the transmitted user information, and permit use of the image forming apparatus by the user according to an authentication result of the transmission-destination image forming apparatus.

Подробнее
19-04-2012 дата публикации

Data integrity protecting and verifying methods, apparatuses and systems

Номер: US20120096564A1
Автор: JI Li
Принадлежит: Sony Corp

The disclosure provides data integrity protecting and verifying methods, apparatuses and systems. A data integrity protecting method include: calculating a Hash value of each of the data blocks by using a first Hash function, to obtain a plurality of block Hash values which form a first series of Hash values; calculating a second series of Hash values based on the first series of Hash values, the second series of Hash values comprising a plurality of chain Hash values, each of which being associated with a corresponding block Hash value in the first series of Hash values and being associated with a neighbor chain Hash value in the second series of Hash values, wherein the first series of Hash values and the second series of Hash values used as integrity information of the data; and generating verification information of the data by using a last chain Hash value.

Подробнее
26-04-2012 дата публикации

Secret information distribution system, secret information distribution method and program

Номер: US20120102321A1
Автор: Satoshi Obana
Принадлежит: NEC Corp

Secret information is encoded/distributed into distributed information according to access structure, a random number sequence corresponding to number of pieces into which the secret information is distributed is generated by randomly selecting polynomial coefficients, the coefficients are encoded/distributed into random number information according to access structure, a hash function whose hash values correspond to the random number sequence is generated, keys for which the hash function applies are selected so as to individually set data for checking whether restored secret information is being manipulated as number of pieces of check data corresponding to number of pieces into which the secret information is distributed, the distributed information is read, the secret information is restored; the random number information is read, the random number sequence is restored, the check data is read, and the restored secret information is judged as not being manipulated when the read check data satisfies the hash function.

Подробнее
03-05-2012 дата публикации

Image processing apparatus and method of forming images

Номер: US20120105900A1
Принадлежит: Oki Data Corp

An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an external storage medium. A human interface receives passwords form a user. A password determining section determines whether the selected files are protected by passwords. A file extracting section extracts the selected files from an internal storage medium or external storage medium. A password verifying section determines whether passwords contained in the selected files and the passwords inputted through the human interface coincide. A printer prints the selected files. A printing controller controls the printer, causing the printer to print at least one of selected files if the password verifying section has determined that the password contained in the at least one selected file and the password inputted by the user coincide.

Подробнее
03-05-2012 дата публикации

Printing apparatus

Номер: US20120107030A1
Автор: Keigo GOTO
Принадлежит: Brother Industries Ltd

A printing apparatus includes: a receiving section which receives a print data from the external apparatus; a storage section in which the print data received by the receiving section is stored; an input section which receives from a user a print instruction for printing based on the print data stored in the storage section; a print section which performs the printing of the image on the recording medium based on the print data stored in the storage section in a case that the input section receives the print instruction from the user; and a controller which controls the storage section and which calculates and sets for the print data stored in the storage section a storage time-period within which the print data is storable in the storage section.

Подробнее
03-05-2012 дата публикации

Methods for processing private metadata

Номер: US20120110323A1
Принадлежит: Apple Inc

According to one aspect of the invention, a file received from a first user is stored in a storage device, where the file includes private metadata encrypted by a secret key associated with a second user. A private metadata identifier is stored in a predetermined storage location, indicating that private metadata of the file has not been decrypted and indexed. In response to an inquiry subsequently received from the second user, the predetermined storage location is scanned to identify the private metadata identifier based on the inquiry. The encrypted metadata identified by the private metadata identifier is transmitted to the second user for decryption. In response to the metadata that has been decrypted by the second user, the decrypted metadata is indexed for the purpose of subsequent searches of at least one of the metadata and the file.

Подробнее
03-05-2012 дата публикации

Software security

Номер: US20120110333A1
Принадлежит: Nokia Oyj

An apparatus with at least one secure memory area comprising a plurality of pre-installed public keys for verifying software authenticity. The apparatus is caused to receive an indication that a software package signed with a private key according to public key infrastructure has been received; check from the secure memory area, whether a public key associated with the private key with which the software package has been signed, is disabled; and if the public key associated with the private key is disabled, prevent execution of the received software package, and otherwise, proceed to verify authenticity of the received software package using the public key associated with the private key.

Подробнее
10-05-2012 дата публикации

Security system for computing resources pre-releases

Номер: US20120117625A1
Автор: Kenneth Ray
Принадлежит: Microsoft Corp

Technology is provided for provisioning a user computer system with membership in a privilege set in order to execute a pre-release resource. Some examples of pre-release resources are alpha and beta versions of firmware or software which can be downloaded to user computer systems. The pre-release resources are associated with different privilege sets based on their security risk levels. In one example, a security risk level may represent a number of user computer systems at risk of an integrity failure of the pre-release resource. In other examples, the security risk may represent an operational layer of the user computer system affected by the resource or a level of security testing certification success for the pre-release resource. A privilege set identifier indicates membership in one or more privilege sets.

Подробнее
24-05-2012 дата публикации

Method and apparatus for controlling access to data based on layer

Номер: US20120131342A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is an access control apparatus and method for giving access authority with respect to data. The access control apparatus may encrypt, using a Public Key (PK) of a terminal, a Node Key (NK) of a target layer in which the access authority is to be granted to the terminal, and produce an Access Control List (ACL) of the target layer based on the encrypted NK and ID information of the terminal. Also, the access control apparatus may produce a copy of the ACL based on the produced ACL, and store the produced copy of the ACL in a lower layer.

Подробнее
31-05-2012 дата публикации

Terminal, communication system, data management method, server and storage medium

Номер: US20120137343A1
Автор: Kaoru Uchida
Принадлежит: NEC Corp

[Problem] To make it possible to prevent certainly user's personal information from flowing out without burdening the user, and to manage sensor information and result information which is acquired through processing a service by use the sensor information, on the basis of importance, classification, personal property, utilization form or the like. [Solution to the problem] A terminal according to the present invention includes an acquisition means to acquire sensor data, a storage means to store a policy table which defines a management policy for each sensor data or each service which uses the sensor data, and a control means to acquire the management policy corresponding to the sensor data or the service with reference to the policy table and to manage the sensor data on the basis of the management policy.

