Entries |
Document | Title | Date |
20080201783 | Document file, document file generating apparatus, and document file usage method - A document file is configured to restrict, without a costly special-purpose terminal or the like, use of document data contained therein, if the document data is taken out of a predetermined location. A document file contains (i) electronic document data, (ii) usage location information indicating one or more usage locations in which use of the electronic document data is less restricted, and (ii) a data management program that causes, when a user requests use of the electronic document data, a computer to request for user location information indicating the current location of the user. Under control of the data management program, use of the electronic document data is permitted within a first usage pattern, if the user location is included in the usage locations. If not, use of the electronic document data is prohibited or permitted within a second usage pattern which is more restricted than the first usage pattern. | 08-21-2008 |
20080201784 | METHODS AND APPARATUS FOR SECURE DOCUMENT PRINTING - A secure document printing system is provided. A policy server is used to define access rules for a document, and select individual users and/or groups that will have access to the document. The policy server stores the access rules along with a document decryption key. The policy server's name and address are packed in the document, and then encrypted and sent to a print server which stores it for later access. A recipient is notified that the document resides on a particular print server. The print server retrieves the specified document, contacts the policy server named in the document, and requests the document decryption key and access rules for the user, print server, and document from the policy server which replies with the related decryption key and access rules. The print server decrypts the document and prints the document based on the access rules. | 08-21-2008 |
20080209571 | Device for Secure Access to Digital Media Contents, Virtual Multi-Interface Driver and System for Secure Access to Digital Media Contents - A device for secure access to digital media contents, the device comprising an access means for accessing digital media contents from a data source and a reader for authenticating a user, the authentication being performed by checking some authentication data. An internal communication path between the access means and the reader is not directly accessible from outside the device. | 08-28-2008 |
20080209572 | Data Processing System, Data Processing Method, and Management Server - A technique is provided for maintaining the security of the secret data. | 08-28-2008 |
20080209573 | METHODS AND SYSTEMS FOR DISTRIBUTING ADVERTISEMENT-SUPPORTED SOFTWARE WHILE ENSURING CERTAIN SOFTWARE FREEDOMS BY LICENSE - Embodiments related generally to a method of delivering software. The method includes providing the software that includes an advertising module. The software is distributed under a license, which requires the advertising module to be distributed and active with the software. The license may also permit modification of the software and/or redistribution of the software under similar licensing terms. | 08-28-2008 |
20080209574 | Partitioning data on a smartcard dependent on entered password - In one embodiment, an apparatus and method for partitioning data on a smartcard dependent on an entered password are disclosed. In one embodiment, the method includes maintaining multiple containers in a smartcard, associating a different personal identification number (PIN) with each of the multiple containers, and accessing contents of a container when an associated PIN for the container is provided by a user of the smartcard. Other embodiments are also described. | 08-28-2008 |
20080216178 | METHOD OF ACCESSING MULTIMEDIA CONTENT IN ACCORDANCE WITH INFORMATION OF A RECORDING MEDIUM - This invention relates to a process for an individual ( | 09-04-2008 |
20080229430 | METHOD FOR PREVENTING PRANK ORDERS FOR INTERNET PURCHASING - A system and method are provided for establishing a secure user account, comprising contacting a registration server by a user and then providing, by the user, identification information of the user that identifies a verifiable hardware user device having third-party verifiable account information associated with it. The registration server sends, to the user, a verification contact address. The user then contacts the verification server, which may be the registration server, at the verification contact address using the verifiable hardware user device. The verification server then obtains the third-party verifiable account information from a third party associated with the verifiable hardware user device. Finally, the verification server authorizes the secure user account if the third-party verifiable account information matches, in part, the identification information provided by the user. | 09-18-2008 |
20080235808 | Method and Apparatus for Protection of Content Using Biometric Watermarks - A method and apparatus are that restrict access to digital content to an authorized user on one or more systems using biometric watermarks. The disclosed biometric watermarking techniques allow an authorized user to be uniquely identified. Access to digital content is restricted to digital content in accordance with the present invention by embedding a biometric watermark, such as a biometric image, in the content. Thereafter, a user can only access the content if a biometric sample of the user matches the embedded biometric watermark. In one variation, the user can only access the content if the biometric sample is a live biometric sample. The embedded biometric watermark optionally includes information describing a system employed by the user to obtain the content. The user can optionally be permitted to access the content, without a biometric evaluation, if the content is on a system that has been previously authorized for the user using a biometric evaluation. | 09-25-2008 |
20080235809 | Restricted erase and unlock of data storage devices - A data storage device in which access to user data is restricted. The data storage device includes a data memory having memory locations that store user data. The device also has a program memory. The program memory includes first program code that enables a user to create a first device security ID and thereby restrict access to the stored data. Second program code, also included in the program memory, is capable of receiving a security command and comparing a second device security ID associated with the received security command to a stored security key. If the second device security ID and the stored security key correspond, then authentication with the first device security ID is bypassed and access is provided to the stored data. | 09-25-2008 |
20080244756 | AUTHENTICATED PRINTING SYSTEM AND AUTHENTICATED PRINTING METHOD - An authenticated printing system includes a job creation unit that creates a print job in accordance with a direction of a user, a job holding unit that holds the print job created by the job creation unit, an authentication information acquisition unit that generates authentication information based on information acquired from an authentication device, an authentication unit that receives the authentication information generated by the authentication information acquisition unit and performs authentication of an user on the basis of the authentication information, and a print unit that acquires the print job of an authenticated user from the job holding unit and prints the print job in a case where the user is authenticated by the authentication unit. The authentication unit includes a process section that acquires the authentication information of an owner of the print job from a database and stores the authentication information in a cache as authentication usable information when the print job is held by the job holding unit, and a process section that performs the authentication of a user based on whether the authentication information generated by the authentication information acquisition unit is stored in the cache. | 10-02-2008 |
20080244757 | Vehicle control device and data rewriting system - A vehicle control device and a data rewriting system prevent a person having no permission from rewriting the data of the vehicle control device. When the vehicle control device rewrites the data thereof based on rewrite data distributed from a control center through a radio communication network, the vehicle control device performs a user identification check based on the verification whether an ID code manually inputted by a user coincides with an ID code previously stored in a vehicle. The vehicle control device permits the user to rewrite the data based on the distributed rewrite data on condition that the user is identified as a privileged user permitted to rewrite the data. | 10-02-2008 |
20080250506 | Device for Collecting, Looking Up and Processing Data, in Particular Medical Data - The inventive device for collecting, looking up, and processing data, in particular medical data, includes at least one mobile computer medium for recording data, the reader/writer and, if necessary, at least one fixed computer medium for data recording. The mobile and fixed computer media are embodied in such a way that they remotely communicate with each other by the reader-writer, through a communication network, like the Internet. The mobile computer medium includes a reading/writing mechanism which makes it possible to simultaneously read data recorded thereon, and write new data, while performing entirely from the mobile medium. | 10-09-2008 |
20080250507 | Information Sharing System, Information Processing Device, and Control Program - In an information sharing system including an information reading device and an information processing device, the information reading device includes: a member information reading unit for reading member information from member discrimination cards respectively owned by a plurality of members; and a transmitting unit for transmitting the member information read by the member information reading unit to the information processing device. The information processing device includes: a receiving unit for receiving the member information transmitted from the transmitting unit; an address information detection unit for detecting address information corresponding to the received member information; and an information sharing member list forming unit for forming an information sharing member list based on the address information detected by the address information detection unit. | 10-09-2008 |
20080250508 | System, Device and Method for Interoperability Between Different Digital Rights Management Systems - A system, device and method for allowing protected content to be transferred to end user communication devices that support different digital rights management (DRM) formats or schemes than the DRM format of the content provider. The method includes providing a Limited Rights Issuer (LRI) that issues content and associated digital rights to one or more of the end user devices within a domain defined by a Domain Authority with which the LRI has registered. The Limited Rights Issuer also translates content and associated digital rights information from the DRM format of an upstream DRM system to the DRM format of a downstream DRM system, which includes the end user devices within the defined domain. The system allows select end user devices to enjoy interoperability of content protected under different DRM schemes, while allowing content providers to still maintain a suitable level of DRM protection for their content. | 10-09-2008 |
20080263675 | System and method of network printing - A method of printing a document, the method includes assigning a permission classification to a document to be printed; assigning a user permission profile to a user; and determining from the user permission profile and the permission classification of the document whether the user is authorized to print the document. Another method of printing a document includes assigning a permission classification to a document to be printed; assigning a printer permission profile to each of a number of network printers; and determining from the permission profile of the network printer and the permission classification of the document whether a the network printer is authorized to print the document. | 10-23-2008 |
20080263676 | SYSTEM AND METHOD FOR PROTECTING DATA INFORMATION STORED IN STORAGE - A system and method are provided for protecting data information stored in a storage medium. The system includes a memory unit which is divided into a plurality of storage regions in which data information is stored; a domain unit which includes a plurality of OS domains, which are access subjects, and loads the data information stored in the storage regions that are accessed by the OS domains; and a control unit which controls access of the domain unit to the memory unit. | 10-23-2008 |
20080289049 | TECHNIQUES FOR PERSONALIZING CONTENT - Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the policy evaluation to rewrite and modify the content. The modified content is then delivered to the requesting principal to personalize the content for the principal. | 11-20-2008 |
20080289050 | Copyright Protection Storage Medium, Information Recording Apparatus and Information Recording Method, and Information Playback Apparatus and Information Playback Method - To provide a copyright protection storage medium in which copyright protected contents are recorded by an information recording apparatus connected to a content server providing copyright protected contents and a license server handling licenses concerning recording/playback of the copyright protected contents through a network, in which the copyright protected contents are written by a simple copy-and-paste when the information recording apparatus is possessed by a prescribed user, and the copyright protected contents are written by combining a domain model which assures playback in the apparatus and a media-bind model when the information recording apparatus is possessed by another user. | 11-20-2008 |
20080289051 | INFORMATION PROCESSING APPARATUS AND SYSTEM, COMPUTER READABLE RECORDING MEDIUM, AND INFORMATION PROCESSING METHOD - An information processing apparatus includes: an authenticating unit that authenticate a user; a registering unit that reads operation setting information registered by a user who is not the authenticated user, and registers the operation setting information as the operation setting information of the authenticated user; and a controller that performs a control operation to prohibit a disclosure or registration of the operation setting information, when the operation setting information registered by the user who is not the authenticated user includes operation setting information that is prohibited from being used by the authenticated user or being disclosed to the authenticated user. | 11-20-2008 |
20080301820 | OFFLINE DATA DELETE WITH FALSE TRIGGER PROTECTION - Systems and methods for protecting data stored on an electronic device from access by an illegitimate user are presented. The data is protected by activating an offline data delete module installed in the electronic device to conditionally delete the data according to the following criteria: after establishing a first communication between an agent installed in the electronic device and a remote server, obtaining a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time. After obtaining a password from the user, deleting at least some data stored on the electronic device after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained. | 12-04-2008 |
20080313743 | Network Software License Management and Piracy Protection - Apparatus having corresponding methods and computer-readable media comprise an input circuit to receive, from a license management server, a check-in sequence representing a plurality of different check-in times; a processor to execute a software product comprising an application, and a client license management module to add timestamps to a check-in record at the check-in times; and an output circuit to transmit the check-in record to the license management server; wherein the license management server performs a comparison between the check-in record and at least one of the check-in sequence, and an earlier check-in record previously sent by the client license management module to the license management server; and wherein the license management server transmits a violation message to the client license management module when the comparison fails; and wherein the client license management module disables the application based on the violation message. | 12-18-2008 |
20080313744 | Computer Readable Medium Embodying Control Program, Image Forming Apparatus, Control System, and Control Method - Disclosed a computer readable medium embodying a control program enabling a computer to function as: a save control section to save document data of a first document including secret information at a predetermined saving position; a code generating section to generate a code in which address information of the saving position and opening range information defining an opening range of users to whom the secret information is opened are recorded; and an output control section to enable printing or displaying a second document in which a specified position of the first document is obscured and the code is added. | 12-18-2008 |
20080313745 | METHOD AND APPARATUS FOR PREVENTING ILLEGAL REUSE OF DIGITAL RIGHT MANAGEMENT CONTENT IN PORTABLE TERMINAL - A method and apparatus for preventing illegal reuse of Digital Right Management (DRM) content in a portable terminal is provided. The method includes performing user authentication when there is an attempt to restore a Right Object (RO) backup file, and identifying information on the RO backup file to be pre-restored in a terminal, and determining if the RO backup file can be restored according to the identified information. | 12-18-2008 |
20080320601 | PROVIDING ACCESS RIGHTS TO PORTIONS OF A SOFTWARE APPLICATION - Techniques for providing access rights to different portions of a software application to one or more authorized users are described herein. An issuance license may be inserted into the software application that divides the software application into one or more portions and identifies, for each portion, one or more users that are authorized access to the portion. Each portion of the software application may then be encrypted using, for example, a different cryptographic key. When the software is executed, an end user license may then be requested that corresponds to a particular user and that entitles the particular user access to each portion of the software application that the issuance license identifies the particular user as being authorized to access. The end user license may then be used to decrypt each portion of the software application that the issuance license identifies the particular end user as being authorized to access. | 12-25-2008 |
20080320602 | Method And System For Authenticating A User - Method of authenticating a user in a heterogeneous computer environment. The method may include defining a set of unique prefixes, each prefix identifying a type of user repository; defining a set of abstract repository names, each abstract repository name identifying an address of a user repository; and authenticating the user in the heterogeneous computer environment by assigning a sequence comprising a unique prefix, a reference to an abstract repository name and a unique identifier for the user within the user repository indicated by the reference to the abstract repository name. | 12-25-2008 |
20080320603 | ACCESS RIGHT MANAGEMENT APPARATUS, ACCESS RIGHT MANAGEMENT METHOD AND RECORDING MEDIUM STORING ACCESS RIGHT MANAGEMENT PROGRAM - An access right management apparatus, which includes: a management unit that manages permission and denial of access to an electronic document; a request reception unit that receives a request for an access right to access the electronic document; a determination unit that, when the request reception unit receives the request, determines whether or not the access to the electronic document is permitted to a requestor of the request based on the management unit; an access right provision unit that provides the access right to the requestor when the determination unit determines that the access to the electronic document is permitted to the requestor; and a changing unit that changes the denial of the access to the electronic document managed by the management unit to permission according to a history of provision of the access right to the requestor. | 12-25-2008 |
20080320604 | Controlling Program, Image Forming Apparatus and Print Controlling Method - There is described an image forming apparatus, which makes it possible to securely prevent the secret information from leaking out to unauthorized personnel. The apparatus includes: a display section to display a first document that includes secret information; an operating section to designate a concealing position in the first document and establish a disclosable range of the secret information, therefrom; a storage control section to store document data, designation positional information and disclosable range information, while correlating them with each other; an authenticating section to determine whether or not a user coincides with the disclosable range, based on identification information of the user; and a printing section to print either at least a copy of the first document, when the user coincides with the disclosable range, or copies of a second document, when the authenticating section determines that the user does not coincide with the disclosable range. | 12-25-2008 |
20080320605 | METHOD AND SYSTEM FOR TRACKING AND MANAGING RIGHTS FOR DIGITAL MUSIC - A method for digital rights management for a copyright work that is copied from device to device from among a plurality of devices, some of which are parent devices and some of which are child devices, and wherein a child device may be registered with a parent device, including copying a digital work from a parent device, P | 12-25-2008 |
20090007279 | Rights enforcement of unencrypted content - In accordance with one or more aspects of the rights enforcement of unencrypted content, a nameplate associated with unencrypted content is generated. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The nameplate is sent to a device of the authorized user for rights enforcement of the unencrypted content on the device. In accordance with one or more other aspects of the rights enforcement of unencrypted content, a nameplate for unencrypted content to be played back on a device is obtained. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The device presents, during playback of the unencrypted content on the device, the identifier of the authorized user of the unencrypted content. | 01-01-2009 |
20090019553 | TAGGING PRIVATE SECTIONS IN TEXT, AUDIO, AND VIDEO MEDIA - The present invention comprises a method for the creation of designated private segments within a medium stream comprising determining at least one subsection of information content of the media stream that is to be designated as confidential, and granting permission to a party to access the at least one subsection of information content that has been, designated as confidential. The medium stream is delivered and presented to the party, wherein the at least one subsection of information content that has been designated as confidential is not presented to the party. Further, access validation is requested from the party in regard to accessing the at least one subsection of information content that has been designated as confidential and presenting the at least one subsection of information content that has been designated as confidential to the party in response to received access validation. | 01-15-2009 |
20090025089 | Security System Based on Input Shortcuts for a Computer Device - A method of activating security functions on a computer device, for example a mobile communications device. The computer device includes a device state that may be realized by way of a first user input or a second user input. The method includes designating the first user input to realize the device state as a security rule having an associated security function, detecting realization of the device state, and activating the associated security function if the device state was realized by way of the second user input rather than the first user input. For example, the first user input may be a shortcut input, and the second user input may be a conventional or normal input. | 01-22-2009 |
20090025090 | DIGITAL SAFETY DEPOSIT BOX - A system that enables secure data storage into a third party managed electronic storage vault is disclosed. This electronic storage vault provides customers with a secure location to store important data such as insurance policies, automobile titles, deeds, wills, birth certificates, tax documents or the like. An interface can be provided which secures (e.g., encrypts, digitally signs) data related to transmission, storage and retrieval. A management component can be employed to regulate (e.g., authenticate) deposit or access of documents to/from the storage vault. | 01-22-2009 |
20090025091 | ELECTRONIC APPARATUS AND INFORMATION PROCESSING APPARATUS - The electronic apparatus includes: a timer for measuring an elapse time duration under a component-disengaged state after detection of the disengaged state by the sensor; a copy controlling unit for making data stored in the recording unit to be copied in a storage unit of the information processing apparatus; and a deleting unit for deleting data stored in the recording unit. The copy controlling unit makes data stored in the recording unit to be stored in the storage unit of the information processing apparatus when the timer detects elapse of a first predetermined time duration, and the deleting unit deletes data stored in the recording unit when data stored in the recording unit is copied in the storage unit. This makes it possible to prevent loss of data stored in the recording unit of the electronic apparatus, and to improve data confidentiality, and to prevent confidential information leakage. | 01-22-2009 |
20090044283 | DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT SYSTEM AND METHOD, AND COMPUTER-READABLE MEDIUM - There is provided a apparatus including a unit that, when receiving a second document derived from a first document, registers a derivation relationship indicating that a parent of the second document is the first document; a unit that, when receiving a branching instruction in association with the second document, generates a new group and registers information indicating that the second document belongs to the new group and that, when receiving no branching instruction in association with the second document, registers information indicating that the second and the first document belong to the same group; a unit that registers an access right in association with the group; and a unit that, when receiving a request for an operation of a document from a user, based on an access right corresponding a group to which the document belongs, controls whether to allow the user to perform the operation of the document. | 02-12-2009 |
20090049558 | SYSTEM AND METHOD FOR TRACING TARDOS FINGERPRINT CODES - A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy. | 02-19-2009 |
20090055936 | METHOD AND SYSTEM FOR THE USER-SPECIFIC INITIALIZATION OF IDENTIFICATION DEVICES IN THE FIELD - The invention relates to a method and system for the user-specific initialization of identification devices in the field, particularly on-board units in road toll systems, based on a central facility, whereby each identification device, when delivered, has a unique device identification to which, in the central facility, a unique user identification is assigned, and in the central facility, an initialization PIN is generated from the device identification and from the user identification and is transmitted to the identification device from which the identification device, based on its device identification, computes the user identification for the user-specific initialization. | 02-26-2009 |
20090055937 | System, Method and Machine-Readable Medium for Periodic Software Licensing - A system and method for periodically licensing a software having a server configured to receive a first request code for a term extension of a software license, the request code being initiated by a user of an application unit, the term extension allows the software to operate within a predetermined period of time, provide advertising information to the application unit, and provide the term extension for the software license. | 02-26-2009 |
20090064345 | INFORMATION MANAGEMENT APPARATUS, INFORMATION MANAGEMENT SYSTEM AND COMPUTER READABLE MEDIUM - An information management apparatus includes: a registration unit that registers electronic information in association with access right information representing whether a user has an access right; a condition storage that stores a condition for prohibiting an access to the electronic information registered by the registration unit on the basis of an administrator's right for the apparatus; a determination unit that determines whether the changed access right information satisfies the condition stored in the condition storage; a transmission unit that transmits the electronic information to a predetermined transmission destination in a case where the determination unit determines that the access right information of the electronic information satisfies the condition; and a deletion unit that deletes the electronic information stored in a transmission source after the electronic information is transmitted by the transmission unit. | 03-05-2009 |
20090083859 | PROGRESS INDICATORS TO ENCOURAGE MORE SECURE BEHAVIORS - A method for enticing users to behave securely in a computing environment. For security related input, such as selection of password, a progress indicator is provided to the user. The progress indicator correlates to the level of security obtained by the user's entry, rather than to the completion of the task. The indicator follows a non-linear function that crosses zero security and maximum expected security for the task. The function starts at shallow slope, increases towards the middle, and then reverts to shallow slop towards the end of the task. | 03-26-2009 |
20090083860 | Security system for a browser-based environment - Various technologies and techniques are disclosed for enhancing security in a browser-based environment. A first browser application hosts one or more other applications. The first browser application is operable to load the one or more other applications on one or more separate domains than a host domain, using one or more cookies as a communication method between the first browser application and the one or more other applications. Input is received from a user to access a first browser application on a first domain. A selection is received from the user to run a second browser application from within the first browser application. A first cookie is created in a second domain, with the first cookie containing information to be used by the second browser application. The second browser application is loaded on the second domain. For example, the first browser application can be a browser-based software development application. | 03-26-2009 |
20090089882 | Methods and Apparatus for Restricting End-User Access to Content - Methods and apparatus are provided for restricting end-user access to content Access of an end-user to content is restricted by receiving a request from the end-user to access the content; identifying and authorizing user associated with the end-user; providing an authorization message to the authorizing user, wherein the authorizing user is remote from a location of the end-user; and providing the end-user with access to the content if authorized by the authorizing user. For example, the end-user can be a child and the authorizing user can be an individual responsible for the child, such as a parent or guardian. In a further variation, the end-user can be an automated recording device and authorization request is responsive to an attempt by the recording device to record the content. | 04-02-2009 |
20090089883 | Method and apparatus for controlling media content distribution - A method and apparatus for establishing a syndication right of media content information and distributing the media content information amongst a plurality of web pages using the syndication right. The method and apparatus further includes granting the syndication right to a user, coupling with user criteria data, and authenticating a request for the media content information according to user criteria data. | 04-02-2009 |
