Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

61results about How to "Prevent access" patented technology

Method, system, and program for encrypting files in a computer system

Provided is a method, system, and program for encrypting files in a computer in communication with a volatile memory and non-volatile storage device. An encryption code is generated to encrypt a file and a decryption code is generated to decrypt one file encrypted with the encryption code. The decryption code is loaded into the volatile memory, wherein the decryption code is erased from the volatile memory when the computer reboots. Files written to the non-volatile storage device are encrypted using the encryption code and the decryption code in the non-volatile memory is used to decrypt files encrypted with the encryption code to transfer from the non-volatile storage device to the volatile memory.
Owner:ORACLE INT CORP

System and Method for Third Party Creation of Applications for Mobile Appliances

The creation of an application for any mobile appliance, for example Apple's iPhone, requires several elements to be present at compile time. In the Apple example of an enterprise application where an entity wishes to develop applications internally for its staff, two of these elements are the source code and a digital certificate. These must be combined in the compiler so that the application may be properly authorized to run in the appliance. Where the owner of the source code and the owner of the digital certificate are not the same, serious concerns arise because each element must be secured. An intermediating system and method are described that allows each party to cooperate securely through a third party escrow service to produce the complied application whilst leaving no unwanted residue of the independent parts.
Owner:BLACKBERRY LTD

Theft deterrent system

Apparatus for dispensing products is disclosed. Certain embodiments of the apparatus include a housing adapted to store a plurality of products, at least one product dispensing mechanism within the housing, at least one theft deterrent mechanism for securing products within the housing, a power source within the housing, an electric motor within the housing for activating the product dispensing mechanism, and an operable control button mounted on the exterior of the housing and electronically connected to the power source and the motor so that activation of the button operates the motor. The apparatus may include a time delay to prevent multiple dispensing within a particular time period. The apparatus may include a sound producing mechanism to alert others of the dispensing of a product.
Owner:ROCK TENN SHARED SERVICES

Content Delivery Network Having Downloadable Conditional Access System with Personalization Servers for Personalizing Client Devices

A content delivery network and method employing a Downloadable Conditional Access System (“DCAS”) includes first and second personalization servers. A unit key list having unique keys is segmented into different blocks. Each block is encrypted with a separate transmission key corresponding to that block such that first and second blocks are respectively encrypted with first and second transmission keys. The encrypted blocks are communicated to the personalization servers. The first transmission key is communicated to the first personalization server without being communicated to another personalization server such that the first server can decrypt the first block using the first transmission key to access the keys of the first block. The second transmission key is communicated to the second personalization server without being communicated to another personalization server such that the second server can decrypt the second block using the second transmission key to access the keys of the second block.
Owner:COMBINED CONDITIONAL ACCESS DEV & SUPPORT

System and method for limiting access to features in a mobile telecommunications device

A mobile telecommunications device with a processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions being executable to implement a method for childproof operation wherein the user's access is limited to a subset of applications and services while the device is in childproof mode. A preferred embodiment includes providing a default set of applications and services to enable while in childproof mode and allowing the user to individually specify the applications and services to enable while in childproof mode.
Owner:SHARP LAB OF AMERICA

Instantaneous non-blocking content purging in a distributed platform

Some embodiments provide instantaneous and non-blocking content purging across storage servers of a distributed platform. When a server receives a purge operation, it extracts an identifier from the purge operation. The server then generates a content purge pattern from the identifier and injects the pattern to its configuration. Instantaneous purging is then realized as the server averts access to any cached content identified by the pattern. The purging also occurs in a non-blocking fashion as the physical purge of the content occurs in-line with the server's cache miss operation. The content purge pattern causes the server to respond to a subsequently received content request with a cache miss, whereby the server retrieves the requested content from an origin source, serves the retrieved content to the requesting user, and replaces a previously cached copy of the content that is to be purged with the newly retrieved copy.
Owner:EDGIO INC

Inter integrated circuit bus router for preventing communication to an unauthorized port