Подробнее
31-05-2012 дата публикации

Security systems and methods to reduce data leaks in enterprise networks

Номер: US20120137375A1
Принадлежит: Georgia Tech Research Corp

Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources.

Подробнее
14-06-2012 дата публикации

Calculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects

Номер: US20120150897A1
Принадлежит: International Business Machines Corp

Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object.

Подробнее
14-06-2012 дата публикации

Systems and methods for transformation of logical data objects for storage

Номер: US20120151222A1
Принадлежит: Individual

Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.

Подробнее
21-06-2012 дата публикации

Digital signatures with error polynomials

Номер: US20120159179A1
Принадлежит: Microsoft Corp

Representations of polynomials a, s, t, e — 1 and e — 2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification key can be generated to include representations of polynomials a, b, and c. Computation of b can include computing a product using a and s, and adding e — 1 . Computation of c can include computing a product using a and t, and adding e — 2 . A signing key can represent s and t. The signing key can be used to produce a message signature that can represent a sum of t and a product of s and m, with m being derived from a message to be signed. The verification key can be used to verify the signature by checking coefficient sizes of a polynomial represented by the signature, and of a checking polynomial derived from the verification key and the signature.

Подробнее
21-06-2012 дата публикации

Technique for Supporting Multiple Secure Enclaves

Номер: US20120159184A1
Принадлежит: Intel Corp

A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.

Подробнее
21-06-2012 дата публикации

System and method for data collection and exchange with protected memory devices

Номер: US20120159518A1
Принадлежит: Mo DV Inc

A method, apparatus, and article of manufacture for collecting and exchanging data are disclosed. In one embodiment, the apparatus comprises a non-volatile memory device, which includes an interface for coupling the non-volatile memory device to a host system; non-volatile memory for storing data, including a plurality of executables at least two of which are executable on different operating systems or devices. The plurality of executables includes a data collection executable and a data transfer executable. The non-volatile memory device also includes a controller to cause execution of at least one executable in the plurality of executables, including the data collection executable and the data transfer executable, where execution of the data collection executable causes data to be collected and stored in the non-volatile memory, and execution of which causes the collected data to be transferred to a location external to the non-volatile memory device.

Подробнее
28-06-2012 дата публикации

Elliptic curve cryptograhy with fragmented key processing and methods for use therewith

Номер: US20120163581A1
Принадлежит: Morega Systems Inc

A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process a message in accordance with elliptic curve digital signature algorithm (ECDSA) to produce a signed message.

Подробнее
28-06-2012 дата публикации

Order-preserving encryption and decryption apparatus and method thereof

Номер: US20120163586A1
Автор: Do Won HONG, Nam-su Jho

An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.

Подробнее
28-06-2012 дата публикации

Cryptography module for use with fragmented key and methods for use therewith

Номер: US20120163590A1
Принадлежит: Morega Systems Inc

A cryptography module includes a key store having a plurality of storage locations for storing a key as k key fragments including a plurality of random key fragments and a remainder key fragment. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process an input signal to produce an output signal.

Подробнее
05-07-2012 дата публикации

Removable devices

Номер: US20120174188A1
Принадлежит: Micron Technology Inc

Methods and removable devices are provided. Some such removable devices may include a secure partition and a public partition. The secure partition is not accessible by an operating system of a host for some embodiments. The secure partition is configured to store information so that formatting/reformatting does not alter the stored information for other embodiments.

Подробнее
12-07-2012 дата публикации

Method, Apparatus and System for Accessing Remote Files

Номер: US20120179731A1
Автор: Chuming Chen, Yan Lin
Принадлежит: Sangfor Networks Co Ltd

The present invention relates to a method, apparatus and system for accessing remote files, wherein the method for accessing remote files comprising the following steps: obtaining download operation information for downloading a file in an operational system server; redirecting the download operation to a file server with safety space; saving a real copy of the downloaded file in the safety space and enumerating a corresponding virtual copy in the safety space. In the present invention, local file operations are redirected to the network file operations of network file storage system by redirecting the download operation on the file in the operational system server to the file server instead of being saved in the local user terminal to realize the “Not to local” effect for the key file. Even when it is power-off and then restarted, the data will not be saved in the local user terminal to achieve an effect close to “physical-like isolation”, which solves the safety problems of the offline key file much better.

Подробнее
19-07-2012 дата публикации

Receiver non-repudiation via a secure device

Номер: US20120183145A1
Принадлежит: Apple Inc

Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.

Подробнее
19-07-2012 дата публикации

Triggering a private browsing function of a web browser application program

Номер: US20120185949A1
Принадлежит: International Business Machines Corp

A private browsing function of a web browser application program may be triggered for a browser by a browser or by a URL provider. Upon receipt of the URI by a web browser, the URI is inspected for the presence of a private browsing indicator. When the URI is found to contain a private browsing indicator, operation of the private browsing function for the web browser application program is triggered.

Подробнее
26-07-2012 дата публикации

System and Method for Capturing Augmented Reality Electronic Signatures

Номер: US20120190405A1
Автор: Ranjith Kumaran
Принадлежит: YouSendIt Inc

A system and method for more accurately and easily recording signatures electronically/digitally. The preferred signing experience is generating a “wet” signature by putting a pen to paper as a pen and paper are ubiquitous and portable as well as familiar to most people. The present invention preserves this experience while combining it with a digital rendering of a document using conventional mobile communication devices having a camera feature in order to record a wet signature of a user and store a digital representation of the document that includes the recorded wet signature in the signature block of the document.

Подробнее
26-07-2012 дата публикации

Selecting portions of computer-accessible documents for post-selection processing

Номер: US20120192066A1
Принадлежит: International Business Machines Corp

Processing documents by highlighting a portion of a document displayed on a computer display, where the portion is highlighted when a cursor is in a predefined location of the display relative to the location of the portion of the document, where the portion is identified as a candidate for selection for a post-selection operation prior to the cursor being in the predefined location of the display, and where the highlighting is done independent of any input received via a computer input device to indicate the extents of the portion, and recording a selection of the portion when an input that is predefined to indicate a selection action is received in association with the portion via a computer input device.