20090089884 | Method and system for indentifying a device implementing a digital rights management protocol - A method comprises receiving a first device ID request from user for registration of a first user device; generating a first unique identification number for the first user device; generating a first unique identification object based on a first DRM protocol, the first unique identification object including the first unique identification number; associating the user with the first user device, the first unique identification number and the first DRM protocol; receiving a second device ID request from user for registration of a second user device; generating a second unique identification number for the second user device; generating a second unique identification object based on a second DRM protocol, the second unique identification object including the second unique identification number, wherein the first DRM protocol and the second DRM protocol are incompatible; and associating the user with the second user device, the second unique identification number and the second DRM protocol. | 04-02-2009 |
20090100528 | Method for Linking Intellectual Property System to Other System and the System - Provided are a method and system for reducing user inconvenience by exchanging information between different intellectual property information systems having different servers from each other or storing the information in a storage folder of each user of one of the intellectual property information systems. The method associates at least first and second different intellectual property related systems operated by different servers from each other. The method includes the steps of: providing, by the first intellectual property information system, identification of a user of the first intellectual property information system to the second intellectual property information system; and providing, by the second intellectual property information system, searched case information or case information searched for each user of the second intellectual property information system to a storage folder of each user in the first intellectual property information system. | 04-16-2009 |
20090100529 | DEVICE, SYSTEM, AND METHOD OF FILE-UTILIZATION MANAGEMENT - Device, system, and method of file-utilization management. In some embodiments, a method may include linking between a computing device and at least one electronic mail address by verifying that a user of the linked computing device is authorized to access an electronic mail account represented by the linked electronic mail address; identifying an attempt by the user to access the content of a protected file, wherein the protected file is associated with permission information representing one or more allowed electronic mail addresses and including one or more content-utilization restrictions; and presenting the content of the protected file to the user of the linked device, if the linked electronic mail address is included in the allowed electronic mail addresses, while restricting the utilizing of the presented content according to a content-utilization restriction corresponding to the linked electronic mail address. Other embodiments are described and claimed. | 04-16-2009 |
20090106849 | Portable Computer - A portable computer, comprising a first display screen in the portrait format housed in a first panel and a second display screen in the landscape format housed in a second panel. The second panel is physically attached to the first panel, and the diagonal size of the second display screen is 40% to 70% of the diagonal size of the first display screen. The effective size of the display area is larger than the physical area of the display screens, and the portable computer can have small size, light weight, and long battery life. | 04-23-2009 |
20090119783 | METHOD AND APPARATUS FOR MASKING CHILD USER AUTHORIZATIONS FROM ADVERSE USE AGAINST A PARENT USER - The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user. | 05-07-2009 |
20090133130 | Media editing system using digital rights management metadata to limit import, editing and export operations performed on temporal media - A computer system for editing temporal media, such as audio, video, audiovisual works and the like, limits the editing operations that can be performed on the temporal media according to the digital rights management metadata associated with the temporal media. The digital rights management metadata may be, for example, rules associated with the temporal media which describe how the temporal media can be imported into the editing system, manipulated by the editing system and/or exported by the editing system. | 05-21-2009 |
20090133131 | METHOD AND SYSTEM FOR MANAGING SOFTWARE LICENSES - A method and system for managing licenses over a network is disclosed. The method and system include establishing a user account on a server coupled to the network, and allowing a user or publisher to upload or download licenses from a computer to or from the server. The licenses are then associated with the user account, and the user is allowed to log into the user account to review the account and associated uploaded licenses. The method and system further include allowing the user to review and retrieve the licenses for download to the user computer in the case of a lost or damaged license. | 05-21-2009 |
20090138974 | CONTROLLED ACCESS TO MEDIA CONTENT | 05-28-2009 |
20090151005 | METHOD FOR IDENTITY THEFT PROTECTION WITH SELF-DESTRUCTING INFORMATION - A method for identity theft protection includes receiving an identity theft indicator indicating a possible loss or theft of a personal device, wherein the identity theft indicator includes at least one of a user-initiated signal, a geographic range indicator, an expired timer, a failure of a heart-beat verification, and a battery level indicator. The method further includes attempting contact of an owner of the personal device, wherein attempting contact includes at least one of transmitting a message to the owner over a telephone connection, transmitting an email to a registered email address of the owner, and transmitting a text-based message to a registered telephone number on the personal device. The method further includes protecting information stored on the personal device if attempting contact of the owner is not successful. | 06-11-2009 |
20090151006 | GROUP REGISTRATION DEVICE, GROUP REGISTRATION RELEASE DEVICE, GROUP REGISTRATION METHOD, LICENSE ACQUISITION DEVICE, LICENSE ACQUISITION METHOD, TIME SETTING DEVICE, AND TIME SETTING METHOD - There is provided a group registration device or the like which is capable of simplifying registration processing to readily perform group registration while retaining secure registration processing. | 06-11-2009 |
20090158442 | Method of User Access Authorization in Wireless Local Area Network - The present invention discloses a method of user access authorization in wireless local area networks. The method comprises: when a Wireless Local Area Network (WLAN) user terminal is accessing a WLAN operational network, the WLAN operational network, while authenticating this WLAN user terminal, judging whether to allow this WLAN user terminal to access according to authorization conditions having an impact on the access of this WLAN user terminal, if yes, the WLAN operational network will determine the access rules of this WLAN user terminal according to the said authorization conditions; otherwise, the WLAN operational network will notify the WLAN user terminal about the failure. Different users can be controlled to access the network according to different authorization conditions, and be restricted by different access rules after getting accessed. Thus, the access control capability of a wireless local area network is enhanced and the working efficiency of the network is improved. | 06-18-2009 |
20090165145 | CHANGING MODES IN A DEVICE - A method including storing one or more user profile modes in a device, activating a user profile from the stored profiles where activating a user profile mode comprises configuring a user interface of the device to allow access to only applications and/or information associated with the activated user profile mode and displaying only applications and/or information associated with the activated user profile mode. | 06-25-2009 |
20090165146 | METHOD FOR MANAGING USER RIGHTS FOR A CODE PROTECTED OBJECT - The invention relates to a process for managing user rights for a code-protected object ( | 06-25-2009 |
20090183264 | SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK - A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license. | 07-16-2009 |
20090183265 | IDENTIFICATION OF POTENTIAL UNAUTHORIZED DISTRIBUTION OF COPYRIGHTED INFORMATION - A computer-implemented method is provided of identifying potential unauthorized distribution of copyrighted information. The copyrighted information includes copyrighted items and copyright filing information for each of the copyrighted items. A database file is provided of the copyrighted information. Also, a source of items is provided from an entity other than the copyright owner which contains items that are potentially in violation of the copyrighted items. An automatic comparison is made. The copyrighted items in the database file of copyrighted information are automatically compared in a computer with the items in the source of items. The comparison identifies any items in the source of items that are potentially in violation of a copyrighted item due to similarities with the copyrighted items. The identified items are displayed in association with the copyrighted items that are potentially being violated and the copyright filing information of the copyrighted items that are potentially being violated. | 07-16-2009 |
20090235364 | Media markup for promotional content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 09-17-2009 |
20090241201 | TECHNIQUES FOR MULTILINGUAL PASSWORD CHALLENGE RESPONSE, PASSWORD RESET, AND/OR PASSWORD RECOVERY - Techniques for multilingual password challenge response, password reset, and/or password recovery are presented. When a password reset or password recovery request is received, a series of challenge questions are serially asked such that each question has to be answered correctly before the next question in the series is even presented. Furthermore, at least two questions are asked in different languages from one another. | 09-24-2009 |
20090254999 | MEDIATED ACCESS OF SOFTWARE DUMPED DATA THROUGH SPECIALIZED ANALYSIS MODULES - The present invention can include a method, computer program product, and system for mediating access to content of a software dump. The invention can identify an event occurring within a computing device, which causes data to be dumped to file. A dump file can be created responsive to the event, wherein the dump file includes data defining a state of the computing device. Using an analysis module to analyze the dump file to determine content to be placed in a tailored dump file. In one embodiment, custom analysis modules or custom modifications to existing analysis modules can be added to the computing device at any time, which permits a tailoring of dumps to cover circumstances not originally known in advance of a situation for which they are needed. The tailored dump file can include a subset of the content of the dump file for which access privileges have been granted in accordance with the analysis module. The output file can be created, which comprises the determined content. | 10-08-2009 |
20090255000 | Internet Protocol (IP) Location, Privacy and Presence - An extension to the Location Information Service (LIS) architecture uses a centralized, user-selected, Privacy Profile Register (PPR) and Presence Register (PR) element, the User Privacy and Presence Register (UPPR) (also known as the Home Register (HR)). This centralized model provides access to value added services that allow the user to be located anywhere in the world by people and services of his choosing. It also provides network elements using this location information with security that the location being provided has certification. | 10-08-2009 |
20090265791 | METHOD A SYSTEM AND A UNIT FOR CONTROLLING LISTING OF ITEMS ON ELECTRONIC MARKET DATABASES - There is provided a method a method for controlling listing of a given item on an electronic market database, the method comprising (1) receiving a listing request originated from a prospective provider for listing said given item on said electronic market database; (2) authenticating at least one of said given item and of said prospective provider; and (3) if a successful authentication, listing said given item on said electronic database. There is further provided a system as well as a unit for controlling listing of a given item on an electronic market database. | 10-22-2009 |
20090271871 | INTELLIGENT UPLOADED CONTENT PLACEMENT - Described herein is technology for, among other things, storing content (e.g., files) on a content storage system (e.g., online storage website). It involves various techniques for intelligently placing content in a hierarchy (e.g., folders) within the content storage system. Such intelligent placement of files facilitates easy use of the content storage system and speeds the upload process for users (e.g., via a single click). Therefore, the technology simplifies the uploading of files to an online file system. | 10-29-2009 |
20090271872 | MANAGING ELECTRONIC DATA WITH IDENTIFICATION DATA - An improved approach for managing and sending electronic data which allows one to access electronic data corresponding to a hardcopy document is provided. For example, when the hardcopy bearing a visible image is output, an identification image corresponding to identification data identifying the document is added to the visible image. The identification data can be recognized from the identification image, and used to retrieve various information in a database corresponding to the document. | 10-29-2009 |
20090282493 | MEHTOD AND SYSTEM FOR MANAGING ELECTRONIC MESSAGES - A computer implemented method, computer program product and a data processing system for managing electronic messages is disclosed. The contents of an electronic messages are segmented based on the recipients receiving the message and access control authorizing access to the segmented contents is provided to the segmented contents and transmitted to a list of recipients. | 11-12-2009 |
20090282494 | METHOD AND SYSTEM FOR MANAGING ELECTRONIC MESSAGES - A computer implemented method, computer program product and a data processing system for managing electronic messages is disclosed. The contents of an electronic messages are segmented based on the recipients receiving the message and access control authorizing access to the segmented contents is provided to the segmented contents and transmitted to a list of recipients. | 11-12-2009 |
20090293133 | Card Authorization Terminal System and a Card Management Method Using the Same - The present invention relates to a card authorization terminal system and an electronic card processing method using the card authorization terminal system. An authorization terminal system includes an exclusive database management system to update and delete property change information, and a card processing method uses the authorization terminal system. In the card processing method, since a physical memory area is efficiently managed, a problem of memory capacity limitation is solved, a processing speed delay caused by a file processing structure is improved, and various pieces of information may be managed. | 11-26-2009 |
20090293134 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND PROGRAM - Strict security is ensured with respect to information in originals scanned by an MFP. There are provided: password detector for judging if original information obtained by decoding the two-dimensional code of original images contains a one-way hash value generated from a password; password input for prompting input of a password in the case where it is determined by the password detector that a hash value is contained in the original information; password verifier for using the one-way hash value to verify a password input by the password input; and converter for converting the original images into an electronic file protected by the password input by the password input. | 11-26-2009 |
20090293135 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREFOR - An information processing apparatus includes a document registration unit configured to register a document, a data extraction unit configured to extract a content of the document, a first setting unit configured to set an access right to the document to each user, and a first character string registration unit configured to register a character string for each user. In the information processing apparatus, when the document is registered by the document registration unit, the first setting unit sets an access right of a user to the document based on a result of comparison of the character string registered by the first character string registration unit with the content of the document extracted by the data extraction unit. | 11-26-2009 |
20090307782 | DOCUMENT MANAGEMENT SYSTEM, DOCUMENT MANAGEMENT METHOD AND COMPUTER PROGRAM - When a shortcut of a document is generated, a user is caused to set the number of times of access to the shortcut. A shortcut identifier for identifying the shortcut is generated. The shortcut identifier and the number of times of access are registered in a shortcut management table in association with each other. Thereafter, the generated shortcut identifier and a mail address as a destination of a mail are set in the shortcut. The mail attached with the shortcut is transmitted. When the mail address set in the shortcut attached to the received mail and a mail address of the user stored in a PC that receives the mail coincide with each other, access to the document linked to the shortcut is permitted. This enables to more appropriately adjust the access to the document than in the past without changing an access right of the document itself. | 12-10-2009 |
20090320142 | DATA PROCESSOR - A data processor by means of which when the right of a content being automatically reproduced extinguishes, the reproduction is continued so as to prevent the user from feeling discomfort, the content reproduction information is recorded and transmitted to a content distributor, and the user is charged. In the data processor, when a control unit ( | 12-24-2009 |
20100005532 | Software Usage Controlled by CPU Utilization - A data processing apparatus has a data processor manager that checks and updates the credit account that is associated with the usage of a software application at the apparatus. The processor manager determines whether or not to proceed with execution of the software application dependent on the number of processor cycles left in the credit account. If the number of processor cycles in the account falls below a predetermined threshold, the software application is barred from being executed further. The user then can replenish the account by means of purchasing or otherwise obtaining further credits in terms of processor cycles for spending on the future execution of the software application. In this manner, a scenario is implemented for a business model based on prepaid software wherein the user pays exactly for the actual usage in terms of processor cycles. | 01-07-2010 |
20100011449 | Chip Card Having A First User Function, Method For Selecting An Identifier, And Computer System - The invention relates to a chip card having a first user function ( | 01-14-2010 |
20100017889 | Control of Website Usage Via Online Storage of Restricted Authentication Credentials - A client communicates with a website usage server via a network to gain access to an account on a website. The client requests an indication of whether user access to the account on the website is permitted. The website usage server determines whether website usage is permitted based at least in part on a website usage policy associated with the website and the user. The website usage server provides restricted authentication credentials to the website responsive to determining that access to the account is permitted. | 01-21-2010 |
20100017890 | Symbol Based Cipher Code Registration System and Method - A symbol cipher system. The system has a symbol cipher application for execution on a digital platform. The symbol cipher application has: a first group of symbol components; a first range of code entry fields; a cipher correlation table. The cipher correlation table correlates the first group of symbol components to a first range of language characters. The first group of symbol components can be entered into the first range of code entry fields for registration of a symbol information item in an application database. | 01-21-2010 |
20100024045 | METHODS AND APPARATUSES FOR PRIVACY IN LOCATION-AWARE SYSTEMS - In one embodiment a method is disclosed for accepting and enforcing user selectable privacy settings for context awareness including location awareness data on a computing platform. The method may identify a requestor, assign a privacy setting to the requester then detect a request for location information from the requestor. The method may transmit location information to the requester based on the user selected privacy setting. The user selected privacy setting may have a granularity assigned to each requestor based on a privacy preference and the method may entirely block the location information from being disclosed or the method may modify the granularity/accuracy of the location information based on the privacy setting to report context of an appropriate level of granularity according to the privacy setting configured by the user. Other embodiments are also disclosed. | 01-28-2010 |
20100031372 | METHOD AND SYSTEM FOR SECURE FLEXIBLE SOFTWARE LICENSING - When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset. After execution of the licensing management application and provision of each of the users with a respective peripheral licensing device, each of the users is enabled to execute the software application by interfacing the peripheral licensing device with one of the computers, after which the data indicative of a licensing key are retrieved and the software application is executed. | 02-04-2010 |
20100043079 | CODE SECURING FOR A PERSONAL ENTITY - A system secures a personal code for a user of a personal entity containing data and associated with a code processing entity. The personal entity establishes a graphical representation of characters that may be modified for each data request. The representation is associated with first coordinates of characters of the personal code and transmitted to the code processing entity. The code processing entity displays the representation so that the user selects therefrom characters representative of the personal code, determines second coordinates of selected characters and transmits the second coordinates to the personal entity. The personal entity compares the first and second coordinates so as to transmit requested data if said coordinates match. | 02-18-2010 |
20100043080 | Methods and Systems Involving Survey Administration - A method includes authorizing a user to participate in a survey, generating a key associated with a user identifier and a survey identifier, sending the key to a user terminal, directing the user terminal to a survey uniform resource locator (URL), connecting communicatively with the user terminal via a second URL, determining whether the second URL designates the survey as completed, retrieving the encrypted key from the user terminal responsive to determining that the second URL designates the survey as completed, and updating the status of the survey in a memory responsive to verifying the integrity of the encrypted key. | 02-18-2010 |
20100050270 | Control of Access to Content Received from a Multimedia Content Distribution Network - A disclosed method for controlling access to content provided by a multimedia content delivery network includes detecting a remote control signal, determining identification information and action information in the remote control signal, generating a CPE code based on a combination of the identification and action information, and performing a content control action based on the CPE code. The identification information may indicate a setting of a switch of the remote control device or a user of the remote control device. Generating the CPE code may include generating a first CPE code when the identification information indicates a first user and generating a different CPE code when the identification information indicates a second user. Generating the CPE code may still further include accessing parental control restrictions associated with a user or user class indicated by the identification information and generating a CPE code in compliance with the parental control restrictions. | 02-25-2010 |
20100050271 | MANAGING APPLICATIONS RELATED TO SECURE MODULES - An apparatus capable of hosting a secure module. The hosting apparatus is configured to provide connectivity to the secure module, and comprises a memory for storing secure module related applications. A processing module is configured to check whether an application chosen or activated by the user of the apparatus is a secure module related application. In case the chosen or activated application is a secure module related application, the processing module is 101 configured to restrict user rights concerning the application. | 02-25-2010 |
20100050272 | METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS - A system and method for distribution of digital works in a tree-like structure of devices. A hierarchical right may include a first usage right governing a use for the digital work and a first delegation right governing distribution of the digital work to child nodes of the tree-like structure. A second usage right and/or a second delegation right may be generated based on the hierarchical right, the second usage right governing a use for the digital work and the second delegation right governing distribution of the digital work to child nodes of a first child node of the tree-like structure. The second usage right and/or the second delegation right may be assigned to a version of the digital work, and the second usage right and/or the second delegation right and the version of the digital work may be forwarded to the first child node. | 02-25-2010 |
20100050273 | METHODS FOR PRE-POPULATING LOCAL URL RATING CACHE - A method and apparatus for improving the system response time when URL filtering is employed to provide security for web access. The method involves gathering the attributes of the user, and pre-populating a local URL-rating cache with URLs and corresponding ratings associated with analogous attributes from a URL cache database. Thus, the cache hit rate is higher with a pre-populated local URL rating cache, and the system response time is also improved. | 02-25-2010 |
20100058486 | METHOD FOR SECURE ACCESS TO AND SECURE DATA TRANSFER FROM A VIRTUAL SENSITIVE COMPARTMENTED INFORMATION FACILITY (SCIF) - The present disclosure is directed to a method for limiting access to a virtual sensitive compartmented information facility (SCIF) and secure transport of information between two virtual SCIFs. The method may comprise creating a virtual SCIF, allowing access to the to the virtual SCIF to only those virtual subjects having the proper security clearance as analyzed by an access rule set loaded into an object request broker, creating a second virtual SCIF, creating a key lockable secure container to transport the information from the first virtual SCIF to the second virtual SCIF, and restricting access to the key to unlock the secure container in the second virtual SCIF. | 03-04-2010 |
20100064375 | METHOD, SYSTEM AND APPARATUS FOR SECURE DATA EDITING - A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data entry into the data field via a user interface. A determination is made of whether a manual lock event, a change focus event, or a time out event has triggered based on the user's action or inaction with the user interface. Upon the triggering of a manual lock event, a change focus event, or a time out event, the data entry in the data field is obscured. The user interface may display a data entry with a validation character which provides a reference point within the data entry while the data entry is displayed and while the data entry is obscured. The system may allow a user to have a specified function set based on his user access level. | 03-11-2010 |
20100064376 | Mobile terminal, restricting system and method of accessing an information using the mobile terminal - The exemplary embodiment relates to a system and method for restricting the disclosure of information employing a mobile terminal, which restricts the disclosure of information using a mobile terminal. In an aspect, the exemplary embodiment provides a mobile terminal, including a short-range communication module performing the short-range communication channel, memory storing authorization information for allowing access to unaccessible information stored in the information device, and a controller transmitting the authorization information through the short-range communication module. | 03-11-2010 |
20100064377 | ACCESS RIGHTS FOR DIGITAL OBJECTS - A digital object for distribution from a provider to a content user and a method of distribution of such an object is disclosed. The digital object comprises content and a tag containing data that is derived algorithmically from the content and from a secret not known to the content user. The tag is constructed such that the content user can, upon receipt of a communication from a requestor purporting to have the authority of the provider, perform an exchange of information with the requestor, and by inspection of the exchanged information and of the tag, determine whether the requestor is in possession of the secret and choose to act upon or not act upon the communication accordingly. The tag may additionally include a value that defines an access category that specifies the extent to which the owner wishes the content to be distributed. A server from which an object has been delivered to a third party can send a message to the third party to request, amongst other things, that the access category be changed. The third party can use the tag in the object to verify the authority of the request. | 03-11-2010 |
20100077486 | METHOD AND APPARATUS FOR DIGITAL CONTENT MANAGEMENT - The present invention discloses a method for using digital content. According to this method, a user terminal acquires an authorization file at least including a predetermined processing right from the authorization terminal, the predetermined processing right allowing the user terminal to process the digital content in the predetermined manner, e.g. edit the digital content. When the processing right requested by the user is included in the authorization file that the user terminal acquires, the user can perform the predetermined processing on the digital content. This invention also discloses apparatus for using the digital content. The method and apparatus of the present invention can bring better convenience to the user and protect profits of the content provider as well. | 03-25-2010 |
20100077487 | COMPUTERIZED METHOD AND SYSTEM FOR RESTRICTING ACCESS TO PATIENT PROTECTED HEALTH INFORMATION - A computerized system and method for allowing restricted access to patient healthcare information is provided. Upon determining that one or more users are assigned to the location where an order for a patient is to be performed, the method allows one or more users restricted access to the order. The system includes an order entry module, an access evaluation module, a location entry module and a user module. The access evaluation module includes an assignment determination sub-module for determining whether one or more users are assigned to the specified location where an order for a patient is to be performed. The assignment determination module also includes a restricted access sub-module coupled with the assignment determination module and configured to allow restricted access to one or more users assigned to the specified location. | 03-25-2010 |
20100088771 | VIRTUALIZATION OF A CENTRAL PROCESSING UNIT MEASUREMENT FACILITY - A central processing unit measurement facility is virtualized in order to support concurrent use of the facility by multiple guests executing within a virtual environment. Each guest of the environment has independent control over disablement/enablement of the facility for that guest. | 04-08-2010 |