An inter-integrated circuit port comprising an electrical connector for communicatively coupling to an I2C bus and a controller coupled to the electrical connector. The controller controls data communication flow through the electrical connector, including preventing the electrical connector from unauthorized access to the data.
Owner:HEWLETT PACKARD DEV CO LP

Container assembly

A container assembly for the storage and transport of goods, the assembly including a first portion having an interior with a substantially flat interior bottom surface. The assembly further includes a second portion pivotally connected to the first portion. The first portion has an outer surface that includes a first stacking pattern and the second portion has an outer surface that includes a second stacking pattern which is different from the first stacking pattern and configured to engage the first stacking pattern enabling the container assembly to be bi-directionally stacked on another of the container assemblies.
Owner:CASE-MATE +1

Locking mechanism override and disable for personal computer ROM access protection

A method and system for overriding access locks on secure assets in a computer system. The system includes a processor and a device coupled to the processor. The device includes one or more sub-devices, one or more access locks, and an access lock override register that stores one or more access lock override bits, including a lock override bit. The one or more access locks are configured to prevent access to the one or more sub-devices when the one or more access locks are engaged. Access to the one or more sub-devices is not allowed when the lock override bit is set. The method includes requesting a memory transaction for one or more memory addresses and determining a lock status for the one or more memory addresses. The method also includes returning the lock status for the one or more memory addresses. The method may determine if the lock status for the one or more memory address can be changed. The method may change the lock status of the one or more memory addresses to allow the memory transaction.
Owner:GLOBALFOUNDRIES INC

System and method for secure provisioning of a mobile station from a provisioning server using encryption

There is disclosed a security device for use in a wireless network comprising a plurality of base stations that communicate with a plurality of mobile stations. The security device prevents unprovisioned mobile stations from accessing an Internet protocol (IP) data network through the wireless network. The security device comprises a first controller for receiving from the unprovisioned mobile station an IP data packet comprising an IP packet header and an IP packet payload and encrypting at least a portion of the IP payload. The security device also comprises a second controller for determining that the unprovisioned mobile station is, in fact, unprovisioned. In one embodiment, the first controller comprises a data processor that executes an encryption program stored in a memory associated with the data processor.
Owner:SAMSUNG ELECTRONICS CO LTD

System and method for providing global media content delivery

One embodiment of the present invention enables global delivery of “on-demand” high fidelity media content to client computers via a network, such as, the Internet or a wide area network (WAN) while restricting unauthorized users from directly retrieving media content from its sources. The present embodiment includes a global media content delivery network that may include multiple “points of presence” which may be located throughout the world. Each point of presence may store a portion or the entirety of a media content library that may be provided to client devices. Each one of the points of presence may provide media content to client devices in their respective vicinity of the world. Once a client receives media, it is stored using hidden directories to prevent easy redistribution with other devices. An access key procedure and rate control restrictor may also be implemented to monitor and restrict suspicious media requests.
Owner:MUSIC PUBLIC BROADCASTING

Identifying risks in conflicting duties

An audit system includes a set of business processes that describe the operations of an enterprise. The audit system has a registry of incompatible business functions created from a library of business processes. Each pair of incompatible business functions is associated with one or more risks. Each risk can include a category, a risk probability, and / or a risk impact. An audit manager compares the business function incompatibilities of the registry with the set of business functions assigned to the employee, and a report generator creates a report identifying the risk introduced by the match. The audit manager creates an audit task in response to a match. An impacted financial statement manager displays a financial statement, a set of financial accounts, a set of business functions and the set of risks associated with the set of financial accounts.
Owner:ORACLE INT CORP