Подробнее
26-07-2012 дата публикации

Access control data editing support device and method

Номер: US20120192267A1
Автор: Taisuke Aizawa
Принадлежит: Fujitsu Ltd

A computer-readable, non-transitory medium recording an access control data editing support program for causing a computer to implement a procedure. The procedure includes changing log information containing a record having an authorization result of first access authorization determined based on access control data and a content utilized for determining the first access authorization every time an access agent accesses an access target, and changing the access control data based on the changed log information, and determining second access authorization by applying the changed access control data to the content utilized for determining the first access authorization indicated by the log information and generating determination result information containing an authorization result of the second access authorization and a content utilized for determining the second access authorization.

Подробнее
02-08-2012 дата публикации

Policy based management of content rights in enterprise/cross enterprise collaboration

Номер: US20120198559A1
Принадлежит: Oracle International Corp

Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an enterprise/cross-enterprise environment. The utility may include a content management system for storing the artifacts and managing use of the artifacts and an information rights management system for use in sealing the artifacts, validating users and granting licenses for use of the artifacts at the directive of the content management system.

Подробнее
09-08-2012 дата публикации

Creation of signatures for authenticating applications

Номер: US20120203670A1
Автор: Kurt W. Piersol
Принадлежит: Ricoh Co Ltd

A method and system for authenticating applications. The system includes a plurality of portable electronic devices, at least one process organizer, at least one module developer, at least one task performer and a workflow server. The process organizer generates an application. The process organizer can request modules from module developers that are incorporated into the application. Alternatively, the process organizer makes an agreement with a task performer to perform tasks to complete the application. The application is transmitted to the workflow server, which includes an online marketplace for displaying and selling the applications. A user purchases the application through the store. A routing module generates a signature and compares the signature to application, module or document metadata and a secret to determine consistency of the data before the application, module or document is routed.

Подробнее
09-08-2012 дата публикации

Self regulation of the subject of attestation

Номер: US20120204020A1
Принадлежит: Microsoft Corp

Attestation by a self-regulating attestation client. The attestation client requests a credential of health from an attestation service, which includes an ordered attestation log and proof of integrity and freshness of the log. The attestation client receives the requested credential of health, which certifies the attestation client was healthy when it requested the credential of health and that the attestation service trusts the attestation client to be healthy each time the attestation client authenticates using the credential of health. The attestation client receives a request to authenticate that it is healthy using the credential of health, verifies that it is currently healthy, and performs the requested authentication.

Подробнее
16-08-2012 дата публикации

Web content ratings

Номер: US20120210435A1
Автор: Jarno Niemelä
Принадлежит: F Secure Oyj

A method of performing a security check at a user computer on web page content downloaded to the user computer over the Internet. The method includes retrieving rating information for the web page from a web service over the Internet, the rating information including one or more content ratings and a first signature generated from the content, using a specified algorithm, at substantially the same time as the or each content rating was determined. The downloaded web page content is then processed using said specified algorithm to generate a second signature, and said first and second signatures are compared and the differences therebetween quantified. It is then determined if the quantified difference exceeds a threshold value. If not, then the received content rating(s) is(are) trusted. If yes, then the result is reported to said web service.

Подробнее
23-08-2012 дата публикации

Authentication and data integrity protection of a token

Номер: US20120213368A1
Автор: Rainer Falk
Принадлежит: SIEMENS AG

In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, the related response is calculated after receiving a challenge message which has not yet been transferred. A cryptographic key is derived from the response, which is used to determine a cryptographic check sum of data. The cryptographic check sum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.

Подробнее
23-08-2012 дата публикации

Providing data security through declarative modeling of queries

Номер: US20120216240A1
Принадлежит: Microsoft Corp

Data security is implemented through a query based policy constraining a primary table. Nested tables inherit the security policy by implementing the policy queries of the primary table. Operations on nested tables such as join actions execute the security policy queries once due to inheritance from the primary table therefore optimizing query modeling. A security policy may respond to a context or a role by executing queries responsive to the context.

Подробнее
30-08-2012 дата публикации

Apparatus and method for sharing and managing passcodes across multiple printing device drivers

Номер: US20120218579A1
Принадлежит: Xerox Corp

An apparatus and method share and manage passcodes across multiple printing device drivers. The method can include providing, on the electronic device, a first printing device driver for a first printing device and a second printing device driver for a second printing device. The first printing device driver and the second printing device driver can access a common secure printing device passcode storage location for secure printing device passcodes. The method can include storing at least one secure printing device passcode in the common secure printing device passcode storage location. The method can include displaying secure print information to the user in response to receiving a secure print input. The method can include sending a secure printing device passcode over the network interface to a printing device to securely print the document.

Подробнее
30-08-2012 дата публикации

Enterprise level data management

Номер: US20120221550A1
Принадлежит: Varonis Systems Inc

A system for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the system including background data characterization functionality characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and near real time data matching functionality selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements.

Подробнее
30-08-2012 дата публикации

Method and apparatus for providing end-to-end security for distributed computations

Номер: US20120221861A1
Принадлежит: Nokia Oyj

An approach is provided for providing end-to-end security in multi-level distributed computations. A distributed computation security platform determines one or more signatures associated with one or more computation closures of at least one functional flow. The distributed computation security platform also processes and/or facilitates a processing of the one or more signatures to generate at least one supersignature. The distributed computation security platform further determines to associate the at least one supersignature with the at least one functional flow.

Подробнее
06-09-2012 дата публикации

Methods for detecting sensitive information in mainframe systems, computer readable storage media and system utilizing same

Номер: US20120226677A1
Принадлежит: Xbridge Systems Inc

Examples of methods, systems, and computer-readable media for detection of sensitive information are described using multiple techniques. The techniques may include applying pre-defined field structure layouts to records, applying simple template structure to records as a single field, and inferring data structure by building a map of potential packed decimal locations. The resulting information may then be analyzed for detection of sensitive information.

Подробнее
20-09-2012 дата публикации

Information processing apparatus, method for controlling information processing apparatus, and program

Номер: US20120236347A1
Автор: Yoshinobu Umeda
Принадлежит: Canon Inc

An information processing apparatus includes a control unit that, in a case where it is determined that proxy response processing should be performed, performs control such that an inputted job is processed without causing the information processing apparatus to transition from a second power mode to a first power mode, and, in a case where it is determined that proxy response processing should not be performed, performs control such that inputted job is processed after causing the information processing apparatus to transition from the second power mode to the first power mode.