20100100968 | IMAGE PROCESSING APPARATUS - An image processing apparatus includes an input receiving unit for receiving an input of identification information to identify a user; a storage unit for storing the identification information and usage authority of the user with respect to a function of the image processing apparatus; a control information storage unit for storing unregistered user control information for allowing an unregistered user with usage authority not registered in the storage unit to use a minimum function of the image processing apparatus; a determining unit for searching the storage unit according to the identification information and determining whether the identification information is registered; and a control unit for controlling to allow the unregistered user to use the minimum function according to the unregistered user control information when the determining unit determines that the identification information is not registered in the storage unit. | 04-22-2010 |
20100115627 | APPARATUS AND METHOD FOR PROTECTING MEDIA CONTENT RIGHTS - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to maintain content rights parameters associated with media content and a user where the content rights parameters include limits to distribution of the media content to a plurality of communication devices associated with the user and where a portion of the plurality of communication devices use different communication protocols from another portion of the plurality of communication devices, monitor for access to the media content by one communication device of the plurality of communication devices of the user, and obtain rights control data that is adapted to allow for presentation of the media content by the one communication device of the user where the rights control data is generated based on the content rights parameters. Other embodiments are disclosed. | 05-06-2010 |
20100115628 | DIGITAL RIGHTS MANAGEMENT SCHEME FOR AN ON-DEMAND DISTRIBUTED STREAMING SYSTEM - A DRM scheme that may be optionally invoked by the owner. With the DRM protection turned on, the media is encrypted before it is distributed in a P2P network, and is decrypted prior to its use (play back). The peers may still efficiently distribute and serve without authorization from the owner. Nevertheless, when the media is used (played back), the client node must seek proper authorization from the owner. The invention further provides a hierarchical DRM scheme wherein each packet of the media is associated with a different protection level. In the hierarchical DRM scheme of the invention there is usually an order of the protection level. As a result, in one embodiment of the invention, the decryption key of a lower protection layer is the hash of the decryption key at the higher protection level. That way, a user granted access to the high protection layer may simply hold a single license of that layer, and obtain decryption keys of that layer and below. The invention further provides for a process for managing digital rights to a scalable media file wherein a different encryption/decryption key is used to encrypt each truncatable media packet with a base layer without requiring additional storage space to store the key. | 05-06-2010 |
20100122350 | PASSWORD METHODS AND SYSTEMS FOR USE ON A MOBILE DEVICE - Systems and methods for operation upon a mobile device to handle a duress situation caused by another person. An input password is received from a user. The input password is decoded by the device. Responsive to the input password being a duress indication, a duress operation is performed to protect data on the mobile device. | 05-13-2010 |
20100132050 | APPARATUS, SYSTEM, AND METHOD FOR ENFORCING POLICY REQUIREMENTS ASSOCIATED WITH A SERVICE - A computer-readable medium having stored thereon a plurality of instructions including instructions that when executed by a processor enable a service provider to track and enforce policy requirements associated with a provided service of the service provider. The application software configured to provide notification of the policy requirements and to trigger an intentional degradation of the provided service as a function of time when a user fails to comply with at least one of the policy requirements. | 05-27-2010 |
20100132051 | PROTECTING LIVE CONTENT IN A NETWORK - A method for protecting live content in a multimedia system. An Acquisition Point that receives content distributes it in a network comprising a recording device and a rendering device. The content is associated with a license comprising a content identifier and the identity of the sending Acquisition Point. If the content is live, the license indicates that the content is “live protected”. A rendering device that receives the content and its license asks | 05-27-2010 |
20100132052 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An information processing system includes: an organization information storage that stores organization information which defines an organization including users and groups of the users; a usage control information storage that stores usage control information which is for controlling use of control target information by each user in the organization defined by the organization information and defining a user or a group of users who or which is permitted to use the control target information and a usage range of the control target information in which the user or the group of the users is permitted to use the control target information; a judgment unit that judges whether or not an inconvenience resulting from a change of the organization occurs in the usage control information stored in the usage control information storage based on the organization information stored in the organization information storage; and a countermeasure unit that performs a countermeasure against the inconvenience in a case where the judgment unit judges that the inconvenience resulting from the change of the organization occurs. | 05-27-2010 |
20100138932 | DATA PROTECTING METHOD AND COMPUTING APPARATUS - A data protecting method, including the steps of: (a) upon receipt of a triggering command, configuring a hardware control module to store data in a hidden zone that is unidentifiable, unreadable and unwritable by an operating system block in communication with the hardware control module; and (b) upon receipt of a restore request command from an input device in direct communication with the hardware control module, configuring the hardware control module to execute the restore request command so as to transfer the data from the hidden zone to a working zone that is identifiable, readable and writable by the operating system block when a predetermined condition is satisfied. | 06-03-2010 |
20100146638 | DETECTION FILTER - A detection filter installed in an application server including a secure application is disclosed. In one embodiment, the filter includes a rules engine for receiving request data representing an access request for the secure application from a user. The engine applies at least one risk condition rule to the request data to generate a risk probability level, and detects at least one fraud condition when the risk probability level exceeds a threshold level, before passing the access request to the secure application. | 06-10-2010 |
20100146639 | ONLINE DIRECTORY WITH CONTACT INFORMATION - A method and system of storing and sharing contact information on a website of a specified group of users designated by a user X comprises: accessing the website by the user X; requesting the user X to provide or verify accuracy of most current contact information as a precondition to proceeding; storing the most current contact information from the user X and each user of the specified group of users; providing shared online access to contact information of user X to all users of the group; updating contact information of user X each time the website is accessed by User X; and updating contact information of each user of the group when contact information of a user of the group changes. | 06-10-2010 |
20100154065 | Media markup for user-activated content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or topic or category of an alterable media content component may be implemented to enable selective audio, visual, and audio/video content alteration. | 06-17-2010 |
20100162412 | MEMBER REGISTRATION METHOD, COMMUNITY SERVICE SYSTEM, PORTABLE TERMINAL, AND MEMBER INVITATION PROCESSING PROGRAM - A community member registration method is for registering a member in a community service system in which a community service server, and authentication server and a plurality of portable terminals are connected via a network. The community service server provides community service, the authentication server determines whether or not a member has authority to receive services provided by the community service server, and the portable terminals are capable of direct communication to each other. The method includes: sending a terminal identifier obtained from a portable terminal of an invitee together with a registration request from a portable terminal of an inviter to the authentication server; issuing an account of the invitee in response to the registration request in the authentication server; notifying the account to the portable terminal of the inviter from the authentication server; and sending the account from the portable terminal of the inviter to the portable terminal of the invitee. | 06-24-2010 |
20100169982 | LICENSE MANAGEMENT APPARATUS, LICENSE MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUM - A license management apparatus includes: a license information storage; a reproduced user information storage; an invalidation information storage; a compare unit; an update unit; and a setting unit. | 07-01-2010 |
20100169983 | Display device and method aiming to protect access to audiovisual documents recorded in storage means - The invention relates to a display device and method aiming to protect access to audiovisual documents recorded in storage means. | 07-01-2010 |
20100180348 | SECURE ONLINE REPOSITORY - Techniques for secure online storage. A user is registered for securely storing documents on a network. User documents are stored on a network server. The user documents include documents for disposing of user property after death or for effecting user medical decisions. A secure network interface is provided for displaying the user documents remotely upon receiving a user security identifier. A secure network interface is provided for displaying the user documents remotely to authorized medical personnel who do not have access to the user security identifier. | 07-15-2010 |
20100192233 | CONTENT REPRODUCTION DEVICE - Provided is a content playback apparatus that generates a GUI corresponding to various pieces of restriction information to restrict playback of a content when displaying the GUI for causing a user to select a content to be played back, and that can respond to a new piece of restriction information. The content playback apparatus generates content lists for the various pieces of restriction, and generates a GUI which can display each content list for each piece of restriction information by switching. When a content to which the new piece of restriction information has been attached is added, setting information for the new piece of restriction information is obtained from a content distribution server and the like by referring to an ID attached to the content, or an ID of the restriction information having been attached to the content, and a content list for the newly obtained restriction information is generated and displayed. | 07-29-2010 |
20100212025 | INFORMATION PROCESSING APPARATUS, AND CONTROL METHOD AND STORAGE MEDIUM THEREOF - An information processing system, an information processing apparatus, and a control method thereof are provided that, without requiring a server for holding user information, effectively utilize the memory resources of each apparatus connected via a network to perform screen display and processing for each user. To accomplish this, the information processing system is provided with a plurality of information processing apparatuses provided with a storage area that stores personalized data, which is information unique to each user. When a portable authentication device is connected, each information processing apparatus reads out device information that indicates which information processing apparatus is storing the user information and the personalized data, performs authentication, and acquires the corresponding personalized data based on the device information. The personalized data is stored in the storage area at the time when access is performed by the user. | 08-19-2010 |
20100218262 | INTEGRATED CIRCUIT DEVICE, INFORMATION PROCESSING APPARATUS, MEMORY MANAGEMENT METHOD FOR INFORMATION STORAGE DEVICE, MOBILE TERMINAL APPARATUS, SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE, AND COMMUNICATION METHOD USING MOBILE TERMINAL APPARATUS - A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region is managed in directory units. A personal identification code is set for each application and directory, and the access right is controlled in application units or directory units. If a mobile terminal is lost, the right to access each application in the IC card automatically disappears. Therefore, the right to access each application allocated to the memory region on the IC card is efficiently controlled. | 08-26-2010 |
20100223673 | PROVIDING MULTIMEDIA CONTENT WITH ACCESS RESTRICTIONS - Users are provided limited access to multimedia programs. An administrator may require users to log in to begin a multimedia distribution session. Further, administrators may permit certain users to access selected multimedia programs only for a limited number of views. In addition, an administrator may designate that users have a limited amount of time or a limited period to exercise the limited number of views of the multimedia programs. For example, an administrator may designate that a user can access a multimedia program for a single view, that the user may take three hours to exercise the single view, and that the single view must take place within next three days. | 09-02-2010 |
20100229245 | System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations - A system of security that prevents misuse of identity data of an identity data owner in an identity data driven transaction in a global commerce network, that has in the system, a transaction processing entity that after it receives a identity data driven transaction from a transaction initiating entity, puts on hold the processing of the transaction for a period of time and via the identity data owner's wireless mobile communication device, contacts the identity data owner for authorization of the transaction before the transaction processing is completed. The system of security for identity data may be used in the identity data driven transaction is one from a group of (i) credit card payment, (ii) bank account payment, (iii) release of credit profile, (iv) release of financial data, and (v) release of medical data. | 09-09-2010 |
20100229246 | METHOD AND SYSTEM FOR CLASSIFYING AND REDACTING SEGMENTS OF ELECTRONIC DOCUMENTS - A method for classifying and redacting electronic documents, for example an email message, is described. The classification and redaction of segments of the email message are based on rules. Using the rules, multiple versions of the email message, each corresponding to recipients with specific clearance levels are generated. A selective redacting of certain segments of the email message concurrently with sending previously redacted segments of the same email message is described. A corresponding system for classifying and redacting electronic documents is also provided. | 09-09-2010 |
20100229247 | UNIQUE IDENTIFIER ADDRESSING AND MESSAGING ENABLING DIGITAL COMMUNICATION, CONTENT TRANSFER, AND RELATED COMMERCE - A method and system to convert a plurality of unique identifiers (license plates) from defined certain defined classes of unique identifiers (i.e. license plates) into electronic addresses enabling digital communication, content, and commerce to be transferred to the associated address, whereby a verified rightful holder of the unique identifier can claim by contract; rights which can grant access to the digital data that has been transferred to the assigned electronic address. It is an object, in some aspects, to allow a sender without knowing the identity of the holder of the unique identifier, to communicate a message, send money, pictures, and files to the converted corresponding electronic address in the hopes that the holder will claim the email address through a verification process. In order to facilitate the invention a central domain repository is used to determine and publish a uniform convention for the unique identifier, to establish a standard that is universal. The preferred embodiment of the invention is in the inventions ability to be utilized as a universal uniform international standard email address assignment to all legally valid alphanumeric license plate numbers. | 09-09-2010 |
20100242121 | APPARATUS, SYSTEMS AND METHODS FOR AUTHENTICATING WIDGET ACCESS AND WIDGETS - In some embodiments, a content server receives a request for a widget from a web server, specifying a user identifier and a delegation server. If the delegation server is trusted, the user's identity is ascertained using the user identifier. The widget is delivered having a context of the user's identity. The content server receives a request to access content generated utilizing the widget incorporated into a web page and allows access based on the context of the widget. In other embodiments, a social network server receives a request from a web server for a widget. The widget is delivered having a source indicator. Subsequently, the social network server receives a request to access the social graph generated utilizing the widget incorporated into a web page. If the request includes a change to the social graph, the social network server allows the request if the widget is trusted. | 09-23-2010 |
20100251385 | MANAGING SIGNATURE PAGES OF A TRANSACTIONAL DEAL USING A TAXONOMY DISPLAYABLE BY A COMPUTING DEVICE - Embodiments of the present invention relate to a computer-implemented method, system, and computer-readable medium for managing a collaborative deal transaction process that provides for tracking and managing signature pages of a deal transaction using a taxonomy displayable by a computing device, including receiving a list of users that are authorized to access the deal transaction, the list including an identifier associated with each of the users, storing the list of authorized users, parsing the identifier associated with each user, grouping the users according to parties based on the identifier, creating a taxonomy including a listing of documents relevant to the deal and a listing of the parties of the deal, receiving at least one document, and storing relevant pages of the at least one document, wherein each page is associated with at least one relevant party in the taxonomy. | 09-30-2010 |
20100251386 | METHOD FOR CREATING AUDIO-BASED ANNOTATIONS FOR AUDIOBOOKS - A computer implemented method, a data processing system, and a computer program publish an audio annotation of a media signal. A media player plays a media signal. The media player then records an audio annotation to the media signal. Responsive to recording the audio annotation to the media signal, the media player records an identifier to be associated with the media signal. The audio annotation is then published to a social networking host. | 09-30-2010 |
20100263058 | Deceptive Mobile Communications - A system comprises an electronic device operable to perform one or more legitimate functions for an authorized user. The device is further operable to be placed in a deceptive mode and perform one or more deceptive functions for an unauthorized user. | 10-14-2010 |
20100275268 | AUTHORISING USE OF A COMPUTER PROGRAM - A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used. | 10-28-2010 |
20100275269 | Procedure for the preparation and performing of a post issuance process on a secure element - A method for enabling post issuance operation on a secure element connectable to a communication device is disclosed. The method allows an SE controlling party to perform remotely operations such as creation of new security domains for an external party, loading, and installation of applications of an external party and management functions including personalization and activation of applications loaded on the SE for an external party. The method includes the steps of:
| 10-28-2010 |
20100275270 | METHOD AND APPARATUS FOR MANAGING THE TRANSFER OF RIGHTS - A method and apparatus for managing the transfer of rights associated with items from a rights supplier to a rights consumer. A set of rights is associated with an item and includes meta-rights specifying derivable rights that can be derived therefrom by the rights consumer. The set of rights is transferred, in the form of a license to the item, from the rights supplier to the rights consumer. If it is determined that the rights consumer is entitled to derive the derivable rights specified by the meta-rights, the derivable rights are derived and a license including the derived rights is generated with the rights consumer designated as a principal. | 10-28-2010 |
20100287621 | Method For The Use-Specific Initialization Of Vehicle Devices - Method for the use-specific initialization of vehicle devices of a road toll system, wherein the devices communicate with a central system via a radio interface and have device identifiers (OID), the method including the steps of: registering driver data under a driver identifier (AID) and vehicle data under a vehicle identifier (VID) in the central system; allocating a use identifier (UID) to a driver identifier (AID) and to a vehicle identifier (VID) in the central system; input of the use identifier (UID) into a vehicle device; transmitting the use identifier (UID) and the device identifier (OID) from the vehicle device to the central system via the radio interface; registering the driver data and vehicle data for each driver identifier (AID) and vehicle identifier (VID) to which the received use identifier (UID) is allocated in the central system; transmitting the determined driver data and vehicle data from the central system back to the vehicle device specified by the received device identifier (OID) via the radio interface; and initializing the vehicle device with the received driver data and vehicle data. | 11-11-2010 |
20100299758 | METHOD AND DATA SHARING SYSTEM IN PEER TO PEER ENVIRONMENT - The present invention relates to the method and data sharing system which establishes an access right for data to share in pure or hybrid P2P environment and thus decides to open and share the data in accordance with which whether a recipient peer has the access right or not, thereby protecting the data from the access of the unspecified public and preventing the data from spreading in an improper manner. Also, since the existence of the data is not open to recipients with no having access right, the method and data sharing system according to the present invention has an effect of protecting the copyright and privacy of a data provider. | 11-25-2010 |
20100299759 | DIGITAL INFORMATION SECURITY SYSTEM, KERNAL DRIVER APPARATUS AND DIGITAL INFORMATION SECURITY METHOD - Disclosed herein are a digital information security system, a kernel driver apparatus, and a digital information security method. The digital information security system includes a user module configured to operate in a user mode and to provide environment setting information comprising policy information about a use of digital information, and a kernel driver configured to operate in a kernel mode, to acquire information generated by an application of the user mode for the use of digital information, and to perform rights control regarding the use of digital information based on the acquired information and the policy information. Accordingly, the construction of a security system can be simplified, and the security of a security system can be improved. | 11-25-2010 |
20100299760 | COMMUNICATION SYSTEM FOR TRADE FAIRS - The present invention provides a communication system for communication between exhibitors and visitors at trade fairs, exhibitions, conferences and the like, which comprises: | 11-25-2010 |
20100299761 | SYSTEM AND METHOD FOR SENDING ELECTRONIC DATA TO INMATES - The invention includes delivering and monitoring electronic letters to correction facility inmates while giving supervisory authorities the ability to screen the incoming mail. This may be achieved by providing a database having an entry for each inmate and having a plurality of fields, and by scanning an original letter as an electronic letter and storing each electronic letter sent to a specific inmate in a relational database management system (RDMS) table. Another aspect of the invention involves providing a computer-operated kiosk that may be used by individuals (e.g., inmates) in a restrained environment/restricted-access location (e.g., a prison) to browse through a catalog of available digital media or content, such as music, that may be purchase with credits earned based on work performed by the inmate or bought through some other means, for example by family members of the inmate. | 11-25-2010 |
20100299762 | SHARING MEDIA CONTENT ASSETS BETWEEN USERS OF A WEB-BASED SERVICE - In one embodiment, a method comprises receiving a request for access to a media content asset from a first user of a web-based service, the request specifying a second user that has provided access to the media content asset; retrieving, from a user database, a user entry describing attributes associated with the second user; determining whether the user entry includes digital rights metadata for determining whether the second user is licensed to share at least a portion of the media content asset; and selectively providing the first user with access to at least the portion of the media content asset based on determining from the digital rights metadata that the media content asset is licensed to the second user, and determining that the first user is authorized by the second user to access the media content asset. | 11-25-2010 |
20100306858 | Multi-Level Authentication for Medical Data Access - Techniques for multi-level authentication for medical data access are supported. A system may include a central medical information management system that provides restricted access to medical data. An accessing device supports multiple different authentication levels. For example, the accessing device may use a combination of device identifiers, passwords, and quick access codes to ensure access only by authorized users. | 12-02-2010 |
20100325737 | RIGHTS-BASED ADVERTISEMENT MANAGEMENT IN PROTECTED MEDIA - A user playing a media file having ads on a playback device is able to automatically skip the ads during playback depending on the user's subscription level, as indicated in a user license or user account information. Whether an ad is automatically skipped may depend not only on the user license but also on attributes of the ad. An ad may have a skip-level which indicates the “importance” of the ad. If the advertiser wants to ensure that the ad will be seen and not be automatically skipped by a media playback unit, it can pay a higher price for the ad and the ad will be assigned a higher skip-level value. On the user subscription side, a user who wants to avoid ads may pay a higher subscription fee and have a user license that determines, via an auto-skip level value (“user level”), how many ads the user can automatically skip during playback of the media file. With a higher the auto-skip level value, the user is able to automatically skip more ads on the playback device. | 12-23-2010 |
20100325738 | DYNAMIC DUAL PERMISSIONS-BASED DATA CAPTURING AND LOGGING - Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data. In an embodiment of the invention, a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged. | 12-23-2010 |
20100333211 | Method and system for providing digital media rental - There is provided a method and system for allocating access to digital media content. In one embodiment, the system may comprise a media server accessible over a communications network, a processor of the media server being configured to encrypt the digital media content to produce a secondary license for the digital media content, and to provide a temporary license key allowing a user to access at least a first portion of the digital media content during an activation usage interval of the secondary license for that portion of the digital media content assigned to the user. The media server further comprises an assignment database configured to store an assignment status of the license. Such a system is configured to permit the user to access the assigned portion of the digital media content during the usage interval. | 12-30-2010 |
20110004942 | METHOD AND APPARATUSES FOR AUTHORISING PROVISION OF INDIRECTED CONTENT ASSOCIATED WITH A PRESENTITY OF A PRESENCE SERVICE - The invention provides a method of authorising provision of in-directed content to a user of an IPcommunications network. The in-directed content is associated with a presentity subscriber of a presence service, the presence service including authorisation rules regarding users to which the in-directed content may be provided. The in-directed content is stored at a content server that is not controlled by the presence service. The method includes receiving at an authorisation proxy in the network a request from the user to be provided with the in-directed content, and identifying the presentity subscriber associated with the requested in-directed content. The authorisation proxy retrieves the authorisation rules to verify that the user is authorised to receive the in-directed content. Subject to the verification, the in-directed content is provided from the content server the user. | 01-06-2011 |
20110010776 | Image Management System - A method of managing product images comprising the steps of establishing an inventory of products, obtaining a plurality of digital images of the inventory of products, storing the plurality of digital images of the inventory of products, providing a set of rules for controlling access to the plurality of digital images of the inventory of products, providing a management system for implementing the set of rules to control access to the plurality of digital images of the inventory of products based on the set of permissions granted to an authorized user, receiving an access request from a remote user via a network, determining whether the user is an authorized user who is authorized to access the plurality of digital images of the inventory of products, determining the set of permissions granted to the authorized user, and allowing the authorized user to access the plurality of digital images of the inventory of products via a network according to the set of permissions granted to the authorized user. The images are captured from multiple angles to allow the image to appear to be rotating when consecutive images are displayed. An image processing system removes background information from the image such that only the selected item appears, and alternative backgrounds may be provided to give the appearance that an object was filmed at the preselected location. | 01-13-2011 |
20110016534 | IMPLICIT AUTHENTICATION - Embodiments of the present disclosure provide a method and system for implicitly authenticating a user to access controlled resources. The system receives a request to access the controlled resources. The system then determines a user behavior score based on a user behavior model, and recent contextual data about the user. The user behavior score facilitates identifying a level of consistency between one or more recent user events and a past user behavior pattern. The recent contextual data, which comprise a plurality of data streams, are collected from one or more user devices without prompting the user to perform an action explicitly associated with authentication. The plurality of data streams provide basis for determining the user behavior score, but a data stream alone provides insufficient basis for the determination of the user behavior score. The system also provides the user behavior score to an access controller of the controlled resource. | 01-20-2011 |