System and method for preventing disk cloning in set-top boxes

A set-top media system is disclosed which can be combined with an open architecture personal computer (PC) to provide a feature-rich secure integrated media center while meeting security rules of most major conditional access and content protection industry rules such as Cable Labs DFAST and PHILA agreements; and DTLA agreements for 5C-DTCP for IEEE1394, USB, and IP. The set-top media center and PC share common resources such as high definition display, remote control, hard disk drive, and other external unsecure storage devices. All media content is available seamlessly using a PC user interface, including controlled-content media such as high definition TV, within a PC desktop window. All controlled-content media is manipulated and managed within the set-top media system in a seamless manner. A novel mechanism is disclosed to allow controlled-content media to be stored on unsecure devices in encrypted form while overcoming the disk cloning attack problem for move operations. One embodiment utilizes a “grey list” of available programs to keep track of controlled-content media which is allowed to be played, while another embodiment utilizes a “black list” of programs no longer available to keep track of controlled-content media which is forbidden from being played.
Owner:ENCENTRUS SYST

Memory access protection apparatus and methods

Methods and apparatus for providing access to a shared memory resource. In one embodiment, a first processor generates a first window register associated with the shared memory resource; and transmits the first window register from the first processor to a second processor, the first window register defining a first extent of address space within the shared memory resource that is directly accessible by the second processor without requiring a performance of arbitration operations by the first processor.
Owner:APPLE INC

Autonomic removal of a user from a client and network

A method that restricts a user's access to critical data on a client and network by requiring renewal of a client's lease for accessing the network by an administrative utility of the network during each login by a user to the client. A user / client logon policy is created for each user and / or each client and stored at the lease server. The lease server executes a utility that utilizes the policies to control whether a user is allowed to access a particular client on the network. User access to the client and ultimately the network is only provided when the lease term is renewed for the client (and user). When a lease term is not renewed / extended, the user is blocked from accessing the client system.
Owner:LENOVO (SINGAPORE) PTE LTD

Secure ephemeral decryptability

A method and apparatus for securely communicating ephemeral information from a first node to a second node. In a first embodiment, the first node encodes and transmits an ephemeral message encrypted at least in part with an ephemeral key, from the first node to the second node. Only the second node has available to it the information that is needed to achieve decryption by an ephemeral key server of a decryption key that is needed to decrypt certain encrypted payload information contained within the message communicated from the first node to the second node. In a second embodiment the first node transmits to the second node an ephemeral message that is encrypted at least in part with an ephemeral key. The ephemeral message includes enough information to permit the second node to communicate at least a portion of the message to an ephemeral key server and for the ephemeral key server to verify that the second node is an authorized decryption agent for the message. After verifying that the second node is an authorized decryption agent for the message, the ephemeral key server returns to the second node an encrypted decryption key that is needed to decrypt the encrypted message. The ephemeral message may comprise an encrypted decryption key that may be used after decryption of the decryption key to decrypt other encrypted information communicated to the second node.
Owner:ORACLE INT CORP

Resource sequester mechanism

A method and system for controlling access to selected resources in a computer system. The system includes a processor and a device coupled to the processor. The device includes one or more sub-devices and one or more access locks. The access locks are configured to prevent access to the sub-devices when the access locks are engaged. The device may include a bridge. The sub-devices may include a duration timer, mailbox RAM, locks for a storage device, overrides for the locks for the storage device, a TCO counter, a monotonic counter, scratchpad RAM, and / or a random number generator. The method includes unlocking security hardware and accessing a first device. The method also includes locking the security hardware and calling an SMM exit routine.
Owner:GLOBALFOUNDRIES INC

Network interface device, apparatus, and methods

A line module includes a plurality of pivoting insulation displacement connector holders, an insulation displacement connector (IDC) positionable in at least one holder when the holder is in a connected position, and a gel-less jack in electrical communication with at least one IDC.
Owner:CORNING OPTICAL COMM LLC

System and method for securely transfering content from set-top box to personal media player