Подробнее
20-09-2012 дата публикации

Storage system, storage control apparatus, and storage control method

Номер: US20120239943A1
Автор: Hiroshi Okamoto
Принадлежит: Fujitsu Ltd

In a storage system, a storage apparatus has an encryption key generator and an encryption processor that encrypts data to be recorded in a storage region using an encryption key from the encryption key generator, and is able to change an encryption key for each divided region set in the storage region. A control apparatus has a logical volume setting unit that requests the encryption processor to set an individual divided region for each storage region set as a logical volume in the storage region of the storage apparatus and a data erasure processor that requests the encryption processor to change the encryption key used for encryption in the divided region corresponding to the logical volume to be erased.

Подробнее
27-09-2012 дата публикации

System and method for secured backup of data

Номер: US20120246472A1
Принадлежит: Safend Ltd

A system and method of selectively providing encrypted data is provided. Embodiments of the invention may store data in encrypted form on a storage device. Embodiments of the invention may selectively provide encrypted or decrypted data to a requestor of data based on configuration or other parameters. A filter driver or other module or unit may examine a request for, or communication of data from the storage device and may determine if data is to be provided in encrypted or decrypted form. Decrypted data may be provided to a caching system. A filter driver or other module or unit may examine a request for, or communication of data from the caching system. Data provided from the caching system may be selectively encrypted based on configuration or other parameters.

Подробнее
04-10-2012 дата публикации

Image forming system, information management server, and computer readable medium storing program

Номер: US20120250066A1
Принадлежит: Fuji Xerox Co Ltd

An image forming system includes an information management unit, a determining unit, and at least one image forming unit. The information management unit stores and manages print information. The determining unit determines whether or not execution of a printing process regarding the print information is allowed. Each image forming unit prints and outputs print information acquired from the information management unit on a recording medium in accordance with a determination result of the determining unit. The determining unit includes a first authenticating unit and a second authenticating unit. The first authenticating unit performs authentication to determine whether or not execution of processing before printing and outputting the print information on a recording medium is allowed. The second authenticating unit performs authentication after completion of the authentication performed by the first authenticating unit to determine whether or not printing and output of the print information on the recording medium is allowed.

Подробнее
04-10-2012 дата публикации

Image forming system and computer readable medium storing program

Номер: US20120250067A1
Принадлежит: Fuji Xerox Co Ltd

An image forming system includes an information management unit, at least one image forming unit, an authenticating unit, a determining unit, an adding unit, a notifying unit, and a controller. The information management unit stores and manages print information. Each image forming unit forms an image on a recording medium in accordance with the print information. The authenticating unit authenticates a recipient of an output result of the image forming unit. The determining unit determines whether or not the print information requires authentication. The adding unit adds authentication information about the recipient to the print information when the print information requires authentication. The notifying unit notifies the recipient of information regarding the print information with the authentication information added. The controller controls the information management unit to transmit the print information to the image forming unit to form an image when the recipient has been successfully authenticated.

Подробнее
04-10-2012 дата публикации

Process for executing a downloadable service receiving restrictive access rights to at least one profile file

Номер: US20120254621A9
Принадлежит: Hewlett Packard Co

A process for executing a downloadable service with specific access rights to at least one profile file in a user's computer. The web browser is used for accessing a web server through a first set of communication port and socket. Therefore is arranged a confined runtime environment such as for example an extended sandbox ( 11 ) and used in Java programming which Is assigned a second communication port and s ockets and which is used for executing downloadable service with restricted access on at least one profile file. The process can be used for executing services under the form of a signed archive file which signature is used for both validating the archive file and for selecting one particular secure class loader prior to the generation of the compiled code of the service.

Подробнее
11-10-2012 дата публикации

Information processing apparatus, information processing method, and storage medium

Номер: US20120257242A1
Автор: Takashi Imoto
Принадлежит: Canon Inc

An information processing apparatus and method includes determining whether print data is limited in a number of times of printing, determining whether a setting of storing the print data in the information processing apparatus is valid, and stopping transmission of the print data in a case where it is determined that the print data is limited in the number of times of printing and it is determined that the setting is valid.

Подробнее
11-10-2012 дата публикации

Multiple independent encryption domains

Номер: US20120257743A1
Автор: Peter H. Van Der Veen
Принадлежит: QNX Software Systems Ltd

A stored object may be encrypted with an “object” cryptographic key. The object cryptographic key may be stored in metadata for the object and the metadata for the object may be encrypted using an “internal” cryptographic key associated with a particular encryption domain. The internal cryptographic key may be stored in a filesystem memory block associated with the particular encryption domain. A “domain” cryptographic key may be generated and stored associated with the particular encryption domain. The domain cryptographic key may be used to encrypt the filesystem memory block. Conveniently, below the domain cryptographic key, the filesystem has a unique, totally unknown, internal cryptographic key for actual data encryption.

Подробнее
11-10-2012 дата публикации

Public Key Encryption with Digital Signature Scheme

Номер: US20120257752A1
Автор: Herb A. Little
Принадлежит: Research in Motion Ltd

An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process. The reuse of the encryption ephemeral key pair in the digital signature process advantageously results in reduced byte size of the digital signature and reduction of costly computation overhead. In a preferred embodiment, the invention is based on the El Gamal encryption scheme and the Nyberg-Rueppel signature scheme. The present invention is particularly useful for operation in conjunction with small communication devices having limited processing and storage, wherein such devices may communicate via bandwidth sensitive RF links.

Подробнее
11-10-2012 дата публикации

Methods and Apparatus for Authenticating Data as Originating from a Storage and Processing Device and for Securing Software and Data Stored on the Storage and Processing Device

Номер: US20120260091A1
Автор: Alberto J. Fernandez
Принадлежит: XTec Inc

Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for installing software and data to a storage medium in a way which inhibits unauthorized copying of the software and data to another storage medium. Cryptoprocessing keys are created using unique features of the storage medium such as location information related to storage of selected elements of a software installation on the storage medium, or alternatively defective block information relating to the storage medium. The cryptoprocessing keys are used to encrypt data for transmission to a remote server. The remote server uses the cryptoprocessing keys to decrypt the data and authenticates the data as having been encrypted with the correct keys.