20110016535 | COMPUTER READABLE MEDIUM STORING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A computer readable medium storing a program causing a computer to execute a process for information processing, the process includes: receiving a first characteristic value calculated on the basis of first document information for use in detecting whether the first document information is tampered with or not; receiving a second characteristic value calculated on the basis of second document information for use in detecting whether the second document information is tampered with or not; and calculating a third characteristic value for use in detecting whether third document information is tampered with or not on the basis of the first characteristic value, the second characteristic value and the third document information related to integration of the first document information and the second document information. | 01-20-2011 |
20110016536 | SYSTEMS AND METHODS FOR MANAGING PERMISSIONS FOR INFORMATION OWNERSHIP IN THE CLOUD - The present invention relates to a central (root) directory and the synchronization of unique identifiers associated with a payment addresses and permission preferences at different institutions. In a preferred embodiment, each unique identifier associates an account owner's permissions preference for the release of personal identifying information without the need for transaction-by-transaction explicit permissions or blanket implicit permissions. An asset transfer deposit account (for information and/or monetary assets) may be set up as a deposit only account. In this way, the present invention can be effective in eliminating many privacy concerns of account owners and security requirements of an information asset repository. | 01-20-2011 |
20110023129 | DYNAMIC ENFORCEMENT OF PRIVACY SETTINGS BY A SOCIAL NETWORKING SYSTEM ON INFORMATION SHARED WITH AN EXTERNAL SYSTEM - An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings. | 01-27-2011 |
20110023130 | Smart Battery System and Methods of Use - A battery pack including a housing; at least one battery cell associated with the housing; at least one memory element associated with the housing; at least one electrical connection associated with the housing for supplying power from the battery cell to the electronic device; and at least one communication interface associated with the housing for receiving data from the electronic device for storage in the memory element and/or for sending data from the memory element to the electronic device can be used for powering electronic devices. The battery pack may be used to increase the efficiency of employment of the electronic devices by storing the data generated by the electronic devices allowing the devices to be immediately redeployed by replacing the battery packs, the data being available for downloading from the battery pack. The battery packs may also be useful in advertising and software distribution systems. | 01-27-2011 |
20110047628 | IDENTITY VERIFICATION AND INFORMATION MANAGEMENT - The present invention provides an efficient, secure and verified information exchange using an identity verification platform and common interface data formats, whereby an individual can set different levels of access for different clients and further set different levels of access for different files. Therefore, the present invention provides a multi-layer access to records particular to an individual. | 02-24-2011 |
20110047629 | Method and Apparatus for Enhanced Age Verification and Activity Management of Internet Users - Methods and apparatus are provided for verifying the age of an online user. The age and identity of at least one primary user is verified and the primary user provides an age of at least one secondary user. Content requests from the secondary user to access content from at least one online content provider are granted if the primary user has authorized the secondary user to access the content. A content provider delivers content by receiving an identifier and a content request from a secondary user to access content; redirecting the secondary user to a third party age verification server; receiving an indication from the third party age verification server that the secondary user has been authorized by a primary user to access the content; and granting the content request if the primary user has authorized the secondary user to access the content. | 02-24-2011 |
20110055934 | METHOD AND SYSTEM FOR TUNABLE DISTRIBUTION OF CONTENT - A method and system for tunable distribution of content are disclosed. Preferably, the content comprises digital rights and/or watermark information. In one embodiment, a computer-implemented method comprises receiving a request from a client. One or more content files related to the request and a user profile of a user are determined. One or more seeders are assigned to start the delivery of the one or more content files. The client is allowed to obtain a plurality of pieces of the one or more content files from the one or more seeders. At least one piece of the plurality of pieces of the one or more content files contains digital rights and/or watermark information. | 03-03-2011 |
20110061110 | Viewing Content Under Enterprise Digital Rights Management without a Client Side Access Component - An E-DRM remote caching system enables a user without a client side E-DRM access component to view E-DRM governed content on a variety of client devices. The user transmits inaccessible E-DRM governed content to be viewed to a the remote caching system. The remote system receives the content, temporarily stores it in a cache, and determines whether the user has sufficient rights to view the content. If the user does have sufficient access rights, the remote system transforms the content into a secure, viewable format and securely transmits it to the user. The user can view the E-DRM governed content without an E-DRM client side access component. The E-DRM remote caching system can add a unique digital marker to received content. The marker can be subsequently used to identify the origin of compromised content. | 03-10-2011 |
20110061111 | ACCESS PERMISSIONS ENTITLEMENT REVIEW - A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object. | 03-10-2011 |
20110067114 | METHODS AND APPARATUS FOR A CONFIGURABLE PROTECTION ARCHITECTURE FOR ON-CHIP SYSTEMS - Various methods and apparatuses of protection mechanism are described. A target intellectual property block may field and service requests from an initiator intellectual property block in a system-on-chip network. The target intellectual property block has an associated protection mechanism with logic configured to restrict access for the requests to the target intellectual property block. The request's access is restricted based on access permissions associated with a region within the target intellectual property block and attributes of the request trying to access that region. | 03-17-2011 |
20110083197 | PRIVILEGED ACCESS TO ENCRYPTED DATA - Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content. | 04-07-2011 |
20110088100 | DISABLING ELECTRONIC DISPLAY DEVICES - A system for and method of management of electronic content access are disclosed. The system and method provide for managing electronic content access including detecting, at an electronic paper display device, an event requiring electronic content access management. According to some embodiments, access may be disabled to one or more portions of electronic content for a user of the electronic paper display device based at least in part on the detection of an event requiring electronic content access management. In one or more embodiments, a notification may be sent to a user of an electronic paper display device based at least in part on the detection of an event requiring electronic content access management. | 04-14-2011 |
20110099642 | CONTROLLER FOR EVENT-BASED STATISTICAL COVERT CHANNELS - A controller for an event-based statistical covert channel includes a data receiver; a data transmitter; and a channel controller that includes a fixed distribution randomized event buffer construction processor (FDREBCP) and a fixed distribution randomized event buffer (FDREB). The FDREBCP holds event distribution data that define one or more fixed distributions that the FDREBCP employs to fill the FDREB, whereby the event distribution data is stored during the occurrence of the event, subsequently removed from the FDREB and reordered, and a dummy event distribution data created to prevent an unauthorized outsider modulating the timing of events by alternatively causing and not causing the event. | 04-28-2011 |
20110107434 | PRIVACY THROUGH ARTIFICIAL CONTEXTUAL DATA GENERATION - Embodiments of the present disclosure provide a method and system for protecting privacy by generating artificial contextual data. The system collects real contextual data related to a user. The system then generates artificial contextual data, based on the collected real contextual data. The system also groups the generated contextual data into one or more groups. Each group of contextual data corresponds to a persona that can be presented as the user's persona. Subsequently, the system transmits the generated contextual data to an entity, thereby allowing the user to obscure the real contextual data related to the user. | 05-05-2011 |
20110107435 | STORAGE MEDIUM HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus displays, on a display device, personal information including person-identifying information based on which a person can be identified and non-person-identifying information based on which a person cannot be identified. First, the information processing apparatus determines whether or not authentication of a user has succeeded based on an input by the user and authentication information stored in storage means of the information processing apparatus. Then, the information processing apparatus prohibits display of the person-identifying information of the personal information stored in the storage means when it is determined that authentication has failed. | 05-05-2011 |
20110119770 | Password protected CD-DVD - Writable compact and digital versatile discs with a password protected option that protects access to the information on the disc. The password protection is optional, and may be used or removed at anytime. The discs can be used in every known application designed for compact and digital versatile discs formats, with no limitations. | 05-19-2011 |
20110119771 | SYSTEMS AND METHODS FOR HANDLING ELECTRONIC MESSAGES - Systems and methods for handling electronic messages are provided. One method includes monitoring a message and recipients of the message, detecting a reference in the monitored message to an entity, obtaining an access control list for the detected entity, the access control list defining permitted access to the entity, identifying a recipient of the message who is not permitted to access the entity, and performing a predefined action in response to the identification of the non-permitted recipient. The predefined action includes one or more specific actions such as identifying an administrator for the access control list, generating a reporting message, and transmitting the reporting message to the administrator. The predefined action additionally or alternatively includes preventing the transmission of the message to the non-permitted recipient and/or providing an alert to the author of the message. One system includes a processor and memory storing code for performing the above method. | 05-19-2011 |
20110126296 | Method For Scalable Access Control Decisions - Content access may be provided and processed by assigning responsibility for obtaining entitlement data to the client's browser. Thus, in one example, the client may be configured to synchronize and coordinate data lookups associated with a content request, rather than relying on the server to do so. The network architecture may use a mediator design pattern, in which the client's browser acts as the mediator (i.e., middleman) between a content server and an entitlement data server. Accordingly, synchronous calls between server-side services might not be required. Instead, data necessary for the content server to process a client request for access to protected content may be received in the incoming request from the client's browser. | 05-26-2011 |
20110131663 | METHOD AND APPARATUS FOR PROVIDING ACCESS TO SOCIAL CONTENT - An apparatus for providing access to social content may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to perform at least receiving information providing corresponding identities of a plurality of members of a group, receiving an indication of group content including at least one content item stored in association with the group, and enabling access to the group content by the members based on presence information related to the members indicating that a presence threshold associated with the group content is met. A corresponding method and computer program product are also provided. | 06-02-2011 |
20110131664 | CONTENT AGING - A device includes a memory to store instructions; and a processor to execute the instructions to determine that access rights, associated with a particular user in relation to particular content, have expired; degrade an appearance of the particular content or a representation of the particular content, where the degradation is amplified over a grace period that commences upon the expiration of the access rights, in response to determining that the access rights have expired; determine that the grace period associated with the expired access rights has ended; and end access to the particular content, in response to determining that the grace period has ended. | 06-02-2011 |
20110138479 | Maintaining The Integrity Of Email Authorship - Maintaining the integrity of email authorship including receiving, by a receiving email client, an email message containing content created by a sender; identifying, in dependence upon the email message, an edit authority value; receiving, from a recipient of the email message, an instruction to forward the received email message; receiving, from the recipient, an instruction to edit the content contained in the received email message; and determining, in dependence upon the edit authority value, whether to allow the recipient to edit the content; if the recipient is allowed to edit the content, determining, in dependence upon the edit authority value, whether to enforce edit tracking in the content; and forwarding the email message with the recipient's edits tracked if edit tracking is enforced; or forwarding the email message with the recipient's edits untracked if edit tracking is not enforced. | 06-09-2011 |
20110138480 | METHOD AND APPARATUS FOR PROVIDING MOBILE SOCIAL NETWORKING PRIVACY - A method, computer readable medium and apparatus for providing mobile social networking privacy are disclosed. For example, the method receives a request from a third party application for location information of a mobile endpoint device user, determines whether the third party application is a multiple user application and provides the location information of the mobile endpoint device user to the third party application in accordance with a privacy setting pre-defined by an authorized user if the third party application is a multiple user application. | 06-09-2011 |
20110138481 | RECORDING MEDIUM, AND RECORDING/REPRODUCING METHOD AND RECORDING/REPRODUCING APPARATUS FOR RECORDING MEDIUM - The present invention provides a recording/reproducing method for a recording medium including a data recording layer and a user information recording layer, wherein the recording/reproducing method includes the steps of: receiving inputted user information; determining whether the inputted user information matches the user information recorded on the user information recording layer of the recording medium; and recording data onto the data recording layer of the recording medium, or reproducing data of the data recording layer, in accordance with the result of the determination. | 06-09-2011 |
20110138482 | DATA DELIVERY APPARATUS AND DATA DELIVERY METHOD - A data delivery apparatus including a storage adapted to store limited-access data which associates user data for specifying a user, with data, access to which is permitted or limited to the user; a function determination unit adapted to determine whether a destination device to which the limited-access data is to be transmitted has an access control function of permitting or limiting access to the limited-access data for each user; an authentication unit adapted to, when the limited-access data destination device is determined not to have the access control function, request input of authentication information and performing an authentication process using the input authentication information; and a transmission control unit adapted to, when the authentication process by said authentication unit is successful, transmitting the limited-access data to the destination device. | 06-09-2011 |
20110145930 | Method, Program Product and Server for Controlling a Resource Access to an Electronic Resource Stored Within a Protected Data - Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI. | 06-16-2011 |
20110145931 | System and Method for Managing Information Flow Between Members of an Online Social Network - An online social network is provided in which members of the online social network control who may view their personal information and who may communicate with them. The members control who may view their personal information by setting a visibility preference. A member may not view another member's full personal profile if the measure of relatedness between the two is greater than the visibility preference of the other member. The members also control who may communicate with them by setting a contactability preference. A member may not communicate with another member if the measure of relatedness between the two is greater than the contactability preference of the other member. | 06-16-2011 |
20110154506 | Federation of email - A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria. | 06-23-2011 |
20110154507 | ESTABLISHING AN INTERACTIVE ENVIRONMENT FOR RENDERED DOCUMENTS - A system for identifying an electronic counterpart for a rendered document is described. The system receives an indication of a text capture operation performed from a rendered document. The indication identifies a text sequence captured as part of the text capture operation, the identified text sequence comprising fewer than nine words. In response to receiving the indication, the system uniquely identifies an electronic document from which the rendered document was rendered. | 06-23-2011 |
20110154508 | METHOD AND SYSTEM FOR PROVIDING ONLINE RECORDS - A method for providing a user with the ability to access and collect records associated with the user in a secure and private manner includes associating access information with the user for the user to use to access a server storing files comprising records associated with the user in a computer readable storage medium, providing the user with a user interface on a computing device to remotely access the records stored on the server, receiving at the server the files comprising records associated with the user from a service provider associated with the user, receiving at the server a request from the user made through the user interface of the computing device for access to the files, wherein the access information is associated with the request, and sending the user a file containing the records associated with user from the server to the computing device in response to the request. | 06-23-2011 |
20110162084 | SELECTING PORTIONS OF COMPUTER-ACCESSIBLE DOCUMENTS FOR POST-SELECTION PROCESSING - Processing documents by highlighting a portion of a document displayed on a computer display, where the portion is highlighted when a cursor is in a predefined location of the display relative to the location of the portion of the document, where the portion is identified as a candidate for selection for a post-selection operation prior to the cursor being in the predefined location of the display, and where the highlighting is done independent of any input received via a computer input device to indicate the extents of the portion, and recording a selection of the portion when an input that is predefined to indicate a selection action is received in association with the portion via a computer input device. | 06-30-2011 |
20110162085 | INFORMATION PROCESSING APPARATUS - An information processing apparatus including: a storage unit configured to store a plurality of applications and a plurality of certificates, an application execution unit configured to execute one of the plurality of applications by using one of the plurality of certificates which is designated by a user, and a storage control unit configured to control the storage unit to store correspondence information indicating that the executed application corresponds to the designated certificate, when the application execution unit executes one of the plurality of applications and one of the plurality of certificates is designated by the user. | 06-30-2011 |
20110162086 | METHODS AND APPARATUS FOR SHARING, TRANSFERRING AND REMOVING PREVIOUSLY OWNED DIGITAL MEDIA - The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (DMO) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors. | 06-30-2011 |
20110167500 | DOCUMENT MANAGEMENT DEVICE, DOCUMENT MANAGEMENT METHOD AND STORAGE MEDIUM - A document management device, when receiving information on a document registration user who is a requester for document registration and information on a document registration destination, provides a first page (top page) displayed when the document registration user logs into the document management device with a link (button) for accessing a second page for registering a desired document at the document registration destination. When the document registration user performs an operation of registering the desired document on the second page accessed through the link included in the first page, the desired document is registered at the document registration destination. | 07-07-2011 |
20110167501 | Digital rights management method and digital rights management-enabled mobile device - A DRM method and DRM-enabled mobile device are provided, in which determinations are made as to whether a playback request is input for replaying a media file, and, if so, whether the media file is a rights-protected media file on the basis of a file format of the media file. If the media file is a rights-protected media file, at least one sample playback part of the rights-protected media file is verified and replayed; otherwise, the entire rights-protected media file is replayed. | 07-07-2011 |
20110173705 | METHOD AND SYSTEM OF PROCESSING ANNOTATED MULTIMEDIA DOCUMENTS USING GRANULAR AND HIERARCHICAL PERMISSIONS - A method of processing at least one multimedia document includes determining at least one segment of the document. At least one type of permission is assigned to the at least one segment. The at least one type of permission is made available for a later use when processing the document. | 07-14-2011 |
20110179499 | System and Method for Communicating with Elected Officials - A method for facilitating communication concerning elected officials or candidates for election is disclosed. A server stores information associated with elected officials or candidates for election. The information defines a constituency group for each elected official and for each candidate for election. A user is qualified for constituency groups when the user accesses the server through a computing device. The server then provides the user access to the information associated with those elected officials and candidates for election for which the user is a qualified member of the respective constituency group. | 07-21-2011 |
20110185436 | URL FILTERING BASED ON USER BROWSER HISTORY - A URL monitoring system may use a user's browsing history to generate a score for the user. The score may be used to permit or deny access to a URL. The score may be used to represent the user's intent when browsing, and based on that intent, the user may be allowed access to a URL with conflicting classifications. The score may be also be used as a trustworthiness score so that a user who browses responsibly may have their score increased over time, and a user who browses irresponsibly or inappropriately may have their score decreased. The scores may be calculated and maintained on a user's client device, edge device, or other device within a network. | 07-28-2011 |
20110185437 | METHOD AND SYSTEM FOR MULTI-USER, MULTI-DEVICE LOGIN AND CONTENT ACCESS CONTROL AND METERING AND BLOCKING - A method and system for multi-user, multi-device content access metering and control is provided. In one embodiment, a system implements a method such that in response to user login requests, the system controls login access by providing multiple users login access to plural electronic devices capable of communicating via a communication system. Further, in response to user content access actions, the system controls access to content by selectively providing content to said one or more users via said one or more electronic devices based on content access policies. | 07-28-2011 |
20110191861 | Systems and Methods for Dynamic Management of Geo-Fenced and Geo-Targeted Media Content and Content Alternatives in Content Management Systems - Computer-implemented systems and methods are described for providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region associated with the user. An upload of content for distribution and metadata describing the content are received. A first option definition is received that defines first criteria for accessing the content in a first region. A second option definition defining second criteria for accessing the content in a second region is received. One or more options for the content are provided to the user based on the region associated with the user. An identification of an option is received from the user, and access to the content is provided according to the criteria of the option that the user has identified. | 08-04-2011 |
20110191862 | System and Method for Restricting Access to Requested Data Based on User Location - A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison. | 08-04-2011 |
20110203004 | Method and System for Electronic Publishing and Distribution of Printed Sheet Music - Described are methods and systems, including computer program products, for distributing printed sheet music. The method includes storing a set of one or more digital-print files and a set of one or more digital-audio files in a computer-readable storage medium on a back-end server. Each digital-print file includes sheet music information associated with one of the digital-audio files. Each, digital-print file and digital-audio file is associated with one or more audio identifiers. An application programming interface (API) is provided for client systems remote from the back-end server to retrieve a list of the set of one or more digital-print files and to preview the digital-audio and digital-print files. A purchase order is received for the first digital-print file from the remote client system using the API. A digital watermark is inserted into the first digital-print file. The watermarked digital-print file is transmitted to the remote client system. | 08-18-2011 |
20110203005 | SOFTWARE DISTRIBUTION METHOD, INFORMATION PROCESSING APPARATUS, AND SOFTWARE DISTRIBUTION SYSTEM - A distribution server acquires authentication information acquired from an IC card reader of an MFP and authenticated by an authentication server, and generates an installer for software which allows addition of the authentication information to transmission data of a client PC and transmission of the transmission data such that the acquired authentication information and an installer for a device driver of an image formation section of the MFP are included in the installer. Subsequently, the distribution server distributes the generated installer to a user to be authenticated using the authentication information. | 08-18-2011 |
20110219459 | SYSTEM AND METHOD FOR SECURING INPUT SIGNALS WHEN USING TOUCH-SCREENS AND OTHER INPUT INTERFACES - A system and method for securing input signals when using input interfaces such as touch-screens and other input interfaces that are suitable for handheld, mobile, computing and other devices, by generating fake signals. In accordance with an embodiment, the technique can be used to protect input signals from, e.g. a touch-screen keyboard, and make it more difficult for malicious software applications to intercept and understand such input signals. The technique can also be implemented without requiring significant changes to the underlying operating system (OS) or graphical user interface (GUI). In accordance with an embodiment, a security enhancer or security enhancing application injects fake signals into the OS/GUI input signals queue. The security enhancer or security enhancing application is also associated with a communication channel that allows it to establish a cryptographic signature or key with authorized or sensitive application receivers that are authorized to receive the input signals. The fake signals can later be removed from the input signal stream only by the authorized receivers of the input signals. Unauthorized application listeners may be able to intercept a signal, but are unable to determine the original input. | 09-08-2011 |
20110225658 | END USER LICENSE AGREEMENT ON DEMAND - Systems and methods for providing end user license agreements on demand for information as a service is provided. In some embodiments, a computer-implemented system can include: at least one processor; and at least one publication module configured to publish content to a consumer. The computer-implemented system can also include at least one condition generation module configured to generate a representation of one or more conditions associated with use by the consumer for published content from the at least one publication module. The conditions can be canonicalized conditions representing standard terms to be included in the representation. In some embodiments, the representation is a license agreement for the consumer. The computer-implemented system can also a computer-readable storage medium storing computer-executable instructions that, when executed, cause the at least one processor to perform one or more functions of the at least one publication module or the at least one condition generation module. | 09-15-2011 |
20110225659 | SEMANTIC CONTROLS ON DATA STORAGE AND ACCESS - Methods and apparatus teach defining an access policy to digital data available on one or more computing devices, including identifying one or more semantic attributes of at least one first digital data set and using the identified attributes to define policy dictating user access privileges. On receipt of a user request to access at least one second digital data set, semantic attributes are compared to the at least one first digital data set and access is allowed or not allowed based on the policy. Semantic attributes are selected from at least one of a closeness attribute, a relatedness attribute, and a semantic vector attribute. Also is taught configuring a policy enforcement agent on the one or more computing devices to undertake the comparing and to allow or not allow access. In turn, computer program products and computing systems for accomplishing the foregoing are provided. | 09-15-2011 |
20110231940 | CREDENTIAL-BASED ACCESS TO DATA - Existing mechanisms that control access to data based upon whether the user seeking to access the data is identified among the users that are allowed to access the data, can be extended to further control access based upon the provision of credential data by the user, or processes associated therewith. Access control entries can limit access based upon Boolean conditionals, including those referencing credential data, such that access can be granted only to specific users that provide the credential data or, alternatively, to any user that provides it. The referenced credential data can be specified in the access control information in an obfuscated form for security purposes. Information associated with the user, such as a user token, can be temporarily updated to include credential data when provided by the user, so as to enable access to the data but to prevent such access from remaining open too long. | 09-22-2011 |
20110247080 | CONTROLLING ACCESS TO AND MANIPULATION OF A DATA OBJECT BY DIFFERENT DATA OBJECT USERS - A method, system, and computer program product for controlling access to and manipulation of a data object by different data object users. An example method includes determining a current user role of a current user requesting interaction with the data object. The method also includes determining a current lifecycle state of the data object. The method further includes restricting, by a computer processor, interaction with the data object by the current user based on at least the current user role of the current user and the current lifecycle state of the data object. | 10-06-2011 |