A media player is provided for receiving session data from a security socket layer. The session data includes encrypted content data, a content key and digital rights data, wherein the content key and the digital rights data have been encrypted with a SSL session key. The said media player includes a first processor portion and a second processor portion. The first processor portion is arranged to receive the session data, has a second key. The first processor portion and can generate the SSL session key and can decrypt the session data with the SSL session key. The first processor portion can further re-encrypt the decrypted content key with the second key and can output the re-encrypted content key and digital rights data. The second processor portion is arranged to receive the re-encrypted content key and digital rights data. The first processor portion can further decrypt the content, and is externally inaccessible.
Owner:GOOGLE TECH HLDG LLC

Computer start-up timing control device and method thereof

A computer start-up timing control device and a method thereof are provided for generating a power supply signal to enable a power supply unit (PSU) to provide power. The device includes a chipset, a delay circuit, and a logic gate. The delay circuit delays a standby power ready signal of the computer to generate a standby power delay signal. The chipset generates a power supply signal. The standby power delay signal enables the logic gate to transmit the power supply signal to the PSU via the logic gate. The PSU provides a power to make the computer enter a start-up procedure. The standby power delay signal delays the time for the chipset to send a power supply signal, so that a baseboard management controller (BMC) has enough time to complete initialization. Therefore, the chipset is prevented from accessing the BMC and obtaining erroneous information before the BMC finishes initialization.
Owner:INVENTEC CORP

Method and device for data communication in a network

The invention relates to a communication device and a method of sending data over a communication network. The communication device includes a controller for accessing the network using contention type access mechanism based on computation of back-off values, and includes a plurality of traffic queues for serving data traffic at different priorities. The controller includes a plurality of back-off engines, each associated with one traffic queue and configured to compute a back-off value in accordance with the priority of the associated traffic queue. One or more back-off engine may be adjusted to prevent the back-off value of such back-off engine to reach zero. When an access to the network is obtained for the device. a traffic queue may be selected based on its associated back-off value, and data may be transmitted from the selected traffic queue.
Owner:CANON KK

Data processing device and data processing method

A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and decrypts data that is read from the HDD. A CPU of the data encryption device receives a command issued from the HDD controller to the HDD, and determines whether the command is executable at the HDD. When it is determined that the command is executable, the command is issued to the HDD. On the other hand, when it is determined that the command is unexecutable, the CPU prohibits issuance of the command to the HDD. Furthermore, when a command issued to the HDD is a specific command, the CPU bypasses data transferred between the HDD controller and the HDD without encryption or decryption.
Owner:CANON KK

Method and apparatus for selecting an encryption integrated circuit operating mode

A method and circuit for preventing external access to secure data of an integrated circuit while supporting DFT is disclosed. In accordance with the method the integrated circuit is automatically placed into the test mode at integrated circuit power-up from a power-down state. At power up, secure data is other than present within a secure data-path of the integrated circuit. Access is provided to the secure data path via a second data path coupled with the first secure data-path. Via the access path, data other than secure data is provided to the integrated circuit, the data for performing test functions of the integrated circuit operating in the test mode. Once data other than secure data is provided to first secure data path, the test mode is terminated and access via other than the secure ports is disabled. The test mode is only re-entered by powering down the integrated circuit and re-initialising it.
Owner:TAIWAN SEMICON MFG CO LTD

Covering apparatuses for prevention of bed bug intrusion and methods of use thereof

A bed covering apparatus that prevents bed bugs from intrusion to an enclosed sleeping area, wherein the bed covering apparatus has a net for exclusion of insects, and also contains at least one slippery section to which bed bugs cannot adhere, thereby causing the bed bugs to fall from the netted sleeping area before they have an opportunity to enter the sleeping enclosure.
Owner:PARK JEE SUN +2

Device having secure jtag and debugging method for the same

A method of debugging a device which includes a plurality of processors is provided. The method includes verifying a request to initiate authentication that is provided to the device to a user; performing a challenge-response authentication operation between the user and the device in response to the request to initiate authentication being a request from a non-malicious user; activating or deactivating an access to a Joint Test Action Group (JTAG) port of each of the processors, based on access control information from the user; and permitting a debugging operation via an access that is activated.
Owner:SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products