Подробнее
25-10-2012 дата публикации

Image forming apparatus and method of transferring administrative authority of authentication print data

Номер: US20120268770A1
Автор: Takafumi Fukuda
Принадлежит: Individual

An image forming apparatus includes a print administration unit for printing authentication print data; a server unit for providing a service; an authentication unit for controlling the server unit; and a notification transmission unit for transmitting a notice. The authentication unit obtains individual identification information. The server unit controls the external operation unit to display the authentication print data and an input screen. The print administration unit rewrites the identification information. The notification transmission unit transmits a first notification to the authority transferred person. After the authentication print data is printed, the notification transmission unit transmits a second notification to the authority transferred person and the print data creating person.

Подробнее
01-11-2012 дата публикации

Image processing system, image processing apparatus and server in the image processing system, and data control method and storage medium storing program thereof

Номер: US20120275647A1
Автор: Hanae Gabe
Принадлежит: Canon Inc

When an image processing apparatus transmits information about image data stored therein to a server, the server determines whether or not the image data contains confidential information, and transmits the determination result to the image processing apparatus. When the image processing apparatus receives, from the server, determination result indicating whether or not the image data contains confidential information, then if the determination result indicates that the image data contains specific information, the image processing apparatus limits use of the image data.

Подробнее
01-11-2012 дата публикации

Authenticating Digitally Encoded Products without Private Key Sharing

Номер: US20120278612A1
Автор: Luca Ferri, Luigi Pichetti
Принадлежит: International Business Machines Corp

A method and a corresponding system for authenticating software products are proposed. A digital certificate and a corresponding private key required to sign each product are stored on a server computer. Whenever a user needs to sign a product, he/she logs on a client computer and transmits a corresponding request to the server computer. The server computer verifies whether the request has been received from an authorized subject; for example, an address of the client computer and an identifier of the user are compared with a predefined list. If the result of the verification is positive, the product is signed and returned to the client computer. For this purpose, a script called on the server computer includes either an instruction passing the access password to a signing tool as a parameter or an instruction causing the signing tool to import the access password from a registry of the server computer.

Подробнее
08-11-2012 дата публикации

Peer integrity checking system

Номер: US20120284794A1
Принадлежит: Architecture Technology Corp

A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.

Подробнее
15-11-2012 дата публикации

System and method for reliably preserving web-based evidence

Номер: US20120290847A1
Принадлежит: Surety LLC

An evidence collection system for reliably collecting and preserving web-based evidence. An end-user's computing device browser accesses an evidence collection web site and identifies a web resource to be collected. An evidence collection station communicates with the target web server(s) and collects the body of evidence requested. Multiple representations of the information are collected to support the defensibility of the capture. Digital signature and digital time stamp methodologies are used to enhance the forensic soundness of the captured evidence. Capture results are conveyed to the end-user along with a report that describes the evidence captured in a manner which may be utilized as evidence comprehensible to a lay judge and jury.

Подробнее
15-11-2012 дата публикации

Security compliant data storage management

Номер: US20120291133A1
Принадлежит: International Business Machines Corp

An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.

Подробнее
22-11-2012 дата публикации

File set consistency verification system, file set consistency verification method, and file set consistency verification program

Номер: US20120296878A1
Принадлежит: NEC Corp

A check code generating means 10 generates, based on metadata of files satisfying a designated condition, a first check code uniquely representing a characteristic of a first file set whose components are files satisfying the condition. Moreover, the check code generating means 10 generates, based on metadata of files satisfying the condition, a second check code uniquely representing a characteristic of a second file set whose components are files satisfying the condition. An inconsistency detecting means 20 compares the first check code and the second check code and, based on inconsistency between the check codes, detecting inconsistency between the first file set and the second file set.

Подробнее
22-11-2012 дата публикации

Techniques for non repudiation of storage in cloud or shared storage environments

Номер: US20120297183A1
Принадлежит: Individual

Techniques for non-repudiation of storage in cloud or shared storage environments are provided. A unique signature is generated within a cloud or shared storage environment for each file of the storage tenant that accesses the cloud or shared storage environment. Each signature is stored as part of the file system and every time a file is accessed that signature is verified. When a file is updated, the signature is updated as well to reflect the file update.

Подробнее
22-11-2012 дата публикации

Approach for securely processing an electronic document

Номер: US20120297471A1
Автор: Brian Smithson
Принадлежит: Individual

A method and apparatus for processing an electronic document in a secure manner is provided. A scanner may verify that the configuration state of a file server has not changed since a prior configuration state by issuing a request to a security server. The security server may process the request to determine whether the configuration state of the file server has changed since the file server was registered with the security server. The security server may also verify that the scanner issued a request to store an electronic document using a file server or that the file server received the request. A storage medium of a file server may be protected against unauthorized removal of the storage medium by storing, separate from the storage medium, a password required to access the storage medium, and when the file server is powered on, the password is provided to the storage medium.

Подробнее
29-11-2012 дата публикации

Semantic textual analysis

Номер: US20120303358A1
Принадлежит: British Telecommunications plc

A method of comparing the semantic similarity of two different text phrases in which the grammatical structure of the two different text phrases is analysed and a keyword set for each of the different text phrases is derived The semantic similarity of the phrases can be determined in accordance with the grammatical structure of the two different text phrases and the contents of the two keyword sets.

Подробнее
29-11-2012 дата публикации

Systems and methods for a website application for the purpose of trading, bartering, swapping, or exchanging personal property through a social networking environment

Номер: US20120304305A1
Принадлежит: Benyomin Efraimov, Raven David G

A system is provided for facilitating a personal property trading system and social networking environment that allows users to interact and create dialogue and socialize in relation to possible trades of personal property or services. This application will allow users who are willing to trade an item, service or favor to obtain similar wants or needs. This form of haggling and the feeling of success are proven to be mentally stimulating, proving another benefit for users. Users will be able to comment and haggle, as well as suggest other users that they believe may have a match on their ‘TRADING ITEMS’ and ‘STUFF I WANT’ lists. The system will promote environmentally conscious trading by bringing unwanted items back to use.