20110247081 | SYSTEM AND METHOD FOR SELECTIVELY REDACTING INFORMATION IN ELECTRONIC DOCUMENTS - A computer implemented system and method is provided for imposing access controls on selective portions of electronic documents by defining data attributes as conditions for access to particular information in a document. Commands from a redactor identify at least one portion of an electronic document to be subject to access control. A set of selectable access control directives defining conditions for accessing the identified portions is presented to the redactor. Access control is imposed on the identified portions in accordance with the defined conditions in response to receiving the selective access control directives. | 10-06-2011 |
20110247082 | Integration of Different Mobile Device Types with a Business Infrastructure - A mobile implementation channel enables secure mobile customer alerts, content delivery, event and location awareness and context integration that can be leveraged across multiple lines of business using basic interfaces. Pushed documents may be processed by an application executing at a mobile device in a secure manner. An alert indication may be sent to the mobile device when the documents are available. The documents may then be downloaded over a secure channel if the user affirmatively responds to the alert indication and may be further encrypted and stored in an application file store. The user may subsequently select one of the documents from a document list so that the selected document may be decrypted and displayed. The stored documents in the application file store may be deleted if the operating system has been compromised, the user is not associated with a business, or the user device is lost or stolen. | 10-06-2011 |
20110247083 | INTEGRATING SECURITY BY OBSCURITY WITH ACCESS CONTROL LISTS - Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked. | 10-06-2011 |
20110252483 | Reputation-Based Authorization Decisions - This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor. | 10-13-2011 |
20110258706 | LICENSING RIGHTS FOR MEDIA CONTENT THAT FOLLOWS A SUBSCRIBER - Various embodiments of the present invention relate to systems, methods, and computer-readable medium providing licensing rights for media content that follows a subscriber so that the subscriber may experience the media content on various content distribution platforms. In particular embodiments, the systems, methods, and computer-readable medium transfer licensing rights for a user for particular media content that is associated with a first device on a first distribution platform so that the rights are associated with a second device on a second distribution platform. As a result, in various embodiments, the user is able to experience the particular media content with the use of the second device on the second distribution platform. | 10-20-2011 |
20110258707 | E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request. | 10-20-2011 |
20110265188 | Role-Based Graphical User Interfaces - A role-based Graphical User Interface (GUI) may be provided. First, information associated with an application user may be received. A role associated the application user may be then determined. The role may then be analyzed to determine which application elements are permitted to the user and which application elements are restricted from the application user. Next, the permitted application elements may be loaded with permissible GUI elements visible and restricted GUI elements hidden. The permissible GUI elements may be associated with the application elements permitted to the application user, while the restricted GUI elements may be associated with the application elements restricted from the user. | 10-27-2011 |
20110265189 | RE-RANKING SEARCH RESULTS FROM AN ENTERPRISE SYSTEM - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security, recency, or other attributes to be submitted at query time, for example, in order to re-rank query results from enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 10-27-2011 |
20110277039 | Image Storage In Electronic Documents - A computer-implemented method for controlling access to digital media involves receiving a URL at a computer server system, decoding the URL, extracting a user ID of a user who submitted the URL and an image ID of an image that is accessible by the server system, using the user ID to determine whether the user who submitted the URL is authorized to access the image, and controlling access to the image by the user based on the determination of whether the user who submitted the URL is authorized to access the image. | 11-10-2011 |
20110283364 | COMMUNICATION METHOD, DISPLAY APPARATUS, MODERATOR TERMINAL APPARATUS, USER TERMINAL APPARATUS, AND MULTI-USER COMMUNICATION SYSTEM INCLUDING THE SAME - In a multi-user communication system in which communication is carried out between a display apparatus and multiple information terminal apparatuses (a moderator terminal apparatus and a user terminal apparatus) over a network, the moderator terminal apparatus sends, to the display apparatus, a data ID (ID information) for identifying data to be displayed in a display unit of the display apparatus, user information indicating a user that is an owner of that data, and access rights information that is set for each user using the information terminal apparatuses and that indicates whether or not the generation and changing of that data is permitted. The display apparatus displays the data identified by the data ID (ID information) in the display unit based on the user information and the access rights information. | 11-17-2011 |
20110283365 | METHOD FOR USER PRIVACY PROTECTION - A system for generation of processed data for use in third party relationship monitoring is described. The system includes a communications system providing services to subscribing users. The communications system includes a rules database for storing rules, a data mining agent for mining and storing data relating to subscribing users, a content generator for generating protected user-related data from the mined data and communicating said user-related data over an interface, and a rights object generator for generating a usage rights object in response to the rules stored in the rules database and communicating said usage rights object over the interface. A tamper proof processing arrangement is connected to the interface. The tamper proof processing arrangement receives the user-related data and usage rights object from the communications system and processes the user-related data under control of the usage rights object. A signal output generator generates an output signal representative of processed data received from the processing arrangement. | 11-17-2011 |
20110289596 | RESTRICTING ACCESS TO VOLUMES - Architecture that provides programmatic association of a device (e.g., removable) to a currently logged-in user, and restricts access to the drive only to that particular logged-in user. When active, the architecture detects when devices are added to the system, determines which logged-in user a given device (or devices) should be assigned, modifies the security settings for the device(s), and makes a per-user drive letter mapping to that device such that only the logged-in user can see the mapped device. In the context of serially attachable peripheral devices such as USB (universal serial bus) devices (and IEEE 1394 devices), for example, access can be restricted to a user based on the USB hub into which the device is connected. This prevents the operating system from assigning a global drive letter to a device or device volume (for drives) when the device is added. | 11-24-2011 |
20110289597 | Method and Apparatus for Remediating Unauthorized Sharing of Account Access to Online Resources - A number of effective alternatives for discouraging unauthorized online-resource sharing are discussed. An anti-sharing strategy can be built by applying one or more of the alternatives in response to possible, strongly-suspected or virtually certain unauthorized sharing. | 11-24-2011 |
20110289598 | Blocking of Unlicensed Audio Content in Video Files on a Video Hosting Website - A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content with licensed audio content. An audio replacement tool is provided that enables the user to permanently mute the original, unlicensed audio content of a video file, or select a licensed audio file from a collection of licensed audio, and insert the selected in place of the original audio. Where a video file includes unlicensed audio, the video hosting website provides access to video files to a client device, along with an indication to the client device to mute the audio during playback of the video. | 11-24-2011 |
20110302660 | METHOD AND APPARATUS FOR SECURING DIGITAL DEVICES WITH LOCKING CLOCK MECHANISM - A mechanism to secure a synchronous digital device such as a Mobile Device is provided. Using the clocking mechanisms of the synchronous digital designs, the invention enables mechanisms to secure Mobile devices. When a potential security breach is detected, blocking the clock will disable the Mobile Device. The invention also contemplates mechanisms to re-enable the Mobile Device when the security risk from the block condition is resolved. The invention further contemplates mechanisms to secure the enterprise information technology system from the hacked or stolen Mobile Devices. | 12-08-2011 |
20110302661 | System & Method for Distributing Digital Assets Across a Network - Digital media assets are distributed through the use of identification data. A rights-holder server is adapted to introduce a digital asset which is associated with a set of distribution rules. The digital assets are stored on host servers and a management server tracks transfers of the digital asset over the network. | 12-08-2011 |
20110314558 | METHOD AND APPARATUS FOR CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes receiving an authentication request from a user, receiving an aggregate risk score, selecting an authentication mechanism based at least on the aggregate risk score, and applying the authentication mechanism to decide the authentication request from the user. The aggregate risk score may be based at least on a comparison of the user's past behavior with a plurality of context data associated with the user. | 12-22-2011 |
20110314559 | SYSTEM ACCESS DETERMINATION BASED ON CLASSIFICATION OF STIMULI - An authentication system is disclosed. Information associated with at least one of a user's use of a resource and demographic information associated with the user is collected. The collected information is processed to determine one or more stimuli to be presented to the user. The collected information is processed to determine one or more stimuli to be presented to the user. Classification data provided by the user is stored. Classification data associated with the user is received. The received classification data is compared to the stored classification data. A determination of whether to authorize an action based at least in part on the comparison is determined. | 12-22-2011 |
20110314560 | SHARING AND LENDING OF DIGITAL CONTENT - An individual may wish to make a gift of digital media to a designated recipient. The digital media may be previously purchased by the individual or may be new, unused digital media purchased specifically as a gift for the recipient. The sender of the gift sends a gift notification. The sender is then verified to ensure that the sender is authorized to make the gift by matching an identifier of the digital media with an identifier associated with the sender. The digital media may be associated with a set of rights and privileges. Further rights and privileges associated with the digital media may be offered to the recipient. | 12-22-2011 |
20110321175 | MONITORING AND REPORTING OF DATA ACCESS BEHAVIOR OF AUTHORIZED DATABASE USERS - A computer-implemented system and method of monitoring data access activity of a user of a system is presented here. The method maintains a respective score for each of a plurality of monitored data access events, resulting in a set of scores for the user. The method continues by monitoring behavior of the user to detect occurrences of the monitored data access events, and updating the set of scores in response to detected occurrences of the monitored data access events. The method initiates an appropriate course of action when the updated set of scores is indicative of unauthorized, suspicious, or illegitimate data access activity. | 12-29-2011 |
20110321176 | AUTHORITY TRANSFER SYSTEM, AUTHORITY TRANSFER METHOD, INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM - To prevent a transfer of an authority from being useless as much as possible, an authority transfer unit includes a decision unit for making a decision that an authority of a user with respect to a management unit is transferred to a processing request unit. | 12-29-2011 |
20120005761 | MOBILE ACCESS TO DIGITAL MEDIA - A computer implemented method provides a specific traveler with mobile access to a digital media library. A plurality of registration stations, which are utilized in a travel and lodging industry to acknowledge arrivals and departures of travelers, are monitored. In response to detecting a specific traveler checking in at a pre-determined registration station from the plurality of registration stations, contents of a pre-defined digital media library are transmitted to a digital media player for use by the specific traveler. | 01-05-2012 |
20120011594 | SYSTEM AND METHOD FOR COPPA COMPLIANCE FOR ONLINE EDUCATION - A method of providing an online verifiable consent from a parent to a minor to permit usage of an online education system and that prevents misrepresentation and unauthorized access is provided. The method comprises establishing a relationship between an adult parent and a minor and based on the relationship verifying whether the adult parent permits the minor access to the online education system. If the adult parent permits the minor access, the method then grants access to the minor to the online education system. | 01-12-2012 |
20120017286 | IMAGE FORMING APPARATUS, EQUIPMENT SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM - An image forming apparatus includes a login unit configured to receive a login of a user; a program storage unit; a function introduction unit configured to obtain a first program licensed to the user and license information of the first program, and to store the first program and the license information in the program storage unit without deleting a second program that is a different version of the first program from the program storage unit; a user information storage unit configured to store user information that registers license information of introduced programs and version information with user IDs; and a function providing unit configured to specify license information and version information that are associated with a user ID of a user who logs into the image forming apparatus in order to provide a function realized by a program corresponding to the license information and the version information to the user. | 01-19-2012 |
20120023592 | MEDICAL ALERT COMPUTER INTERFACE TAMPER-PROOF SECURE DEVICE - A medical information system includes a portable device and remote authentication computing device. The portable device stores a person's personal medical information, which it does not allow to be accessed without authentication, and has an activation mechanism and a computing device communication mechanism. The remote authenticating computing device is connected to a computing device network and stores authentication information and has an authentication software module and a diagnostic software module. The activation mechanism communicates the device with the remote authenticating computing device. The authentication software module requests authentication information from a user, receives input authentication information, verifies received authentication data against the stored authentication information, and after successful verification allows the medical information to be accessed by a computing device. The diagnostic software module determines whether the portable device has been damaged or tampered with and if so the stored medical information is destroyed. | 01-26-2012 |
20120023593 | SYSTEM AND METHOD FOR FILTERING INTERNET CONTENT & BLOCKING UNDESIRED WEBSITES BY SECURE NETWORK APPLIANCE - A secure network appliance for filtering Internet websites checks each request from a user's browser against a whitelist of pre-approved websites and passes it only if it is on the whitelist. Otherwise, the request is replaced with pre-arranged content and returned as a response to the user's web browser. It can also check the port the user's request came through against an approved ports whitelist, and responses sent from the Internet against an approved websites whitelist. The network appliance is encapsulated within a secure container so that only an authorized administrator having a unique key can unlock it and access its control functions. The secure container may be formed as a separate hardware component that is physically interposed between a router and a user's computer, or as secure software that run on or operates with a network server. | 01-26-2012 |
20120023594 | METHOD AND APPARATUS FOR MANAGING CONSUMPTION RIGHT FOR MULTIMEDIA SERVICE - Disclosed is a method and an apparatus for managing a consumption right for each stage for a service including a plurality of stages or episodes. The right issuer includes the access condition, which allows an access to the Right Object (RO) for each stage, in the right object representing the consumption right for the stepped multimedia service and then transfers the right object to the device. When the stepped multimedia service is executed, the device obtains the access information satisfying the access condition corresponding to a corresponding stage from the right issuer or a service provider and then transfers the access information to the RO, allowing a user to access the RO and execute a service of the corresponding stage by using the RO. | 01-26-2012 |
20120023595 | METHOD FOR UPDATING DATA IN ACCORDANCE WITH RIGHTS MANAGEMENT POLICY - Disclosed is a computerized system and method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management policies with certain senders and recipients of messages, with groups of users possessing certain common criteria which define the users and groups of users, with certain attributes of the message, and with certain environmental attributes. In some embodiments, an administrator is allowed to automatically update a rights management protected message as it passes through a message transfer agent. The administrator may determine either on a regular interval or an ad-hoc basis that the message transfer agent scan the messages stored to determine whether or not the content has expired. If the content has indeed expired the administrator may take steps to have the expired content deleted entirely, refreshed with more current content, or replaced with a tombstone indicating that the original content has expired. | 01-26-2012 |
20120030773 | MANAGING DEVICE CONNECTIVITY AND NETWORK BASED SERVICES - Methods and apparatus are provided for interoperating a device with network based services. In one embodiment, a method includes detecting registration with a service account, providing a graphical display for user selection during output associated with content stored by the device, the graphical display identifying a network based service based on the service account, and detecting user selection of the graphical display, wherein the network based service relates to a network accessible third party service associated with the device based on the service account. The method may further include transmitting the content by the device based on the user selection to the network based service. | 02-02-2012 |
20120036584 | REPORTING INFORMATION ABOUT USERS WHO OBTAIN COPYRIGHTED MEDIA USING A NETWORK IN AN UNAUTHORIZED MANNER - Methods and systems for reporting information about users who obtain copyrighted media illegally using a network are provided. A particular copyrighted media from a source of copyrighted media may be associated with a user's computer. Copyright fees have not been paid for the particular copyrighted media. Information about the user of the computer is reported. | 02-09-2012 |
20120042391 | METHOD AND SYSTEM FOR PROTECTING CHILDREN FROM ACCESSING INAPPROPRIATE MEDIA AVAILABLE TO A COMPUTER-BASED MEDIA ACCESS SYSTEM - A method for protecting children from accessing inappropriate media available to a computer-based media access system according to one embodiment is described. The method comprises configuring a usage compliance mechanism with at least one restricted media identifier which identifies the inappropriate media. The method further includes determining that a child is attempting to access an instance of media and comparing that instance of media with the restricted media identifier. When the instance of media matches the restricted media identifier, the child is denied access to the instance of media. | 02-16-2012 |
20120042392 | PEOPLE DIRECTORY WITH SOCIAL PRIVACY AND CONTACT ASSOCIATION FEATURES - In one embodiment, a social networking system provides people look up service and establish anonymous communication session between users; creates contact association for future communication between users; and configures one or more privacy settings for users. | 02-16-2012 |
20120042393 | USER TERMINAL, METHOD AND SYSTEM FOR TRANSMITTING DIGITAL CONTENT - A user terminal, a method and a system for transmitting digital content. A user terminal receives digital content from a digital content provider, the digital contents include a digital rights management (DRM) unit to change DRM information of the received digital content; a content processing unit to encode the digital content having the changed DRM information; and a communication unit to transmit the encoded digital content to an external terminal. | 02-16-2012 |
20120047584 | USER REQUEST APPROVAL SYSTEM USING ADVERTISMENTS AND METHOD - A user request approval system includes access to an advertisement database, an advertisement verification generation module, a user interface module and a checking module. The advertisement database stores a plurality of advertisement. The advertisement verification generation module receives advertisement from the advertisement database and generates an advertisement verification based on the advertisement. The user interface module displays the advertisement verification on a user interface and receives an input user verification. The checking module determines if the input verification corresponds to the advertisement verification. | 02-23-2012 |
20120060226 | METHOD FOR AUTHORIZING USE OF AUGMENTED REALITY (AR) INFORMATION AND APPARATUS - A method for authorizing use of Augmented Reality (AR) information includes acquiring information regarding a location at which the AR information is to be provided, authorizing a user to use the AR information, creating attribute information including the AR information, the location information, and authority information, and transmitting the attribute information to an AR system. The AR system can register the attribute information, and can provide the AR information only to authorized users. An apparatus to authorize use of Augmented Reality (AR) information includes a location information acquiring unit, an authorization unit to authorize a user to use the AR information, and an AR information processor to create attribute information. The attribute information is transmitted to an AR system as a request for the AR system to register the attribute information so the AR system provides the AR information only to authorized users. | 03-08-2012 |
20120072996 | FACEMAIL - Systems and methods are disclosed for generating, sending, and delivering a message addressed using an image of an intended message recipient of the message. In one embodiment, a central server receives a message including an image of an intended message recipient from a first user device of a first user. The central server then identifies a second user as the intended message recipient based on the image of the intended message recipient. Then, before delivering the message, the central server obtains an image of a user at a second user device associated with the second user and sends the image to the first user device where the image is presented to the first user. Upon receiving authentication from the first user device that the user at the second user device is the intended message recipient, the central server delivers the message to the second user device of the second user. | 03-22-2012 |
20120072997 | Systems and Methods to Modify Interaction Rules During Run Time - In one aspect, a computing apparatus is configured to represent offer rules based on requirements for the detection of predefined types of events and actions scheduled to be performed in response to the detection of each occurrence of the events. The events are independent from each other in processing and are linked via prerequisite conditions to formulate the requirements of an offer campaign. The computing apparatus is configured to store data indicating the completion statuses of the events and process the events, including the scheduled actions, if any, in an atomic way. Thus, the offer rules can be changed on-the-fly during run time execution by the computing apparatus. | 03-22-2012 |
20120079606 | RIGHTS AND CAPABILITY-INCLUSIVE CONTENT SELECTION AND DELIVERY - Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those devices. A user might access the same piece of content on two different devices, and can automatically receive a higher quality format on a device capable of playing that higher quality format. The user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content. Further, the user can pause and resume content between devices even when those devices utilize different formats, and can access content on devices not otherwise associated with the user, receiving content in formats that are appropriate for those unknown devices even if the user has not previously accessed content in those formats. | 03-29-2012 |
20120090037 | CONTROL AND VERIFICATION OF PERMISSIONS - A verification method includes configuring a reference system, running on a computer, to have the same set of executables and customizations as an e-business system to be verified. The reference system is configured with one or more roles that have permissions to execute all transactions in a scope of a planned verification. One or more business processes that are implemented in the e-business system and are in the scope of the planned verification are mapped and are executed using the reference system. Reference data is created by merging records from logs of the permission checks with respect to at least one role in the scope of the verification. Permission settings for roles in the e-business system are compared with corresponding permission values in the reference data. Based on comparing the permission settings, an indication is displayed to a user of whether the permission settings match the corresponding permission values. | 04-12-2012 |
20120102572 | NODE CONTROLLER FOR AN ENDPOINT IN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide an intelligent node controller (e.g., for an endpoint/node such as a cloud node) to process requests. Specifically, (among other things) the node controller will read a request message from a cloud node queue that is associated with the endpoint. The request message typically includes details related to a request for cloud resources and/or services received from a consumer. The node controller executes program code in an attempt to process the request. As the request is being processed, the node controller can place state messages indicating a state of fulfillment of the request on a cloud manager queue that is associated with a cloud manager from which the request message was received. In addition, the node controller can update an audit via an audit queue with the state messages. When a request cannot be processed, the node controller can place a failure message in a triage queue or the like. | 04-26-2012 |
20120102573 | DIGITAL DELIVERY SYSTEM AND USER INTERFACE FOR ENABLING THE DIGITAL DELIVERY OF MEDIA CONTENT - A system, method, and computer readable storage medium provides the ability to deliver media content. A repository stores media content and marketing assets for the media content. A server computer provides a website accessible on the Internet worldwide to client computers. The website provides the ability to search a public site catalog/library of media content that is publicly available. The website further provides marketing assets for licensed media content from the library to authorized client users (that have a license to media content) in a secure manner. The website further provides preview screening access and download access to licensed media content (e.g., titles of audio-visual media content) to the authorized client users. | 04-26-2012 |
20120102574 | CREATING DISTINCT USER SPACES THROUGH USER IDENTIFIERS - A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform. | 04-26-2012 |
20120110678 | Digital Rights Management (DRM) Domain Recommendation and Selection Based on a User's Social Graphs - A network server implements Digital Rights Management (DRM) techniques to limit or inhibit unauthorized access or usage of protected multimedia content, such as a video or a song. However, the server also allows a user who has purchased protected multimedia content to share that content with one or more other people based on the strength of the user's relationships with those people. | 05-03-2012 |
20120117660 | ACCESS CONTROL FOR SERVER APPLICATIONS - A method, system, and computer program product for access control for a server application provided between a server executing an application and a client. Access control is added to an existing server application (for example, a legacy application) without changing the application or the database. The method includes: capturing a screen from the server application; determining if the screen includes sensitive content; and checking a client user's authorization before sending a screen including sensitive content to the client. Determining if the screen includes sensitive content may include: carrying out text recognition on the screen content; and analyzing the output of the text recognition to identify sensitive content. | 05-10-2012 |
20120117661 | SOFTWARE AUTHORIZATION SYSTEM AND METHOD - A software authorization system has a server end and a user end. A software authorization method includes acquiring a software identification code of a protected software when the user end downloads the protected software from the server end; transmitting the software identification code and an inherent user identification code to the server end; acquiring a first key and main key by the server end according to the user identification code and the software identification code, respectively, so as to generate a second key by operating the main key and the first key and transmit the second key to the user end; restoring the main key by the user end with the second key combined with the first key; and decrypting the protected software by the main key. Therefore, the protected software is hard to be decrypted. | 05-10-2012 |
20120117662 | FILE SYSTEM OPERATION AND DIGITAL RIGHTS MANAGEMENT (DRM) - A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application. | 05-10-2012 |
20120124675 | APPARATUS AND METHOD FOR MANAGING DIGITAL RIGHTS THROUGH HOOKING A KERNEL NATIVE API - Provided are an apparatus and method for managing digital rights. An agent unit manages application programs to which DRM is to be applied and rights to contents processed by the application programs to which DRM is to be applied, and encrypt and decrypt the contents processed by the application programs. A rights management unit authenticates a user and manages a user right to the contents processed by the application programs. A kernel API hooking unit monitors input/output of a file through hooking kernel native APIs, requests the rights management unit to verify the user right to the contents to be processed, and requests the agent unit to encrypt or decrypt the contents when the user right to the contents to be processed is verified. | 05-17-2012 |
20120124676 | QUICK PAYMENT USING MOBILE DEVICE BINDING - Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library. | 05-17-2012 |
