Approach method for probe and sample in scanning probe microscope
In detecting a displacement of a cantilever (2) by a displacement detecting mechanism (5) and allowing a probe (1) and a sample (8) to approach each other by at...
Isolation environment-based information access
In an embodiment of isolation environment-based information access, programs--including operating systems and applications--running on a computing-based device...
Information display device
An information display device allowing a memory property display screen that continuously displays displayed content as it is even when a power supply is shut...
Task initiated account presentation for rights elevation
Systems and/or methods are described that enable a user to elevate his or her rights. In one embodiment, these systems and/or methods detect a task which is not...
Apparatus and method for processing digital document and computer program
A digital document processing apparatus stores a digital document, an application program used for editing the digital document, where the application program...
System and method for secure PIN exchange
A system and method for wirelessly exchanging an encryption key between a first device and a second device. The system generally includes: a transmitter,...
Method and apparatus for protecting digital data by double re-encryption
A method and an apparatus ensuring protection of digital data are provided. In addition to re-encrypting the data using an unchangeable key, the data is double...
System and method for deleting confidential information
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same...
Arrangement for controlling content distribution by dynamically
controlling bandwidth for transfer of the...
A broadband network device is configured, in a broadband network, for dynamically controlling an upstream link bandwidth of a user node configured for...
Probabilistic mechanism to determine level of security for a software
A mechanism for determining a probabilistic security score for a software package is provided. The mechanism calculates a raw numerical score that is...
Method, apparatus and system for enabling a secure location-aware platform
A method, apparatus and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing...
Method and equipment for verifying propriety of system management policies
to be used in a computer system
A policy verification method in an information processing system for verifying whether the policy rule operates correctly. The method verifies the policy in an...
Correlation engine for detecting network attacks and detection method
A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on...
Methods and systems for filtering electronic messages
A computer-implemented method for filtering electronic messages. The method may include identifying a first time period during which a user accesses electronic...
Methods and systems for using state ranges for processing regular
expressions in intrusion-prevention systems
Methods and systems are provided for using state ranges for processing regular expressions in intrusion-prevention systems. In an embodiment, in an...
Networked computer system with reduced vulnerability to directed attacks
An attacker is prevented from obtaining information about the configuration of a computer system. Each of one or more revealing content elements that may be...
File attachment processing method and system
A file attachment processing method and system. The method comprises generating by a first computing system, a configurable list comprising valid computer file...
Apparatus and method for facilitating network security with granular
An apparatus that facilitates network security for input network traffic includes microcode controlled state machines, each of which includes a computation...
Method and apparatus for protecting against buffer overrun attacks
A method and an apparatus are disclosed for monitoring and protecting a program system against buffer overrun attacks. The method includes identification of...
Method, apparatus and system for performing access control and intrusion
detection on encrypted data
A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a...
System and method for storing events to enhance intrusion detection
Storing events to enhance intrusion detection in networks is described. In one exemplary implementation, an event is received. The event includes a data section...
Network intelligence system
A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network...
Dynamic role based authorization system and method
A system, method and computer program product are provided for role based authorization. Included is a plurality of resources and roles associated with an...
Password generator, system and use thereof
A password generator for use with a detector and a verifier in an encapsulated system is provided, as is a system for generating and verifying passwords. The...
Methods and systems for imaging device credential submission
Embodiments of the present invention comprise systems, methods and devices for imaging device credential submission wherein credentials are extracted by...
Providing hints while entering protected information
One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as...
Portable secured computing environment for performing online confidential
transactions in untrusted computers
A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be...
Communication apparatus, program and method
A communication apparatus comprises a storage unit for storing a first network list indicating plural networks; a receiving unit for receiving a second network...
Method and apparatus for reliable, high speed data transfers in a high
assurance multiple level secure environment
A method and apparatus for passing data from a first application at a first security level to a second application in a second security level higher than the...
Packet firewalls of particular use in packet switching devices
One or more firewalls are used to perform firewall functionality on packets based on the entry and exit accesses of each of the one or more firewalls being...
System and methods for secure service oriented architectures
Provided is a method for intercepting a message between a requesting web service and a source web service, validating the message, logging the result of the...
Method and data processing system for intercepting communication between a
client and a service
A method and data processing system for intercepting communication between a user and a service. An authentication component receives, from the user, a user...
Method and system for providing remote secure access to a peer computer
A method and system for allowing a user to access a peer from a remote system are described. The method and system include authenticating the user for the peer...
Modular agent architecture
An agent architecture may be provided with base functionality that allows it to run without executing any applications. The base application need not have any...
Cumulative login credit
Login credit is monitored over a credit time period. Continuous invalid login attempts decrease the login credit for the duration of the credit time period....
Signing-in to software applications having secured features
The present invention automatically signs or logs a user in to access secured features within a software application without prompting manual intervention when...
System and method for authenticating components in wireless home
Configuration information is exchanged between a home entertainment system server and various wireless components by pushing a button on the server and a random...
Verifying user authentication
A solution for transparently verifying the authentication of a real user includes a monitor that receives network packets and a collector. The monitor...
System and method for defining attributes, decision rules, or both, for
remote execution, claim set I
A system of the invention comprises a design module, execution engine, and performance management module. A first computer hosts the design module which enables...
Domain based authentication scheme
In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary...
Relay device, authentication server, and authentication method
A relay device includes a security information reception unit, a security information processing unit, and a security information transmission unit. The...
Sketch-based password authentication
A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of...
System and method for crawl policy management utilizing IP address and IP
The present invention relates to a method for configuring a policy management protocol for a web crawler, the method further comprising the steps of determining...
Integrated guidance and validation policy based zoning mechanism
A mechanism is provided to automatically retrieve zoning best practices from a centralized repository and to ensure that automatically generated zones do not...
Application service policy compliance server
In a large network, it can be difficult to pinpoint and track down the causes of breaches of established policies. A compliance policy server allows traversal...
Policy-based method for configuring an access control service
A system and method for processing a request by a first control service using a first control specification language, and a second control service using a...
Techniques for managing security contexts
Techniques for managing security contexts may be described. An apparatus may comprise a processor and a security management module. The security management...
Identity-based encryption system for secure data distribution
A system is provided that allows encrypted content to be distributed to users over a communications network. A policy enforcement service may use an...
Broadcasting video content to devices having different video presentation
Frames of broadcast video received at a device are cropped to produce rendered frames on a display of the device, the cropping being based on both (a) a...
Method and apparatus for receiving digital video signals
A method and apparatus for storing a compressed video stream or an uncompressed video stream is disclosed. The uncompressed video stream may be ZOOM VIDEO data....