Подробнее
06-12-2012 дата публикации

Pre-Caching Resources Based on A Cache Manifest

Номер: US20120311020A1
Принадлежит: Research in Motion Ltd

A method executed on a first electronic device for accessing an application server on a second electronic device includes receiving a cache manifest for an application, the cache manifest identifying a resource item that can be pre-cached on the first electronic device, pre-caching the resource item as a cached resource item in a cache memory of the first electronic device prior to launching an application client on the first electronic device. The method further includes, upon launching the application client on the first electronic device, retrieving data from the application server, wherein the data includes content and a reference to the resource item, obtaining, from the cache memory, the cached resource item that corresponds to the resource item, and displaying an output based upon the content and the cached resource item.

Подробнее
06-12-2012 дата публикации

Method and system for automatic generation of cache directives for security policy

Номер: US20120311674A1
Принадлежит: International Business Machines Corp

An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.

Подробнее
13-12-2012 дата публикации

NFC Communications Device for Setting Up Encrypted Email Communication

Номер: US20120314865A1
Автор: Robert Kitchen
Принадлежит: Broadcom Corp

NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place. Since the encryption/decryption keys and/or related cryptographic process parameters are not stored on the computational platform the security of this information is improved. In some embodiments the encrypted communication is encrypted email, or PUP encrypted email.

Подробнее
27-12-2012 дата публикации

Information processing apparatus, control method therefor, and storage medium storing program

Номер: US20120327465A1
Автор: Tetsuya Yamada
Принадлежит: Canon Inc

The invention acquires a destination corresponding to a group to which an authenticated user belongs by searching a user management unit configured to manage a plurality of destinations respectively corresponding to a plurality of users and information of a group to which each of the plurality of users belongs, and sets to transmit data to the acquired destination.

Подробнее
27-12-2012 дата публикации

Authentication system, authentication method, and storage medium for realizing a multitenant service

Номер: US20120331539A1
Автор: Hayato Matsugashita
Принадлежит: Canon Inc

In order to prevent leakage of data possessed by a tenant to other tenants in multitenant service, it is necessary to control access. However, the conventional access control method is designed and developed to meet a specified request. Thus, costs for a dedicated design, development, administration, and maintenance need to be considered. Such costs can be reduced by using role information for each of a plurality of services and determining whether to allow or not allow access in a uniform manner.

Подробнее
03-01-2013 дата публикации

Print control device, print control method, information processing system, information processing apparatus, information processing method, and storage medium

Номер: US20130003106A1
Принадлежит: Canon Inc

A print control device manages a print job and a printer based on an instruction from a client terminal. The print control device accepts a print instruction to the printer from the client terminal and authentication information about the client terminal, confirms the validity of the authentication information to an authentication unit configured to issue and manage the authentication information, registers the print job as an execution job together with the authentication information if the authentication information is valid, and accesses the authentication unit during registration of the execution job to thereby update the expiration date/time of the registered authentication information.

Подробнее
03-01-2013 дата публикации

Methods and Apparatus for Facilitating Entries Into a Document Registry To Mitigate Access to Restricted Documents without Appropriate Access Credentials

Номер: US20130007074A1
Автор: Neil Weicher
Принадлежит: Composites Horizons LLC

In accordance with some embodiments, an article of manufacture, apparatus and/or process provides for removing a file from a registry of files in order to prevent access to a restricted file without provision of the appropriate access credentials. For example, one embodiment provides for monitoring a registry of files; recognizing a registration of a first file in the registry of files; determining a unique identifier corresponding to the registration of the first file; and removing, using the unique identifier, the registration of the first file from the registry, thereby removing the unique identifier from the registry.

Подробнее
03-01-2013 дата публикации

Protocol for Controlling Access to Encryption Keys

Номер: US20130007464A1
Автор: David H. MADDEN
Принадлежит: Individual

A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover the plaintext of the encrypted data; and stores at least one encrypted key at a client system. To decrypt the data, the client must obtain a copy of the encrypted data from the server, and a key to decrypt its locally-stored encrypted key. Once decrypted, the locally-stored key can be used to decrypt the encrypted data, or to decrypt an encrypted key from the server, which may then be used decrypt the encrypted data.

Подробнее
10-01-2013 дата публикации

Bios flash attack protection and notification

Номер: US20130013905A1
Принадлежит: Intel Corp

A system and method for BIOS flash attack protection and notification. A processor initialization module, including initialization firmware verification module may be configured to execute first in response to a power on and/or reset and to verify initialization firmware stored in non-volatile memory in a processor package. The initialization firmware is configured to verify the BIOS. If the verification of the initialization firmware and/or the BIOS fails, the system is configured to select at least one of a plurality of responses including, but not limited to, preventing the BIOS from executing, initiating recovery, reporting the verification failure, halting, shutting down and/or allowing the BIOS to execute and an operating system (OS) to boot in a limited functionality mode.

Подробнее
17-01-2013 дата публикации

Need-to-know information access using quantified risk

Номер: US20130018921A1
Автор: Hongxia Jin, Qihua Wang
Принадлежит: International Business Machines Corp

Embodiments of the invention related to access control to sensitive data records, and in particular need-to-know information access using quantified risk. In one aspect of the invention access control includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. A warning is issued if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold.

Подробнее
24-01-2013 дата публикации

Host, image forming apparatus and control method thereof

Номер: US20130021649A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A host includes a user interface unit configured to receive an output command of a verification document, a image code generating unit configured to generate an image code, which includes time information, a control unit configured to perform control such that the verification document is output from an image forming apparatus by using a print data and the image code, and a communication interface unit configured to transmit the image code and the print data to the image forming apparatus. A image forming apparatus includes an user interface unit configured to receive an output command of a verification document, an image code generating unit configured to generate an image code including time information, and a control unit configured to perform control such that the verification document is generated by printing the image code and a print data, which is transmitted from a host, on a document and the generated verification document is output.

Подробнее
31-01-2013 дата публикации

Printing device and printing method

Номер: US20130027754A1
Автор: Kurato Maeno
Принадлежит: Oki Data Corp

The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The present invention provides a printing device comprising a document storage means for storing electronic document data generated at a printing instruction issuing terminal operated by a printing instruction issuer and transmitted from the printing instruction issuing terminal, an ID setting means for setting a print retriever ID of a print retriever who is to execute processing for outputting the electronic document data stored at the document storage means onto paper, a watermark information superimposing means for superimposing the print retriever ID having been set at the ID setting means as watermark information onto the electronic document data and a printing means for outputting the electronic document data having the watermark information superimposed thereupon by the watermark information superimposing means onto paper.