20120131681 | RELIABLE SOFTWARE PRODUCT VALIDATION AND ACTIVATION WITH REDUNDANT SECURITY - Systems, methods, and apparatus for validating product keys. In some embodiments, a product key includes security information and identification information identifying at least one copy of a software product. The security information may include a first portion to be processed by a first validation authority using first validation information and a second portion to be processed by a second validation authority using second validation information. The second validation information may be stored separately from the first validation information and may not be accessible to the first validation authority. In some embodiments, the first validation authority randomly determines whether a product key is to be audited by the second validation authority. Alternatively, the first validation authority may determine whether to audit based on a type of the software product associated with the product key and/or a perceived level of security risk. | 05-24-2012 |
20120131682 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENTS - The present invention discloses an apparatus and method for protecting digital spatial information. The apparatus for protecting digital spatial information according to the present invention includes a spatial information authority database which stores access authority information on spatial information, an access authority determining unit which, when there is a request for access to the spatial information from a user, determines whether to permit the user to access the requested spatial information by referring to the spatial information authority database, a spatial information database, a spatial information providing unit which obtains the access-permitted spatial information from the spatial information database, organizes the information based on the user's request for access, and provides the information, and an access control unit. | 05-24-2012 |
20120131683 | UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS, AND SYSTEMS - Apparatuses, methods, and systems for transforming user identification information and user selection data inputs into a profile data output, a generated query output, search results output, and a secure home page with customized content. According to one embodiment, the method includes indexing disparately owned content via a multi-content owner spider indexing engine; generating a disparately owned content index from the indexing engine; receiving, by a first server, a request to access secure content through a network, the request including user identification information; automatically constructing a query based on the request without input from the user; providing the constructed query to the search engine and running the constructed query against the index; constructing a display by placing the results of the query sent from the search engine within a multi-source owner template interface; and providing the multi-source owner template interface to a requestor for display. | 05-24-2012 |
20120137373 | Role-based Access Control over Instructions in Software Code - In one embodiment, a method determines a role for a user for access to software code. A marker associated with an instruction in the software code is determined. An access level for the user based on the marker and the role is then determined. The access level is enforced based on the instruction associated with the marker for the software code. | 05-31-2012 |
20120137374 | SYSTEM AND METHOD FOR MANAGING HEALTH DATA - A system and method for managing health data based on a reader of a storage unit containing at least one health datum, said reader comprising an RFID tag reader containing a user code. The reader is configured to request, from a remote server by a local PC, validation of said user code and means for requesting entering of a password by said PC, and means for verifying said password, when said remote server is not accessible. When said user code or said password has been validated, the reader has access to said storage unit for reading/writing. | 05-31-2012 |
20120137375 | SECURITY SYSTEMS AND METHODS TO REDUCE DATA LEAKS IN ENTERPRISE NETWORKS - Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources. | 05-31-2012 |
20120137376 | RE-DOWNLOAD MANAGEMENT OF PREVIOUSLY ACQUIRED DIGITAL MEDIA ASSETS - Improved techniques that enable users to download digital media assets are disclosed. According to one aspect, digital media assets that a user has acquired from a remote media repository can be authorized for download multiple times. This, for example, allows a user to subsequently re-downloaded digital media assets that the user previously acquired. In one embodiment, digital media assets that a user previously downloaded to a user client device from a remote media repository can be made available to the user for subsequent re-download. Advantageously, a remote media repository can, in effect, provide users with a remote backup for previously acquired digital media assets. | 05-31-2012 |
20120144501 | REGULATING ACCESS TO PROTECTED DATA RESOURCES USING UPGRADED ACCESS TOKENS - Various techniques and procedures related to client authorization and the management of protected data resources are presented here. One approach employs a computer-implemented method of regulating access to protected data resources. In accordance with this approach, a client sends a first access token to a server, the first access token having first data access attributes associated therewith. In response to receiving the first access token, the server sends a second access token to the client module, the second access token having second data access attributes associated therewith. The second data access attributes represent expanded or additional data access capabilities granted to the client. The client may then access protected data resources using the second data access token. | 06-07-2012 |
20120151603 | Method, Apparatus and Server for User Verification - The present disclosure discloses a method, apparatus, and server for user verification to store a plurality of pictures in a database and define a plurality of rotational directions. The method includes: when receiving from a client a request for a checkcode, rotating a picture retrieved from a database according to a defined rotational direction; after storing a correlation between an identification of the client and the rotational direction of the retrieved picture, outputting the rotated picture to the client; receiving a rotational direction of the picture from the client; finding the stored correlation between the identification of the client and the stored rotational direction of the retrieved picture according to the identification of the client; determining whether or not the rotational direction of the picture returned from the client matches the stored rotational direction. If they match, user verification is passed; otherwise, the user verification is failed. The large number of pictures in the database makes it difficult for enumeration. In addition, by using the rotational direction as identification information to verify user, the safety and accuracy of user verification can be enhanced. | 06-14-2012 |
20120151604 | SEEDING OF ACCOUNT SETUP OPERATIONS - A system and method and provided for setting up target user accounts based on the accounts or experiences of other users or archetypes. One example method first includes determining that a first user wants to set up or modify an account for the consumption of digital content items. Then an account profile is identified for a second user that has an affinity with the first user, with the account profile being based on an account of the second user. Underlying protected information in the source account/profile is then protected to ensure that the account profile is free of sensitive or otherwise protected information. The account profile is then made available and used to set up or modify an account for the target user. | 06-14-2012 |
20120151605 | Information Exchange Engine Providing a Critical Infrastructure Layer and Methods of Use Thereof - A virtual record manager and a data exchange engine are provided for dynamically defining data records in a database and for dynamically allocating instances of defined data records. These components are capable of mediating between the database and application and client interface layers to facilitate exchange of information over a network. Embodiments are configured to allow complex data records having a plurality of related fields, and to allow management and exchange of information at both the data field level and data record level. | 06-14-2012 |
20120159646 | Storage device with a hidden space and its operation method - A storage device with a hidden space comprises a case, a biometric identification device and a switch device and embodies digital data protected in a private zone without any concern about digital data disclosed to any person who holds a data disk according to a procedure of comparing a user's characteristic signals transferred from a user's features read by the biometric identification device with a test program in an automatic executive program. | 06-21-2012 |
20120159647 | Systems and methods for user identity verification and risk analysis using available social and personal data - A new approach is proposed that contemplates systems and methods to support user identity verification based on social and personal information of the user. Under the approach, customers/users are required to grant identity verifying party a degree of access to their social network information, including but not limited to, account data and social graph information on social networks. The identity verifying party then acquires information of a current or potential user's online presence in addition to other information of the user and utilizes such information to verify the user's identity in the real world and/or to assess the fraud risk of a specific financial transaction requested by the user. | 06-21-2012 |
20120159648 | APPARATUS AND METHOD FOR MANAGING DIGITAL RIGHTS USING VIRTUALIZATION TECHNIQUE - The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to access a desired text file in an independent area through a virtual machine corresponding to a licensed right for accessing the text file. The present invention comprises a virtual machine (VM) management unit for controlling a user access authorization function for accessing the text file in the area to which the virtualization technique is applied. | 06-21-2012 |
20120159649 | Sensitive Information Handling on a Collaboration System - On a document collaboration system, such as a wiki, the content of postings to the collaboration system is monitored for sensitive information. Under some embodiments, when instances of such sensitive information are detected, an e-mail is sent to the user that posted the collaboration page posting. In other embodiments, a message is then sent to a person associated with the entity that indicates that the information placed on the collaboration page is confidential information or is related to an asset of the entity. In further embodiments, individual people are assigned responsibility for monitoring the use of certain instances of sensitive information on the collaboration system. Each user is only notified when the instances they are responsible for appear on a collaboration page. In other embodiments, if a collaboration page includes an instance of sensitive information, access to the collaboration page is changed such that fewer people can access the collaboration page. | 06-21-2012 |
20120192287 | TEXT MESSAGE SECURITY - Systems and methods are provided for protecting text messages. A sending device inserts security information in a text message, and sends the text message to a receiving device. The receiving device detects an attempt by an end user to access the text message. When this occurs, the receiving device parses the text message to identify the security information inserted in the text message, and controls access to the text message by the end user based on the security information. | 07-26-2012 |
20120192288 | ELECTRONIC DEVICE WITH FUNCTION OF SECURING DIGITAL FILES AND METHOD THEREOF - An electronic device with a function of securing digital files which includes a number of input units, a storage unit, a display unit and a processing unit. Each of the input units is assigned an identifier. The storage unit stores a predetermined identifier and a predetermined password. The processing unit includes an input unit determining module, an acquiring module, an identifier determining module, a prompt window generating module, a password determining module and a performing module. The input unit determining module determines which input unit is utilized. The acquiring module acquires the identifier of the determined input unit. The identifier determining module determines whether the acquired identifier matches the predetermined identifier. The prompt window generating module generates a prompt window. The password determining module determines whether the password input matches the predetermined password. The performing module opens the required file if the password input matches the predetermined password. | 07-26-2012 |
20120192289 | ELECTRONIC INFORMATION ACCESS SYSTEM AND METHODS - An electronic information access system and associated methods. In one exemplary embodiment, the system comprises an antenna adapted to receive electromagnetic energy, the electromagnetic energy encoding first data associated with at least one person; and processing apparatus in signal communication with the antenna. The processing apparatus is configured to: access a first database containing second data relating to the one or more certain persons; analyze at least portions of the first data and the second data to determine if the at least one person is authorized to access the information; and if the at least one person is authorized access, facilitate download of the information to a personal electronic device (PED) of the at least one person. | 07-26-2012 |
20120192290 | USER FILTERING IN SOCIAL NETWORKING APPLICATIONS - An apparatus and system are disclosed for filtering third-party generated content in a social network. A receive module receives, from a requesting third-party user, a request to view third-party generated content that is generated by one or more third-party users of a social network. A group module determines one or more group permissions set by a user for one or more groups. The one or more group permissions define access to the third-party generated content. A filter module filters the third-party generated content according to the one or more group permissions such that the third-party generated content is filtered prior to presentation of the third-party generated content to the requesting third-party user in response to the request. | 07-26-2012 |
20120192291 | SYSTEM AND METHOD FOR CONVEYING OBJECT LOCATION INFORMATION - An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-defined zone information and object location information. One or more location information sources are associated with an object to provide the object location information. One or more user-defined zones are defined on a map and one or more object location events are defined. The occurrence of an object location event produces object location event information that is conveyed to users based on user identification codes. Accessibility to object location information, zone information, and object location event information is based upon an object location information access code, a zone information access code, and an object location event information access code, respectively. | 07-26-2012 |
20120198564 | Security Classification Based on User Interaction - An embodiment of the invention includes a method and system for content management. More specifically, the system includes a user interface for receiving content from a user and a data repository connected to the user interface for storing the content. The user interface also receives a request to access the content from the user. A program processor is connected to the data repository, wherein the program processor determines whether the content includes a security classification. A communications module is connected to the program processor, wherein the communications module sends an alert to the user interface when the content does not include a security classification. The alert includes a request to assign a security classification to the content. | 08-02-2012 |
20120198565 | BUSINESS METHOD FOR AGGREGATION AND PRESENTATION OF THE MEDIA DATA - A method for aggregation and presentation of media data, includes the following steps: launching the application registered for interacting with internet community; authorizing the application in the external systems of the internet community using external Application Programming Interfaces; obtaining the permit from a media data keeper to access his/her media data in the internet community; retrieving the media data from the internet community through the application registered in that particular internet community to allow both the media data keeper and the registered application to access and use the aggregated data; selecting potentially presentable (supported) media data from the previously formed media data bank; presenting a series of the aggregated media data to an individual or corporate user (the recipient). The aggregation and presentation of the media data from the internet community is implemented through computer or telecommunication systems that provide the functioning of the application which obtains media data from various sources, aggregates it, filters, identifies the possibility of presenting the particular media data, sorts it out and implements its presentation. | 08-02-2012 |
20120198566 | Secure Distribution of Media Data - A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version of the media data is sent to one or more recipient(s). After confirming identity of a recipient at a receiving system, a supplemental version of the media data is sent to the receiving system which augments the degraded version such that it can then be played by the recipient(s). The degraded version of the media data has a reduced quality that is obtained by removing portions of the data and filling in the removed portions with dummy data. During a subsequent rebuilding of the media data, a supplemental version of the media data is sent to the receiving data processing system where it is merged/combined with the degraded version to form a copy that corresponds to the original, high-quality version of the media data. | 08-02-2012 |
20120204270 | LICENSE RECONCILIATION FOR ONLINE SERVICES - A user interface that allows for efficient resolution of license conflicts. The user interface includes a license conflict discovery mechanism that automatically discovers whether a license conflict exists for a license. Upon determining a subset of available resolution methods that are suitable for the administrator right corresponding to the user of the user interface, the user interface provides a resolution prompt. The resolution prompt prompts the user of the user interface to resolve the license conflict using any one of the available subset of resolution methods. The types of the offered resolution methods offered by the user interface differ according to the administration rights of the user. | 08-09-2012 |
20120204271 | METHOD AND APPARATUS FOR CONTROLLING ACCESS RESTRICTIONS FOR MEDIA PLAYBACK - A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be delivered to a client device, generating a media resource request identifying a first media resource associated with a first class of content and one or more attributes of the content control profile, determining whether the first class of content has been authorized for delivery to the client device based at least in part upon the one or more attributes of the content control profile, and delivering the first media resource to the client device if the first class of content has been authorized for delivery to the client device. | 08-09-2012 |
20120210444 | APPARATUS AND METHOD FOR RESTRICTING THE EXECUTION OF A PROGRAM - An attribute detector detects the attributes of a user of a program. A determining unit determines, based on the detected attribute of a user, whether the user is a superior user for whom usage restriction is not necessary or a subordinate user for whom the usage restriction is necessary, for a program of a first type. The program of the first type is a program appealing to the taste of the user and that is frequently run by the user for many hours. When the user is verified to be the subordinate user and also when the user has executed a program of a second type for a predetermined number of recommended executions, a permission/rejection determining unit permits the execution of the program of the first type. | 08-16-2012 |
20120210445 | Systems and Methods for Verifying the Authenticity of a Remote Device - Some embodiments of the invention are directed to, among other things, systems, computer readable media, methods and any other means for verifying the authenticity of a client device. In some embodiments, a token is issued by one or more remote media servers that allows the client device to download video, media or other data from one or more remote media servers. | 08-16-2012 |
20120210446 | SESSION-CONTROLLED-ACCESS OF CLIENT DATA BY SUPPORT PERSONNEL - A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. | 08-16-2012 |
20120210447 | Secure video download method - A method of movie distribution runs on a server accessible by a user desiring to look for a movie to download. After user authentication, the server retrieves a user's permissions list from storage. When it receives a request from the user to download the movie, it checks the permissions list to determine whether or not the user has permission to download the movie. If permitted, the server watermarks the video in a process involving segmenting the video and sends an integrated stream of watermarked-video over the network. When the user does not have permission, then the server requests personal details to gain permission. The server optionally checks if the user is accessing the server from the same Internet Protocol address as used in a previous access. If not, the server asks the user to prove that the user is the same user that has permission to access the server. | 08-16-2012 |
20120216296 | SHARED CONTENT ACCESS PLATFORM APPARATUSES, METHODS AND SYSTEMS - The SHARED CONTENT ACCESS PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SCAP”) transform content seed selections and recommendations via SCAP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. In one embodiment, the SCAP may receive from a first universally resolvable user a request to access a media library of a second universally resolvable user. The user may retrieve the second user specified privacy controls and may apply the second user specified privacy controls to determine a portion of the media library permitted for access by the first user. The SCAP may then allow the first user access to the determined portion of the media library. | 08-23-2012 |
20120216297 | MEDICAL DATA MANAGEMENT SYSTEM AND PROCESS - Systems and processes for managing data relating to one or more medical or biological conditions of a plurality of subjects (such as patients) over a wide area network, such as the Internet, may be employed for diabetes subjects or subjects with other medical conditions requiring monitoring and/or treatment over time. Such systems and processes provide various functions for several types of users, including patients or subject-users, healthcare provider-users and payor entity-users and combinations thereof, which allow for improved treatment and medical data management of individual subjects and groups of subjects and which allow collection and analysis of aggregate data from many subject sources, for improving overall healthcare practices of providers and subjects (e.g., patients). | 08-23-2012 |
20120216298 | Pre-Access Location-Based Rule Initiation In a Virtual Computing Environment - Methods, systems, and devices are described for updating resource access permissions in a virtual computing environment. In these methods, systems, and devices, a host computer system determines that a user associated with an existing session has moved from a first location to a second location, identifies at least one pre-access rule based on the second location, applies the at least one pre-access rule to the existing session before authenticating the user for access to the existing session in response to the determination that the user has moved to the second location, and authenticates the user at the second location for access to the existing session after the at least one pre-access rule has been applied to the existing session. | 08-23-2012 |
20120222132 | Permissions Based on Behavioral Patterns - Users may choose to have their behavior analyzed in order to infer default sharing permission settings for documents and other information maintained in one or more computer systems. This may increase information security for the users and streamline implementation of privacy and/or sharing permissions. The default sharing permissions are implemented by a computer system as soft permissions that may be used to determine which documents are to be shared with which recipients. The soft permissions may address sharing situations for which a user has not expressly indicated his or her sharing rules. The soft permissions may change over time in response to changing user behavior and/or the soft permissions may be revised in light of user feedback. | 08-30-2012 |
20120222133 | SHARED CONTENT MANAGEMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS - The CONTENT DISCOVERY AND DELIVERY PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SCMP”) transform content seed selections and recommendations via SCMP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. In one embodiment, the SCMP may obtain from a first universally resolvable media content service user a request to share the user's universally resolvable media content collection and a selection of at least one second universally resolvable user. The SCMP may configure the first user's media content collection for shared access with the second user and may provide the second user access to the shared media content collection. | 08-30-2012 |
20120222134 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths. | 08-30-2012 |
20120240242 | RESOURCE EXPRESSION FOR ACCESS CONTROL - Various embodiments of systems and methods for providing an expression of a resource for access control are described herein. One or more business security profiles associated with a user are received. The business security profile is defined including a resource expression. The resource expression can include a resource expression with a quantifier or the resource expression without a quantifier. Further, a net profile of the user is computed using symbolic calculus on the resource expression of the one or more business security profiles. The net profile of the user includes a set of granted resources and a set of denied resources. Based upon the computed net profile, access to a resource is authorized for the user. | 09-20-2012 |
20120240243 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CREATION, TRANSMISSION, AND TRACKING OF ELECTRONIC DOCUMENT - A system for creating and delivering a locked electronic document in a computing environment includes a computer readable system memory comprising at least one program module, a bus coupled to the computer readable system memory, a processor coupled to the bus, and program instructions stored on the system memory for execution by the processor. The program instructions create a lead sheet having a unique embedded identifier, add a payload to the lead sheet to form the electronic package, add a blanking layer to the electronic package to obscure the payload from view of a recipient, send the electronic package in the computing environment to a designated recipient, validate the designated recipient's identity, and remove the blanking layer in response to validating the designated recipient's identity, thereby allowing the recipient to view the payload. | 09-20-2012 |
20120246738 | Resource Sharing and Isolation in Role Based Access - The subject disclosure is directed towards resource sharing and/or isolation in a role based access (RBA) system. A resource may be associated with an owner, via an owner property, which provides isolation by enforcing exclusive access to that resource by the owner (unless the owner chooses to share). Sharing is provided by allowing the owner to identify, in a GrantedTo list, selected receiving user(s) or user role(s) that can have shared access. Also described is administrator-level control over the ability to share resources and/or receive shared resources, e.g., an administrator selects whether a resource owner is permitted to share resources and/or whether receiving users/user roles are permitted to receive shared resources. | 09-27-2012 |
20120246739 | INFORMATION PRIVACY SYSTEM AND METHOD - The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information. | 09-27-2012 |
20120246740 | STRONG RIGHTS MANAGEMENT FOR COMPUTING APPLICATION FUNCTIONALITY - Illegal, unauthorized, uncompensated and/or under-compensated utilization of computing application functionality may be mitigated at least in part by controlling access to executable instructions that implement the computing application functionality. The executable instructions may be executed by a set of one or more virtual machines provisioned by a multi-tenant virtual resource provider. The virtual resource provider may provision the virtual machines and other virtual resources with a set of implementation resources managed by a control plane of the virtual resource provider. The control plane may perform a number of control functions for the virtual resource provider including management and enforcement of virtual resource access policies such as one or more policies collectively specifying that the computing application functionality is to be accessed in accordance with a license or agreement between a third party provider or vendor of the computing application functionality and a user of the computing application functionality. | 09-27-2012 |
20120246741 | Universal Medical Records Processing System - A medical records collection and processing system to provide an efficient, scalable, and accurate process for collecting, analyzing, and delivering medical records or analysis of medical records to a client. The collection system allows for user configured projects. The processing system allows the user to securely deliver the requested documents to the collection system or any other system electronically without compromising security and efficiency. With the Universal Medical Records Processing System, a format, system and platform-independent, almost unlimited reach for the request and processing of responses for medical records is accomplished. The invention dramatically increases the efficiency and security of medical records processing while dramatically lowering costs. | 09-27-2012 |
20120246742 | PROCESS FOR PRODUCING AND ASSEMBLING A MEDICAL OPERTIONS SYRINGE - A system and a method for managing and sharing, within a computer network, information and contacts related to users, according to which the user (UC), on his personal profile (PF) created on the restricted access web site, can create a certain number of business cards (BV) to be booked to given categories of persons, with the information and/or data he considers to inserted into that card; in this way, the system does not allow to a third party to access user's (UC) personal profile (UC), neither in as merely curios observers, and reserves to each user (UC) places for the insertion of their information which, thus, are made accessible only to whom the user (UC) decides to send them and only during the period for which the user (UC) desires to send them. Once the user (UC) comes into contact with a person belonging to the categories to whom he has allowed the vision of the data, he can share, for each category, certain information which are however lent, for a prefixed time period, and automatically updated in real time on personal profile (PF) of then web site. | 09-27-2012 |
20120255033 | LICENSING SOFTWARE ON A SINGLE-USER BASIS - The claimed subject matter provides a method for licensing software in a computing environment. An exemplary method includes initiating application software program on a computer system having a plurality of authorized users, one of the authorized users having a single-user license to use the software program. An identity of a current user of the computer system is checked. Operation of the software program is prohibited if the current user is one of the plurality of authorized users other than the user who is granted the single-user license. | 10-04-2012 |
