Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

129 results about "Trusted client" patented technology

In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not authorized by the provider of the service. That is, the client is a device that vendors trust and then sell to the consumers, whom they do not trust. Examples include video games played over a computer network or the Content Scramble System (CSS) in DVDs.

Secure and searchable storage system and method

A system and method for securely storing electronic documents is provided. The system includes a client portion and a server portion and the client portion is located at a trusted location. The client portion encrypts each electronic document and produces a list of terms of interest relating to the document, which terms are also encrypted. The encrypted document and the encrypted terms are transferred to a server portion which need not be located at a trusted location. The document is stored at the server portion in a manner which allows for locating the document again via the encrypted terms and returning the encrypted document to the trusted client portion, where it can be decrypted. Attachments to documents can also be encrypted and stored at the server, as can copies of dynamic documents, such as web pages. The server portion can also have a retention manager and encryptor which is used to implement document retention and destruction policies defined by the user of the system.
Owner:PROOFPOINT INC

Securing files under the semi-trusted user threat model using per-file key encryption

A computer system and methods for securing files in a file system with storage resources accessible to an authenticable user using an untrusted client device in a semi-trusted client threat model. Each file is secured in the file system in one or more ciphertext blocks along with the file metadata. Each file is assigned a unique file key FK to encrypt the file. A wrapping key WK assigned to the file is used for encrypting the file key FK to produce a wrapped file key WFK. The file is encrypted block by block to produce corresponding ciphertext blocks and corresponding authentication tags. The authentication tags are stored in the file metadata, along with an ID of the wrapping key WK, wrapped file key WFK, last key rotation time, an Access Control List (ACL), etc. The integrity of ciphertext blocks is ensured by authentication tags and the integrity of the metadata is ensured by a message authentication code (MAC).
Owner:ZETTASET

Network medical service system

The invention provides a network medical service system which is used for solving the problem that the existing medical service system requires specially-designed hardware products, requires installation and maintenance of professional staff, and is troublesome in later upgrading and using and high in cost. The network medical service system comprises a user client side, a doctor client side and a central server which are communicated with each other through networks. The user client side and the doctor client side of the network medical service system can operate smoothly on computers based on mainstream configuration of windows xp, windows 7 and the like, hardware devices required by the network medical service system can be purchased and upgraded easily and are low in cost, and the network medical service system is easy to maintain, low in maintenance cost and facilitates comprehensive achievement of digital illness diagnosis.
Owner:李希海

Integration development system, integration development method and integration development device for application programs

The invention provides an integration development system for application programs. The integration development system comprises a developer client, a cloud server and a user client. The developer client is used for sending a developer document to the user client and the cloud server; the cloud server is used for recognizing a service logic code according to an execution environment to obtain a cloud logic code, processing a digital code and synchronizing the same with the user client; the user client is used for recognizing the service logic code according to the execution environment to obtain a user logic code and receiving the synchronized digital code sent by the cloud server. The invention further provides an integration development method for the application programs, the cloud server and the user client. The codes can be automatically determined to be executed in the cloud client or the user client according to running logic of the codes, so that the cloud server code or the user client code needs not to be distinguished during development by developers, and developer groups with random backgrounds are allowed to independently develop the complete Web application programs.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Delegation of content filtering services between a gateway and trusted clients in a computer network

Method and system for performing content filtering services in a computer network. A gateway computer may be configured to be in the data path of network communications between client computers in a private computer network and computers in a public computer network. A master entity in the gateway computer may be configured to determine content filtering services available in the client computers. The master entity may delegate to the client computers performance of content filtering services that may be reliably performed in the client computers. Each of the client computers may include a trusted agent in communication with the master entity to coordinate content filtering in the private computer network.
Owner:TREND MICRO INC

Bluetooth low energy hostless private address resolution

Conventional Bluetooth low energy (or like personal wireless network) controllers cannot resolve private addresses without some calculation from a host processor but leaving the host processor on or awaking it from a sleep each time a non-trusted device attempts to connect wastes power. Hostless private address resolution allows a host controller to enter a sleep state off while the Bluetooth controller advertises its device name, primary services, rejects connection requests from non-trusted devices with public and private addresses, and awakens the host controller upon a connection request from a trusted client device with a public or private address. Not only does this approach reduce power consumption by allowing the host processor to remain in the sleep state it simultaneously ensures security by allowing the private address resolution to remain active on the Bluetooth controller.
Owner:GOPRO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products