Подробнее
31-01-2013 дата публикации

Secure data storage

Номер: US20130031372A1
Принадлежит: iPhase3 Corp

Methods and systems for obscuring the location of critical system files are provided. In particular, the locations of files stored within a file system are selected by applying various inputs to a hash algorithm. For system files, the inputs applied to the hash algorithm can include a user name and password. For data files, the information provided to the hash algorithm can include the file name. In addition to providing random file locations, a file system in accordance with embodiments of the present invention can homogenize other information, including file names, sizes and creation dates.

Подробнее
21-02-2013 дата публикации

Optimization engine in a multi-tenant database system

Номер: US20130046752A1
Принадлежит: Salesforce com Inc

More efficient querying of a multi-tenant database using dynamic tuning of database indices. A layer of meta-data associates data items with tenants, e.g., via tags, and the meta-data is used to optimize searches by channeling processing resources during a query to only those pieces of data bearing the relevant tenant's unique tag.

Подробнее
21-02-2013 дата публикации

Building data security in a networked computing environment

Номер: US20130047230A1
Принадлежит: International Business Machines Corp

In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an extension to DB2®, Label-Based Access Control (LBAC), and/or an independent tool). Among other things, embodiments of the present invention provide cloud administrators with an easy to use customizable, configurable security constraint builder/tool with a built-in multi-tenant/customer enabled security model. Moreover, embodiments of the present invention enable cloud administrators to set up, configure, and manage tenants/customers and their private shards with their own security constraints. The output of this tool greatly eases the time to create an invisible (e.g., software) wall of separation for multiple tenants/customers in a shared cloud infrastructure.

Подробнее
28-02-2013 дата публикации

Mobile solution for importing and signing third-party electronic signature documents

Номер: US20130050512A1
Принадлежит: Docusign Inc

Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives a hard copy (e.g., paper) signature document, the signer may capture an image of the signature document with a camera of a mobile device. The signer can then import the captured image into the ESS for signature, storage, and/or transmission to other parties.

Подробнее
28-02-2013 дата публикации

Encrypted chunk-based rapid data encryption policy compliance

Номер: US20130054977A1
Принадлежит: Microsoft Corp

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.

Подробнее
28-02-2013 дата публикации

Sector map-based rapid data encryption policy compliance

Номер: US20130054979A1
Принадлежит: Microsoft Corp

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.

Подробнее
14-03-2013 дата публикации

Method for Enhancing Privacy of Internet Browser Users

Номер: US20130067588A1
Принадлежит: Individual

A method for enhancing the privacy of individuals who may be tracked while visiting different sites on the Internet using conventional browsers is disclosed. The method is based on randomizing the information collected in cookies that are used for tracking by different websites.

Подробнее
21-03-2013 дата публикации

ANTI-KEYLOGGER COMPUTER NETWORK SYSTEM

Номер: US20130073849A1
Автор: WANG Chi-Pei
Принадлежит:

An anti-keylogger computer network system includes a servo-side host computer, with a servo software which requires the user to enter confidential data. An application-side host computer is provided and a keyboard is connected to the application-side host computer. The keys on the keyboard are divided into a data key and control key. An application software is installed in the application-side host computer to receive the instructions from the servo software, and to determine when the anti-keylogger function of the keyboard module shall he started and closed. A connection network is provided for connecting the servo-side host computer to the application-side host computer. A Translate Table program is installed in the application-side host computer and a Translate Table translation program is installed in the servo software of servo-side host computer. 1. An anti-keylogger computer network system comprising:a servo-side host computer, with a servo software which requires the user to enter confidential data, such as user account, password, ID card numbers, birthday, credit card number, amount of transaction, quantity and so on;an application-side host computer;a keyboard, connected to the application-side host computer, the keys on the keyboard are divided into data key and control key;an application software, installed in the application-side host computer, for receiving the instructions from the servo software, and determining when the anti-keylogger function of keyboard shall be started and closed, and the application-side host computer is incapable of decrypting the encrypted key data, meaning the application software has no decoding algorithm and key settings;a connection network, for connecting the servo-side host computer to the application-side host computer;a Translate Table program, installed in the application-side host computer, the Translate Table program can translate the letter or value of data key pressed by the user into another letter or value and ...

Подробнее
21-03-2013 дата публикации

INFORMATION PROCESSING APPARATUS, SOFTWARE UPDATING METHOD, AND IMAGE PROCESSING APPARATUS

Номер: US20130073869A1
Автор: Segawa Hidekazu
Принадлежит: RICOH COMPANY, LTD

An information processing apparatus which updates a basic software package is disclosed. The information processing apparatus includes an encryption and decryption unit which stores values calculated uniquely from software and encrypts information based on the calculated values and decrypts encrypted information based on the calculated values. The basic software package includes a firmware authenticating module for authenticating a firmware updating file which includes new software for updating the basic software package, a value uniquely calculated from the new software, and a public key signature. The information processing apparatus further includes a software updating module which updates the basic software package by using the authenticated firmware updating file, and an encryption key managing module for encrypting again the information encrypted by the values based on a value changed by updating the basic software package. 120-. (canceled)21. An information processing apparatus includingan encryption and decryption unit configured to encrypt and decrypt information by using a first value uniquely calculated from software including a plurality of programs;a memory unit configured to store the information encrypted by the encryption and decryption unit; and a software updating unit configured to update the software; and', 'an encryption information managing unit configured to decrypt the encrypted information by using the first value, encrypt again the decrypted information by using a second value which is changed based on the update of the software,, 'a processing unit configured to execute the programs including a basic input/output system (BIOS) and a basic software package, the processing unit executing the basic software package comprisingwherein the BIOS, when executed by the processing unit upon startup of the apparatus, calculates a hash value of the BIOS and calculates a hash value of the basic software package,the encryption and decryption unit ...

Подробнее
21-03-2013 дата публикации

Signature Methods For Scientific Data Information Systems

Номер: US20130074196A1
Принадлежит: WATERS TECHNOLOGIES CORPORATION

A computer-implemented method that includes providing an authorized user with an option to define one more levels of a signature method, and providing the authorized user with an option to assign at least one user whose signature is required for each of the defined levels. 1. A computer-implemented method , comprising:providing an authorized user with an option to define one more levels of a signature method, andproviding the authorized user with an option to assign at least one user whose signature is required for each of the defined levels.2. The method of claim 1 , wherein providing the authorized user with the option to define one or more levels comprising displaying the option to define one or more levels in a graphical user interface.3. The method of claim 1 , wherein providing the authorized user with the option to assign at least one user whose signature is required for each of the defined levels comprises displaying the option to assign at least one user whose signature is required for each of the defined levels in a graphical user interface.4. The method of claim 3 , wherein displaying the option to assign at least one user whose signature is required for each of the defined levels comprises displaying a list of available users.5. The method of claim 4 , wherein the list of available users includes only users with permission to apply electronic signatures.6. The method of claim 1 , further comprising providing the authorized user with an option to assign at least one reason claim 1 , from a list of predefined reasons claim 1 , to each of an approved signature action and a rejected signature action.7. The method of claim 1 , further comprising providing the authorized user with an option to activate notification settings based on due dates claim 1 , wherein the notification settings trigger an automated distribution of notification to selected users when a due date for signature is near or is reached.8. The method of claim 7 , wherein providing the ...

Подробнее
28-03-2013 дата публикации

INTERACTIVE ELECTRONIC READER WITH PARENTAL CONTROL

Номер: US20130080471A1
Принадлежит:

An e-reader with a password protected supervisory account that controls various features and functions of the e-reader, and e-reader user profile accounts for reading users of the e-reader. The supervisory account permits the supervisor user to set up one or more e-reader user profiles that are each assigned its own customizable bookshelf for displaying the available electronic published content, such as, e-books. The electronic published content is assigned to each e-reader user profile through the supervisory account. The e-reader provides interactive content that reinforces development of reading skills and reading comprehension. The e-reader provides reading-level specific definitions and an audible pronunciation of the words. The e-reader has zooming and scrolling capabilities. The e-reader may also present suggestions and recommendations for further reading based on the aggregation of reading statistics for all readers by user profile. The e-reader tracks e-reader user information and presents the information to the password protected supervisory account. Multiple instances of the e-reader may exist and be associated with the supervisory account and e-reader user profiles. 1. An e-reader comprising;a memory for storing electronic published content and information relating to an e-reader account;a display for rendering the electronic published content into a visual form;a user input device; and verifying administrative access by a supervisor user associated with the e-reader account;', 'displaying a representation of electronic published content and a prompt for assigning the electronic published content to one or more e-reader user profiles;', 'associating the electronic published content with an e-reader user profile;', 'displaying a representation of the electronic published content to the e-reader user profile only while the electronic published content is associated with the e-reader user profile; and', 'enabling access by a user of the e-reader profile to ...

Подробнее
28-03-2013 дата публикации

Computer network storage environment with file tracking

Номер: US20130080515A1
Автор: Gary Stephen Shuster
Принадлежит: HOSHIKO LLC

A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. In particular, files that may be corrupted by alternation include executable software files and compressed files, which may be fault intolerant. Fault tolerant files, which may include text and graphics files, may not be noticeably affected. In some cases, copyrighted files, media files, and/or other files are altered to prevent undesirable distribution.

Подробнее
28-03-2013 дата публикации

METHODS AND DEVICES FOR MONITORING THE INTEGRITY OF AN ARTICLE DURING TRANSPORTING SAID ARTICLE

Номер: US20130080784A1
Автор: Oertli Christian
Принадлежит: Q-TAG AG

The method for obtaining information relating to the integrity of an article () as assessed from an exposure of said article () to physical or environmental conditions during a time span during which said article () is transported comprises 1. A method for obtaining information relating to the integrity of an article as assessed from an exposure of said article to physical or environmental conditions during a time span during which said article is transported , said method comprising the steps ofa) providing a device to be located in proximity to said article during said transport, digital certificate data and first digital private key data being stored in said device;d) storing in said device data related to said physical or environmental conditions, said data being referred to as integrity data;e) creating within said device first digitally signed data by digitally signing data comprising said integrity data and said digital certificate data, using said first digital private key data;f) storing said first digitally signed data in said device.2. The method according to claim 1 , wherein said integrity data are text-representing data.3. The method according to claim 1 , said device comprising at least one sensor for sensing said physical or environmental conditions claim 1 , said method comprising the step ofg) by means of said sensor, creating data representative of said physical or environmental conditions at various times during said time span, a data set comprising said data being referred to as environmental data;wherein said integrity data are identical with or different from said environmental data.4. The method according to claim 3 , wherein said integrity data are different from said environmental data claim 3 , and wherein said method comprises the step ofh) obtaining said integrity data from said environmental data.5. The method according to claim 4 , wherein step h) comprises the step ofh2) obtaining said integrity data from said integrity raw data;the ...

Подробнее
04-04-2013 дата публикации

Method for Certifying and Verifying Digital Web Content Using Public Cryptography

Номер: US20130086387A1
Принадлежит: Reuters Limited

There is provided a method of, computer programs for and apparatus for providing and accessing digital content such as a news item. A news provider generates a news item, creates a digitally signed version of the news item and packages them together with a digital certificate issued by a certificate authority containing the public key required to decrypt the digitally signed version. The package is posted to a server and is transmitted, or made available or transmission, over a public data network together with a computer program for verifying the news item. A receiving party receives, over the public data network, the package at a client device and is provided with means for launching, and if necessary first downloading, the verifying program. The verifying program uses the public key contained in the certificate to verify the digitally signed news item. Before being first used to verify a news item, the verifying program receives a shared secret from the receiving party which is stored locally to the client device and is used by the verifying program to confirm that it performed the verification process. 1. One or more non-transitory computer readable storage media storing executable instructions that , when executed , cause a system to perform a method of verifying displayable digital content , said method comprising:receiving from a user, information corresponding to a shared secret between the user and a verification application;subsequent to receiving the shared secret, receiving a request from the user to verify an item of displayable digital content;verifying the item of displayable digital content; anddisplaying a verification message to the user, said verification message comprising an indication of whether or not the item of displayable digital content was successfully verified, and further causing the shared secret to be displayed to the user to prove the message originated from the verification application.2. The one or more computer readable media of ...

Подробнее