20120255034 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths. | 10-04-2012 |
20120255035 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths. | 10-04-2012 |
20120260348 | TWO-PARTY PRIVATE ESTIMATION OF DATASET SIMILARITY - A two-party approximation protocol is transformed into a private approximation protocol. A first input x∈{0, 1, . . . , M} | 10-11-2012 |
20120260349 | STORAGE DEVICE, STORAGE SYSTEM, AND AUTHENTICATION METHOD - According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed. | 10-11-2012 |
20120260350 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING THE SAME - An information processing apparatus of this invention displays an operation window which allows selection of any of multiple applications. Each of the applications includes multiple functions with use authorization being set for each of the functions. The information processing apparatus displays, upon accepting selection of a specific application having some of the multiple functions for which use authorization which requires authentication of a user is set, an authentication window for authentication of the user. The authentication window allows use of the specific application to be selected without authentication of the user, by permitting use of a function, of the multiple function of the specific application, for which use authorization requiring no authentication of the user is set. | 10-11-2012 |
20120260351 | DELIVERY CONTROL FOR EMAIL COMMUNICATED AMONG MULTIPLE END USER COMMUNICATION DEVICES - An exemplary method is implemented by end-user communication devices for processing the receipt of an email wherein a received email comprises a digital packet having a header and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request from an originating device to acknowledge receipt of the subject email. The received user message is prevented from being displayed on a screen of the first end-user communication device of content until input is entered authorizing a reply to the acknowledgement request. Upon receiving the authorization: a reply email with an acknowledgement is automatically generated by the first end-user communication device and transmitted to the originating device corresponding to the subject email; the content of the corresponding received user message is displayed on the screen of the first end-user communication device; and the first end-user communication device stores a read message indicator having a value that represents that the reply email was authorized and the content of the received email enabled to be displayed. | 10-11-2012 |
20120260352 | METHOD AND APPARATUS FOR STORING A SOFTWARE LICENSE - In accordance with an example embodiment of the invention there is provided a method, comprising: associating an International Mobile Equipment Identity (IMSI) with a mobile telecommunication device, the IMSI configured to identify the device to a mobile telephone network; storing a software program in memory associated with the device; storing a licence, necessary for allowing the operation of the software program on the device, in memory associated with the device; and locking the licence to said IMSI such that the software application cannot be operated on the device without said IMSI being associated with the device; wherein, the licence and the IMSI are stored on the same memory medium such that they are transportable from the device together. | 10-11-2012 |
20120266258 | METHODS FOR PROVIDING CROSS-VENDOR SUPPORT SERVICES - According to one aspect, a first request is received at a services application programming interface (API) of a support center from a first user for a first product provided by a first client. A second request is received at the services API of the support center from a second user for a second product provided by a second client. A first knowledgebase (KB) associated with the first client and a second KB associated with the second client are identified. A third KB that contains information common to the first product and the second product is identified. The first KB and the third KB are enabled to be accessible by a first agent assigned to provide support services of the first product. The second KB and the third KB are enabled to be accessible by a second agent assigned to provide support services of the second product. | 10-18-2012 |
20120272335 | IDENTITY VERIFICATION SYSTEMS AND METHODS - Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network. In an embodiment, a user provides initial data as part of a request to access the confidential data. At least one database having the confidential data stored therein is accessed by the server to retrieve confidential data relating to the user based on the initial data. An exam creation function causes creation of an exam comprising at least one question based at least in part on a portion of the confidential data relating to the user. This function creates the exam based on at least one exam definition. An exam administration function causes transmitting of the exam to the client interface for presentation to the user. The user is granted access to the confidential data subsequent to determination that the user successfully passed the exam. | 10-25-2012 |
20120272336 | Transcoding Content Based On Verification of Ownership of the Content - A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device. | 10-25-2012 |
20120272337 | CONTENT OBJECT ENCAPSULATING CONTENT ITEMS FOR ACCESSING CONTENT AND ACCESS AUTHORIZATION INFORMATION - Provided are a method, system, and computer program product for a content object encapsulating content items for accessing content and access authorization information. User input of content items is received, wherein each content item indicates a network address and content type of content at the network address, content items are added to a content object. User input is received of access authorization information indicating a user having authority to access the content object. The access authorization information is added to the content object. A user request is received for the content object from. The access authorization information is processed to determine whether the user initiating the request has authorization to access the content object. The content object is processed to generate a presentation page to return to the client computer in response to determining that the user of the client computer is authorized to access the content object. | 10-25-2012 |
20120278899 | APPARATUS, SYSTEMS AND METHODS FOR PARENTAL CONTROL SYNCHRONIZATION WITH MOBILE MEDIA DEVICES - Systems and methods are operable to enforce parental controls at a mobile media device. An exemplary embodiment establishes a communication link between the mobile media device and a local media device, receives parental control setting information from the local media device at the mobile media device, receives at least one media content event and rating information associated with the received media content event at the mobile media device, compares at the mobile media device the rating information associated with the received at least one media content event with the parental control setting information received from the local media device, and prevents presentation of the at least one media content event by the mobile media device if the rating information associated with the received media content event violates the parental control setting information. | 11-01-2012 |
20120278900 | SYSTEMS AND METHODS FOR REGULATORY COMPLIANCE WITH QUALIFIED SYSTEMS - Disclosed are systems and methods for facilitating compliance with regulatory requirements concerning systems that must be qualified prior to use. In one embodiment, a qualified system is provided. The qualified system includes a qualified server and a qualified software application. The qualified system is located in a controlled environment specified and controlled by an application service provider. A qualified workstation is provided at the point of use. The qualified workstation and qualified system are configured to communicate with each other via a public computer network. The qualified system is substantially qualified before a specific customer is identified. Other embodiments of the invention pertain to methods of facilitating regulatory compliance. An exemplary method involves qualifying a system based on a generic functional requirement specification before identifying a specific customer for the system. After the customer is identified, additional qualification may be performed to customize the system to the customer's specific needs. | 11-01-2012 |
20120278901 | MANAGEMENT OF ACCESS RIGHTS - A system for management of access rights to operating data and/or control data of buildings or building complexes can include a communications release service running on a first server. This release service releases a communication of a user, who is registered with an identity, with the buildings or building complexes filed for him or her in a list when his or her identity corresponds with an identity filed in the list. Also, after release of the communication has taken place by the communications release service, a building authorization service running on a second server releases specific access rights for the user to operating data and/or control data of the building or building complex on the basis of access rights filed in an authorization databank. | 11-01-2012 |
20120278902 | INCREMENTAL DEPLOYMENT OF COMPUTER SOFTWARE PROGRAM LOGIC - Systems and methods for requesting computer software program logic by a client computing device from a server are provided. The method at the server comprises receiving a request for the computer software program logic from the client device along with a first list comprising details about multiple modules running on the client device; determining a second list comprising details about multiple modules required to deploy the computer software program logic on the client device; checking whether the modules of the second list need to be substituted based on their availability or suitability; updating the second list; checking whether the client device has permission rights for accessing the modules of the updated second list; and sending an object comprising the modules of the updated second list to the client device, the updated second list comprising details about the modules required for deployment of logic on the client device. | 11-01-2012 |
20120278903 | DYNAMIC MANAGEMENT OF GROUPS FOR ENTITLEMENT AND PROVISIONING OF COMPUTER RESOURCES - Methods, systems, and techniques for managing groups of entities, such as individuals, employees, or systems, and providing entitlement and access to computer resources based on group membership are provided. Example embodiments provide a Group Management System having a Group Management Engine “GME,” an Entitlement Engine, and a Provisioning Engine, which work together to allow simplified grouping of entities and providing entitlement and access to the entities based upon the group membership. In one embodiment, the GME leverages dynamic programming techniques to enable accurate, scalable systems that can manage near real time updates and changes to the group's status or to the entities' status. These components cooperate to enable provisioning of applications based upon current entitlement. | 11-01-2012 |
20120291139 | INFORMATION MANAGEMENT APPARATUS, INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD AND PROGRAM - An information management apparatus which can set an area in which use of a file is not allowed for each file separately is provided. The existing zone area information acquisition unit | 11-15-2012 |
20120291140 | Method and System for Allocating Access to Digital Media Content - There is provided a method and system for allocating an entitlement to digital media content. In one implementation, the system includes a media server accessible over a communications network and configured to utilize a processor to issue the entitlement including a transferable authorization to access the digital media content to a first user, and to store an entitlement record identified with the first user and authorizing access to the digital media content by the first user in a memory of the media server. The media server is further configured to receive a communication including a data corresponding to the transferable authorization to access the digital media content from a second user and to update the entitlement record to authorize access to the digital media content by the second user. | 11-15-2012 |
20120291141 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR CONSOLIDATED AUTHENTICATION - A first computer sends a request to the second computer to access the application. The second computer determines that the user has not yet been authenticated to the application. The second computer redirects the request to a third computer. The third computer determines that the user has been authenticated to the third computer. The third computer authenticates the user to the application. The second computer returns a session key to the third computer for a session between the application and the user. The session has a scope of the second computer or the application but not a scope of a domain. The third computer generates another session key with a scope of the domain and sends the domain-scope session key to the first computer. | 11-15-2012 |
20120304306 | SYSTEM FOR ENTERPRISE DIGITAL RIGHTS MANAGEMENT - The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document. | 11-29-2012 |
20120304307 | Computer Implemented System for Facilitating Configuration, Data Tracking and Reporting for Data Centric Applications - A computer implemented system for facilitating configuration, data tracking and reporting for data centric applications and a method for performing the same have been disclosed. The system enables an enterprise to quickly move from paper based tracking to web based mode by configuring metadata. Also, the system hosts multiple tenants on a single server and enables creation of workspace to enable users within a tenant to securely view the data based on his/her permission levels. Additionally, the system classifies the resources as ‘Human’ and ‘Non-Human’ resources and further as static resources which are shared metadata across tenants and non-static resources which are applicable only to a particular tenant. Thus, the system enables common information to be shared easily across various organizations while securing the data via workspaces. Furthermore, the system includes report creation and dashboard generation capability using data from within the system as well as from external databases. | 11-29-2012 |
20120304308 | METHOD AND SYSTEM PROVIDING ADVICE AND SERVICES TO CONSUMERS - The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private personal data preferably held on behalf of persons entities. The system provides the applications, processes, controls and data management services to collect, transfer, store and selectively retrieve data necessary to perform specified planning and decision support activities that have been integrated with the secure data store. The invention provides for the data owner and authorized persons to gain access to accessible data to undertake permitted tasks. These tasks may include receiving data, or undertaking planning, or such other tasks as prescribed. In an embodiment, the system limits access to applications to authorized persons and requires permissions from the owner in order to manage data privacy standards. The system allows the owner to provide and revoke access to applications and tracks and records all access events. | 11-29-2012 |
20120304309 | Conditional Access System and Method - The present invention relates to methods of and systems for providing conditional access to electronic content. Electronic content is provided to a user along with authorization information. The electronic content may be transmitted to the user, and the user may use the authorization information to access the electronic content. An authorization code may be provided to the user such that the user may be granted access to the content based on a comparison of the provided authorization code and a second authorization code transmitted with the electronic content, and transmission of the second authorization code may be controlled by a content provider to control access by the user. | 11-29-2012 |
20120304310 | SECURE EXECUTION OF UNSECURED APPS ON A DEVICE - An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a particular function. It is then determined which modules from the multiple modules perform some type of security function, for example, a function dealing with confidential or security-related data. These modules, forming a group of modules, are loaded into a trusted execution environment. The app is then re-bundled so that it has the first plurality of modules and the second plurality of modules. The app executes in a manner where the high security functions execute so that break points cannot be inserted into the app code. The re-bundling is done automatically in an app security wrapping process. Security constraints are added to the app. | 11-29-2012 |
20120304311 | Tokenized Resource Access - A method and system for unlocking diagnostic functions in a hardware device for a user. The method obtains a signed permission object for the hardware device, and validates the signed permission object. A memory of the hardware device stores a device identifier and a last recorded sequence number. The signed permission object includes a sequence number and is associated with an expiration counter having an initial value that indicates a lifetime for the signed permission object. When the signed permission object is valid, the method updates the expiration counter to decrease the lifetime of the signed permission object, stores the sequence number associated with the signed permission object as the last recorded sequence number in the hardware device, and unlocks the diagnostic functions for the user based on the signed permission object. | 11-29-2012 |
20120304312 | COMMUNICATIONS DEVICE - A mobile device is provided having a smart card. The smart card is programmed with UICC applications metadata that is provided to the mobile device during a power-up or reset routine. The mobile device uses the UICC applications metadata to generate a user interface that allows a user to launch directly an application on the smart card. Icons for the UICC applications can be displayed together with icons for applications residing on the mobile device. In this way, the user selection of UICC resident applications is facilitated and can be made transparent to the user. | 11-29-2012 |
20120311722 | ELECTRONIC SYSTEMS WITH DATA PROTECTION FUNCTIONS - A communication component sends a request of an action list to a server if information fails to pass authentication. A control component processes content stored in an electronic device according to a reply generated in response to the request. The reply includes the action list. The processing is performed according to an action included in the action list. | 12-06-2012 |
20120311723 | Physical Confirmation For Network-Provided Content - A computer-implemented method includes receiving, from a remote communication device and at a server system, information that indicates a unique identifier for a physical item that corresponds to media content, the identifier differing from identifiers for other physical items that correspond to the same content; associating the received information with an account of a first user of a hosted internet service; and subsequently providing, by the hosted internet service, content that matches the content that corresponds to the physical item, based on a determination that the received information authorizes the first user to obtain the content provided by the hosted internet service. | 12-06-2012 |
20120317655 | Method for Flexible Data Protection with Dynamically Authorized Data Receivers in a Content Network or in Cloud Storage and Content Delivery Services - A networking system comprising an application service that runs on a cloud infrastructure and is configured to receive dual encrypted content from a content provider and re-encrypt the dual encrypted content to enable dynamic user group control for group-based user authorization, and a cloud storage service coupled to the application service and configured to store the dual encrypted content from the content provider and the re-encrypted dual encrypted content from the application service, wherein the application service and the storage service are configured to communicate and operate with a content delivery service that uses a content delivery network (CDN) to deliver the re-encrypted content to one or more users in a group authorized by the content provider. | 12-13-2012 |
20120317656 | TWO-PARTY PRIVATE ESTIMATION OF DATASET SIMILARITY - A two-party approximation protocol is transformed into a private approximation protocol. A first input x∈{0,1, . . . , M} | 12-13-2012 |
20120324589 | AUTOMATIC SHARING OF EVENT CONTENT BY LINKING DEVICES - Embodiments enable content sharing using event notifications that include a global identifier and a private identifier. The event notifications are sent to potential participants to an event. Potential participants that accept the event notification or otherwise request to join the event use the private identifier to submit content to a content sharing service. Based at least on the private identifiers associated with event participants, the content from event participants is selectively shared among the other event participants. | 12-20-2012 |
20120324590 | Method and Apparatus for Content Management - The present disclosure relates generally to audio and video processing. One claim recites a portable apparatus comprising: electronic memory comprising one or more identifiers, each of the identifiers being associated with previously accessed audio or video items, with each previously accessed audio or video item including an identifier associated therewith; and a logic processor programmed for: a. restricting access to an encountered audio or video item if an identifier associated with the encountered audio or video item is one of the one or more identifiers associated with the previously accessed audio or video items, and b. limiting a number of content items with different user identifiers that can be accessed in a predetermined amount of time. Other claims and combinations are provided as well. | 12-20-2012 |
20120331566 | CAPTURING AND MANIPULATING CONTENT USING BIOMETRIC DATA - A method, system, and computer program product for capturing and manipulating content using biometric data are provided in the illustrative embodiments. Biometric data is received from a biometric sensor associated with the data processing system, the biometric data forming a first biometric data. The content is received, the content being captured using the data processing system by a first user associated with the first biometric data. The content is modified using information from a first profile associated with the first biometric data. | 12-27-2012 |
20120331567 | SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION OF PRIVATE INFORMATION OVER A NETWORK - A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information and by a private access bureau. The privacy preference repository stores privacy preferences configured by the subjects to indicate conditions for disclosure of said private information. A policy repository that stores legal criteria for accessing the private information is also accessible by the private access bureau. The private access bureau is configurable to receive requests from privacy-enabled systems for privacy directives that take into account the privacy preferences and legal criteria required to release particular documents on said privacy enabled system in response to the privacy-enabled systems. | 12-27-2012 |
20130007895 | MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION - A method, system or computer usable program product for filtering content in a screen sharing session based on user access rights including initiating the screen sharing session between a first and nth user, displaying the content on a first screen of the first user wherein the content is derived from a content source including a content representation and including a set of secure elements requiring access rights to view, determining a first subset of secure elements that the nth user has access rights to view, and transmitting the content representation and the first subset of secure elements to the nth user during the screen sharing session. | 01-03-2013 |
20130007896 | System and Method for Controlling Access to an Electronic Message Recipient - A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging. | 01-03-2013 |
20130007897 | Method and System for Managing Secure Sharing of Private Information Across Security Domains - In a method of granting a user in a first organization access to private information stored within an authorization profile of a second organization, an access agreement between the two organizations is formed. Authorization is requested for the user, the authorization profile is retrieved, and authorization to private information is granted if authorized by the access agreement. | 01-03-2013 |
20130014278 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a system and computer program product to intelligently provide consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 01-10-2013 |
20130014279 | SYSTEM FOR PROVIDING PRIVACY OF USER INFORMATION IN AN ONLINE SOCIAL NETWORK WITH INLINE EDITING OF PRIVACY LEVELS AND CUSTOMIZED PRIVACY GROUPS - A method of displaying, editing, and enforcing privacy settings for individual pieces of information published on a website. Privacy selections are displayed next to the information they protect. A user interface is presented in response to user-interaction with the displayed privacy selections that allows further privacy selections. The privacy selections indicate which other users may view the associated information. These options may be in the form of tiers of users with granted access or privacy groups. The publishing user may customize the privacy options by creating new tiers or groups for inclusion in the selection interface. Privacy icons may be associated with the privacy options, and may be displayed to the publishing user next to protected information, allowing easy identification of currently selected privacy settings. The publishing user may also upload additional privacy icons. Other users who access the published information are shown only those pieces of information that they have the right to view, based on the selected privacy settings. | 01-10-2013 |
20130014280 | Managing Secure Sharing of Private Information Across Security Domains Via a Communication Link, Including Through the Internet, Wireless Communications, Mobile Devices, a Telephone Network, and Electronic Messaging - A system and method of sharing information among at least a first organization and a second organization, comprising receiving via a communication link a request for authorization for a user in the first organization to access one or more individual's information in a second organization, the communication link comprising the Internet, Wireless Communications, Mobile Devices, a Telephone Network, and Electronic Messaging. A request is logged and authorization is determined based on at least an access profile, one or more caseloads and the one or more roles associated with the user and the type of the one or more individual's information in the second organization. The information requested is transferred, by the communication link, from the second organization to the user in the first organization and such transfer of information is logged. | 01-10-2013 |
20130014281 | Method and System for Controlled Distribution of Information Over a Network - An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format. | 01-10-2013 |
20130014282 | Method and System for Controlled Distribution of Information Over a Network - An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format. | 01-10-2013 |
20130014283 | DATABASE APPLICATION SECURITY - A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user's credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database. | 01-10-2013 |
20130014284 | Leveraging A Social Graph From A Social Network For Social Context In Other Systems - A social network contains information describing information about members of the social network and about various connections among the members. An external system that interacts with users (such as a website) communicates with the social network to access information about the members of the social network. In particular, the external system may determine whether a user is a member of the social network and then obtain information about the member and the member's connections within the social network. This allows an external system to use information from the social network to enhance a user's experience on the external system, while enforcing each member's privacy settings. | 01-10-2013 |
20130019320 | MECHANISM FOR FACILITATING MANAGEMENT OF DATA IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one embodiment and by way of example, a method for facilitating management of data in an on-demand services environment is provided. The method of embodiment includes detecting an attempt by a user to manipulate data via a collaboration application at a computing system, wherein the attempt includes attempted deletion of the data posted for viewing using the collaboration application. The method may further include determining whether the user is authorized to manipulate the data, and blocking the attempt if the user is not authorized to manipulate the data. | 01-17-2013 |
20130024946 | METHOD AND SYSTEM FOR STREAMLINING VOTING PROCESS - A method and system for streamlining a voting process performed by a web application is provided. As the web application may require that a voting action is effectuated after the user is registered to vote and also has supplied valid credentials, a voting application may be configured to intercept a request from a user to effectuate voting process directed to the web application, access credentials of the user stored by the web-based social networking application, and provide these credentials to the web application, such that the web application can process the request to effectuate voting process by registering the user to vote and storing the vote information for the user. | 01-24-2013 |
20130024947 | METHODS AND SYSTEMS FOR REPLACING SHARED SECRETS OVER NETWORKS - A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life. | 01-24-2013 |
20130024948 | SYSTEM FOR ENTERPRISE DIGITAL RIGHTS MANAGEMENT - The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document. | 01-24-2013 |
20130024949 | Presentity Authorization of Buddy Subscription in a Communication System - A server, computer readable medium and method for accessing buddy data related to a first user (presentity) that is connected to a START communication network that includes a server, the data being accessed by a second user (watcher) connected to the communication network. The method including storing, at a server, information associated with a plurality of users associated with the presentity as the buddy data, receiving, at the server, a request from a watcher for buddy data of the presentity, authorizing, at least in part by the server, the request for buddy data, and transmitting, by the server, the buddy information to the watcher. | 01-24-2013 |
20130031639 | SYSTEM AND METHOD FOR EXECUTING WEB SERVICES - The subject embodiments provide a method such as a web service method. The method is used to execute two or more web services that have respective web user interfaces, and are operationally independent of each other. The method comprises: (i) executing the two or more web services under manual operation of a user; (ii) recording a script based on activities of the user in the execution; (iii) securing the recorded script; and (iv) executing the two or more web services by playing said secured script without individually executing them. The method is user friendly; highly customizable; and safe with respect to document retrieval and submission. | 01-31-2013 |
20130031640 | ADVANCED CAPTCHA USING IMAGES IN SEQUENCE - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |
20130031641 | ADVANCED AUDIO CAPTCHA - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents to the user a set of audio clips. At least a portion of the set of audio clips suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |
20130036478 | Identifying and Redacting Privileged Information - Systems and methods for identifying and redacting privileged information automatically in electronic discovery documents such as emails are disclosed. In reviewing documents for discovery review, some documents have both privileged and non-privileged information. Significant cost savings are achieved in conducting electronic discovery by automatically identifying and redacting privileged content while preserving non-privileged information for production. | 02-07-2013 |
20130042326 | Mobile-Device User Authentication - In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second users respectively associated with one or more second mobile devices; accessing information known about one or more users and one or more mobile devices respectively associated with the one or more users; identifying at least one candidate for the first user based on the information known about the one or more users and the one or more mobile devices; and confirming one or more of the at least one candidate as the one or more second users. | 02-14-2013 |
20130042327 | GUIDED IMPLICIT AUTHENTICATION - Embodiments of the present disclosure provide a method and system for guided implicit authentication. The system first receives a request to access the controlled resource from a user. The system then determines whether the user request is inconsistent with regular user behavior by calculating a user behavior measure derived from historical contextual data of past user events. Next, the system allows the user to provide information associated with regular user behavior and/or current contextual data. The system further updates the user behavior measure based on current contextual data. | 02-14-2013 |
20130042328 | Enforcing single stream per sign-on from a content delivery network (CDN) media server - An apparatus for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is delivered to authorized end users from multiple delivery servers, but where an authorized end user is associated with a single log-in identifier that is not intended to be shared with other end users. According to the method, an enforcement server of the SCS identifies first and second copies of the given media stream associated with the single log-in identifier being delivered from multiple delivery servers. It then issues message to terminate delivery of the given media stream from at least one of the multiple delivery servers. | 02-14-2013 |
20130047265 | Method and Apparatus for Token-Based Conditioning - According to one embodiment, an apparatus may store a plurality of tokens indicating a user is requesting access to a resource over a network. The apparatus may determine a condition associated with accessing the resource based on the plurality of tokens. The condition may be determined in addition to a determination to grant or deny access to the resource. The condition may include an obligation to be fulfilled and a message providing instruction regarding how to fulfill the obligation. The apparatus may generate a decision token representing the condition, and communicate the decision token to a resource provider to facilitate enforcement of the condition. | 02-21-2013 |
20130047266 | METHOD AND APPARATUS FOR TOKEN-BASED ACCESS OF RELATED RESOURCES - According to one embodiment, an apparatus may store a plurality of tokens indicating that a user is attempting to access a resource. The apparatus may determine an authorization level for the user based at least in part upon the plurality of tokens. The authorization level may indicate whether the user is authorized to access the resource. The apparatus may then determine a related resource that shares a relationship with the resource, and determine that the authorization level indicates that the user is authorized to access the related resource. The apparatus may then communicate a decision token indicating that the user is authorized to access the resource and the related resource. | 02-21-2013 |
20130047267 | BENCHMARK MEASUREMENT FOR LEGITIMATE DUPLICATION VALIDATION - A system and method for detecting piracy of a software product that is distributed on a particular media type is described. Embodiments of the invention track a title load time of a software product that is distributed on a particular media type, and compare it against a benchmark load time for that media type. This comparison is used to detect if the title may have been illegally transferred or pirated to another, unauthorized media type. | 02-21-2013 |
20130047268 | Methods for Using Biometric Authentication Methods for Securing Files and for Providing Secure Access to Such Files by Originators and/or Authorized Others - Embodiments are directed to apparatus, methods and systems for locking data or program files and for allowing access to such files only by individuals given authorization and wherein the identity of locking or accessing individuals is provided by comparison of collected inertial information associated with providing a signature with information stored about the particular individuals. In a first embodiment two primary components work together to provide collection of inertial data (and potentially other data) and then comparing of the collected data to stored data to provide an authentication or identification assessment. The first of these components is a SigzaPen device for acquiring data while the second is a remote Signature Processing Center (“SPC”) wherein these two components are capable of communicating directly or indirectly with each other. | 02-21-2013 |
20130047269 | SYSTEMS AND METHODS FOR REAL-TIME VIEWING AND MANIPULATION OF INFORMATION HOSTED ON THIRD-PARTY SYSTEMS, INCLUDING METRICS, FALSE ACKNOWLEDGEMENTS, AND AUTO-COMPLETION FOR INPUTTING INFORMATION OVER A NETWORK - Systems and methods for real-time viewing and manipulation of information hosted on third-party systems are described. The system and methods enable property managers to create, edit and delete real estate vacancy postings on multiple sites from a single account, view metrics associated with the postings, and shift the administrative burdens associated with the unreliability of third-party systems to the system itself. | 02-21-2013 |
20130055409 | DYNAMIC REDEMPTION CODES - Information regarding a redemption code may include at least one parameter associated with certain redeemable content. Requests may be received from a user. The request may concern access to redeemable content associated with a redemption code. The applicability of parameters is determined as is the redeemable content associated with the identified parameter. The user may then be granted access to the identified redeemable content. The determination of applicable parameters may include identifying an associated modification and applying the modification to the redemption code in order to identify the redeemable content. | 02-28-2013 |
20130055410 | METHOD OF ACCESSING DIGITAL MEDIA CONTENT - The invention permits a user to be given access to digital media content on one set of conditions, for a limited time period made known to the consumer, but then automatically forces migration to a different set of conditions to retain access to digital media content already listened to and to gain access to new digital media content, without the consumer having to manually download or install new software or in some other manner interact in a manner that will lessen the chance of the consumer embracing or accepting the migration. | 02-28-2013 |
20130061331 | Assigning Access Rights in Enterprise Digital Rights Management Systems - The present subject matter relates to assigning access rights in enterprise digital rights management (eDRM) systems. In one embodiment, a method includes receiving, by an enterprise digital rights management (eDRM) device, user data corresponding to a plurality of users. Further, the method includes creating a user group based on the user data. The user group, thus created, is sent for storage in a repository associated with an eDRM server, enabling the user group to be accessible by a plurality of eDRM devices. | 03-07-2013 |
20130061332 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130061333 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130061334 | METHOD AND SYSTEM FOR FILTERING UNAUTHORIZED ELECTRONIC MAIL MESSAGES - A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. In one embodiment, the system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in a designated folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a folder other than the designated folder. | 03-07-2013 |
20130061335 | Method, Apparatus, Computer Readable Media for a Storage Virtualization Middleware System - A method stored on a computer useable medium for sharing digital assets. The method includes a virtual workspace containing links to multiple digital assets, the digital assets being stored on one or more secondary storage mediums. The method involves displaying at least some of the links to the digital assets in the workspace for an individual to access; receiving a request from the individual to access one of the digital assets in the workspace; retrieving a storage connector stored on the first storage medium, the storage connector being specifically associated with the digital asset; using the storage connector to translate the request to access from the individual to a request to access associated with the digital asset; and accessing the actual digital asset in response to the individual's request. A system and product are also disclosed for use with the method. | 03-07-2013 |
20130067594 | Shared Item Account Selection - Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. Recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts. Selection of a one-time link initiates an authentication sequence that selectively provides an option to select a particular account. Once the one-time sharing link is redeemed, the one-time sharing link is invalidated for subsequent access to the item. | 03-14-2013 |
20130067595 | Data Isolation Service for Data and Information Sharing - A Data Isolation Service for data, information, and knowledge sharing giving organizations using any type of software solution the ability to provide the public with certain public declassified information using a public facing instance of the same software solution. The Data Isolation Service allows for sensitive data to remain secure using a hybrid data storage model. This hybrid model allows for all data to remain secure without the risk that the private data becomes compromised when sharing public data. The Data Isolation Service can be used with any software technology and application system. The Data Isolation Service is a technology service that keeps private and public data partitioned allowing for the transport of public declassified data from within the organization or private database to a public database for public use, then allowing the public declassified data to re-enter the private database for internal organization use. | 03-14-2013 |
20130067596 | DETECTION FILTER - A detection filter installed in an application server including a secure application is disclosed. In one embodiment, the filter includes a rules engine for receiving request data representing an access request for the secure application from a user. The engine applies at least one risk condition rule to the request data to generate a risk probability level, and detects at least one fraud condition when the risk probability level exceeds a threshold level, before passing the access request to the secure application. | 03-14-2013 |
20130067597 | SYSTEM FOR CONTROLLING ACCESS TO USER RESOURCES AND METHOD THEREOF - A system for controlling access to user resources and a method thereof are provided. The system includes a client device and a server. The client device receives an input of access regulations, which define an access level and access agent for first-user resources, from a first user, and transmits the received access regulations to the server. When a second user has access to the user resources, the server controls the access in compliance with the access regulations. | 03-14-2013 |
20130074193 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR EXCEPTION HANDLING - Methods, apparatuses, and computer program products are provided for exception handling. A method may include detecting attempted performance of a prohibited action involving protected data. The method may further include determining based at least in part on a role associated with a user associated with the prohibited action whether the user has elevated rights permitting performance of the prohibited action. The method may additionally include permitting an exception allowing performance of the prohibited action only in an instance in which it is determined that the user does have elevated rights permitting performance of the prohibited action. The method may also include prohibiting performance of the prohibited action in an instance in which it is determined that the user does not have elevated rights permitting performance of the prohibited action. Corresponding apparatuses and computer program products are also provided. | 03-21-2013 |
20130074194 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 03-21-2013 |
20130074195 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 03-21-2013 |
20130074196 | Signature Methods For Scientific Data Information Systems - A computer-implemented method that includes providing an authorized user with an option to define one more levels of a signature method, and providing the authorized user with an option to assign at least one user whose signature is required for each of the defined levels. | 03-21-2013 |
20130074197 | RIGHTS MANAGED DISTRIBUTABLE SOFTWARE - A method of distributing rights-managed software makes use of binary portable application components and associated rights components. The application component includes un-encrypted execution code which causes the application component to execute in a restricted mode if either the rights component is missing or if the rights component determines that the relevant licensing conditions are not satisfied. Such an approach allows application components such as games for mobile phones to be distributed freely between users, and to be available for immediate use in a restricted mode without any need for the recipient to contact the rights issuer. | 03-21-2013 |
20130081146 | APPARATUS, SYSTEM, AND METHOD OF CONTROLLING ELECTRONIC DATA AND RECORDING MEDIUM STORING DATA CONTROL PROGRAM - A data control apparatus, a data control system, a data control method, and a data control program stored in a recording medium, are provided each of which allows a user to obtain electronic data stored in a storage apparatus in a data format compatible with a specific apparatus currently operated by the user or specific application of the electronic data that may be requested by the specific apparatus. | 03-28-2013 |
20130086693 | CLASSIFICATION-BASED DIGITAL RIGHTS MANAGEMENT - The present subject matter relates to a device for digital rights management. The device includes a classification module that assigns a classification tag to a document. The classification tag is selected from a predefined classification scheme. Further, the device includes an access control module that checks a lock status of the document at a predefined time interval. The predefined time interval depends on the classification tag of the document. Further, the access control module locks the document based on the lock status. | 04-04-2013 |
20130086694 | VIRTUAL FEDERATION OF REMOTE PORTALS - Embodiments of the invention provide systems and methods for providing a virtual federation of remote portals. According to one embodiment, providing a virtual federation of remote portals can comprise defining, by a portal system, a configuration of a virtual federation of a plurality of nodes. For example, each node can comprise an application server executing a different enterprise application and maintaining application content for the enterprise application in a separate database. The portal system can also define access control information for a user of the portal system. Each node of the virtual federation can similarly define access control information for the user. The system can then provide access to the application content of the nodes at runtime based on the configuration of the virtual federation and the access control information for the user defined by the portal system and the access control information for the user defined by the nodes. | 04-04-2013 |
20130086695 | METHOD AND SYSTEM FOR REMOTE ACCESS TO DATA STORED ON A HOST SYSTEM - A method and system for remote access to data stored on a host system from a remote system via a data link, a method and system for storing validation password data on a pair of connected first and second modules, and a method and system for verifying the identity of a first module removed from a pair of initially connected and associated first and second modules. | 04-04-2013 |
20130086696 | Method and Apparatus for Controlling Access to a Resource in a Computer Device - A computer device and method are described for controlling access to a resource. An execution environment executes a user process with access privileges according to a user security context. A security unit controls access to resources according to the user security context, with the user process making system calls to the security unit. A proxy hook module embedded within the user process intercepts the system call and generates a proxy resource access request. A proxy service module in a privileged security context validates the proxy resource access request from the proxy hook module and, if validated, obtains and returns a resource handle that permits access to the desired resource by the user process. | 04-04-2013 |
20130091587 | SYSTEMS AND METHODS OF IMPLEMENTING REMOTE BOUNDARY SCAN FEATURES - A system and method for remotely performing boundary scans on a circuit board, device and/or system across a network. A first computing component, connected to the network, includes a computer readable media including computer executable instructions. The instructions cause the computing component to maintain or access a library of test scan procedures for a plurality of subject circuit boards. At least one of the test scan procedure is downloaded to a second computing component proximate the circuit board, device and/or system. The second computing component and the test scan procedure are monitored and controlled remotely via the network. | 04-11-2013 |
20130104245 | AUTHENTICATION SYSTEM - A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a service client a request for access to a secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving from the service client a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester. The secured resource has a common identifier by which it may be generally identified outside of the authentication system, but the request for access lacks sufficient information content for the service client to be able to determine the common identifier. | 04-25-2013 |
20130104246 | E-MAIL, TEXT, AND MESSAGE MONITORING SYSTEM AND METHOD - The present invention relates to a system and method for safe electronic communication for children. According to one exemplary embodiment, the present invention provides a method of monitoring e-mails, text messages, and other forms of electronic communication. In one embodiment, a software system monitors electronic messages for inappropriate content such as inappropriate words and excess skin flesh that would indicate that sexually explicit images are present in the message. If inappropriate content is detected, the message is first sent to a third party, usually a parent or guardian, for review and if acceptable to the third party, the message can be sent to the child. In another exemplary embodiment, the system and method of the present invention provides a calendaring system and points redemption system wherein points can be earned by children and redeemed for awards or merchandise. | 04-25-2013 |
20130111606 | MAPPING IDENTITIES TO DOCUMENTS TO ENABLE MULTIPLE USER LOGINS | 05-02-2013 |
20130111607 | MULTI-USER LIMITED RESOURCE ALLOCATION PROCESSING METHOD AND SYSTEM | 05-02-2013 |
20130111608 | Preventing messaging of co-users on user definable co-user lists | 05-02-2013 |
20130117859 | DISTINGUISHING LEGITIMATE HARDWARE UPGRADES FROM UNAUTHORIZED INSTALLATIONS OF SOFTWARE ON ADDITIONAL COMPUTERS - A client transmits requests to access features of a software program to a server. The requests include an identifier for a hardware profile of the computer on which the user is attempting to run the software. The client receives a response from the server that indicates whether the client is licensed to access the software and/or a feature of the software. The client creates a current identifier for the hardware configuration of the computer and compares the current identifier to the received identifier to determine whether the client is licensed to access the software and/or the feature. | 05-09-2013 |
20130117860 | Controlling Access Within a Protected Data Environment - Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI. | 05-09-2013 |
20130125245 | APPARATUSES, INTEGRATED CIRCUITS, AND METHODS FOR TESTMODE SECURITY SYSTEMS - Apparatuses, integrated circuits, and methods are disclosed for testmode security systems. In one such example apparatus, a data storage is configured to store data. A testmode security system is configured to allow a user to access one or more testmodes of the apparatus at least partially responsive to the data storage not storing sensitive data and disallow the user from accessing the one or more testmodes of the apparatus at least partially responsive to the data storage storing sensitive data. | 05-16-2013 |
20130125246 | METHOD AND SYSTEM FOR ACCESSING NETWORK ON PUBLIC DEVICE - A method and system for accessing a network over a public device are provided in the present invention. The method includes: after receiving a network access request message transmitted by a user over a public device, an Access Service Node (ASN) transmitting the received network access request message to an Authentication Center (AC), wherein, the network access request message comprises identifier information of the user; the AC initiating inquiring to an Identity Information Center (IIC) according to the identifier information of the user, and authenticating the legal validity of the user according to an inquired result, and if the authentication passes, transmitting the user's Access Identifier (AID) to the ASN; and after receiving the user's AID, the ASN sending the received AID to the public device, and the public device using the user's AID as a virtual AID, and using the virtual AID to transmit/receive packets of the user. | 05-16-2013 |
20130125247 | Security Systems And Methods For Encoding And Decoding Digital Content - Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content. | 05-16-2013 |
20130125248 | Variably Controlling Access To Content - A software module is presented that enables a person to determine the relevance of a document while preventing the person from making a copy of the entire document. In one embodiment, this is accomplished by programmatically controlling which portions of a document will be presented to a user and which portions will not be presented to the user. In one embodiment, the software module is used in conjunction with a search engine to present a document search result. | 05-16-2013 |
20130133084 | DIGITAL RIGHTS MANAGEMENT OF CONTENT WHEN CONTENT IS A FUTURE LIVE EVENT - A system for managing use of digital content within a trusted community. An access list defines the trusted community. License requests for use of content made from outside the trusted community are handled in accordance with a license request policy process. | 05-23-2013 |
20130133085 | INFORMATION PROCESSING DEVICE AND MULTIFUNCTION PERIPHERAL - A control API controls secret data to be stored in a secret data storage area which is accessible only to the control API. Moreover, the control API controls the file information storing part in the secret data storage area to store (i) storing location information of the stored secret data and (ii) administrative storage location information notified by the web application so that the storing location information and the administrative storage location information are associated with each other. This makes it possible to (i) prevent a leakage of confidential information and (ii) allow an authorized web application to easily use the confidential information. | 05-23-2013 |
20130133086 | METHOD FOR AUTHENTICATING A USER REQUESTING A TRANSACTION WITH A SERVICE PROVIDER - The present invention relates to a method for authenticating a user (Ui) requesting a transaction with a service provider (SP), which comprises: using authentication data (d | 05-23-2013 |
20130133087 | ENFORCING POLICIES IN WIRELESS COMMUNICATION USING EXCHANGED IDENTITIES - Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second device in proximity, ideally using existing radio capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability allows for one or more of the devices to communicate with a central server via the internet, and perform the exchange of application data flow. By using a central server to draw on stored information and content associated with the entities the server can broker the exchange of information between the entities and the devices. | 05-23-2013 |
20130145482 | VEHICLE MIDDLEWARE - The present disclosure describes a vehicle implementing one or more processing modules. These modules are configured to connect and interface with the various buses in the vehicle, where the various buses are connected with the various components of the vehicle to facilitate information transfer among the vehicle components. Each processing module is further modularized with the ability to add and replace other functional modules now or in the future. These functional modules can themselves act as distinct vehicle components. Each processing modules may hand-off processing to other modules depending on its health, processing load, or by third-party control. Thus, the plurality of processing modules helps to implement a middleware point of control to the vehicle with redundancy in processing and safety and security awareness in their applications. | 06-06-2013 |
20130145483 | System And Method For Processing Protected Electronic Communications - Systems and methods for processing protected electronic communications are disclosed. According to one embodiment, a method for processing inbound messages may include (1) receiving a message containing protected content at an electronic device comprising at least one computer processor; (2) using the at least one computer processor, determining a manner in which unprotected content corresponding to the protected content is accessed by a user; and (3) using the at least one computer processor, automatically sending the unprotected content to a first storage location. | 06-06-2013 |
20130152215 | SECURE LOCATION COLLECTION AND ANALYSIS SERVICE - A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of devices, and that provides a uniform facility for accessing aggregated location data collected by the cloud-based service. The system collects location information related to a user and reports the location information to a central service to provide a variety of useful services to the user. By providing a big, secure location vault in the cloud, the system enables big data analytics to be used to allow current and future questions to be asked of this data and to correlate this with other data to enable new scenarios not yet enabled. Thus, the location collection system provides a model to report, gather, and analyze location data across devices and users. | 06-13-2013 |
20130152216 | SYSTEMS AND METHODS FOR STORAGE OF USER INFORMATION AND FOR VERIFYING USER IDENTITY - Systems and methods are provided for maintaining user profile information and allowing for biometric verification of the user's identity. The user stores or links to personal, financial, etc. information in a web page. The user can limit the types of information that is available to others. The information can be downloaded to a portable device. The information can be used for financial transactions, where the financial information is transmitted to a web site, an ATM, credit card machine, etc. for financial approval. The information can also be used to find other users with similar interest. The user stores selected characteristics that they would like to find in other users, which are compared with other user's profiles. Matching users are aided in locating one another, where they may then prove their identity to each other by biometrically verifying that they are the owner of the user profile. | 06-13-2013 |
20130160141 | Multi-User Login for Shared Mobile Devices - In particular embodiments, two or more users are provided with personalized experiences while using a shared mobile computing device. A login interface is presented for a plurality of users of the shared mobile computing device. When an indication of a login action by a first user of the plurality of users is detected, access to restricted information associated with any other user of the plurality of users is disabled. Cached information associated with the first user is retrieved from a local data store. A personalized user interface is then presented, based on the cached information. Updates to information and/or content may be cached and/or stored remotely. When an indication of a logout action by a first user of the plurality of users is detected, particular information and/or content is flushed from the local data store. | 06-20-2013 |
20130160142 | Track Changes Permissions - Various features and processes related to document collaboration are disclosed. In some implementations, animations are presented when updating a local document display to reflect changes made to the document at a remote device. In some implementations, a user can selectively highlight changes made by collaborators in a document. In some implementations, a user can select an identifier associated with another user to display a portion of a document that includes the other user's cursor location. In some implementations, text in document chat sessions can be automatically converted into hyperlinks which, when selected, cause a document editor to perform an operation. | 06-20-2013 |
20130160143 | PROCESSING MACHINE WITH ACCESS CONTROL VIA COMPUTER NETWORK - A control device controlling a processing machine receives from an external source initial data which includes at least identification data identifying the source of the initial data. The control device transmits the identification data via a connection to a computer network to a computer that is part of a computer cluster and receives authorization data from the computer or from another computer of the computer cluster. The control device allows or denies the user access to the internal data of the control device depending on the authorization data. | 06-20-2013 |
20130167249 | CUSTOMER SUPPORT ACCOUNT WITH RESTRICTED PATIENT DATA ACCESS - A method for accessing a user's account by customer support without viewing the user's private data includes receiving, in an application module communicating with a web service, a request for authentication by a support person using a linked user-support login name. The method includes authenticating the user, authenticating the support person and retrieving a current session of the user as viewed by the user on an electronic screen of a processing device of the user. The method further includes dynamically redacting private data of the user from the user session to create a redacted user session, and delivering the redacted user session for display in an electronic screen of a processing device of the support person. | 06-27-2013 |
20130167250 | Application Security Framework - In accordance with the teaching described herein, systems and methods are provided for providing secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token. | 06-27-2013 |
20130167251 | METHOD OF USING MEMORY INSTRUCTION INCLUDING PARAMETER TO AFFECT OPERATING CONDITION OF MEMORY - Subject matter disclosed herein relates to techniques to use a memory device. A method includes receiving a memory instruction comprising at least one parameter representative of at least one threshold voltage value and a read command to read at least one cell of the memory device. The method further includes detecting at least one voltage value from the at least one cell. The method further includes comparing the at least one voltage value to the at least one threshold voltage value. The method further includes determining at least one logical value of the at least one cell in response to the comparison of the at least one voltage value to the at least one threshold voltage value. | 06-27-2013 |
20130174272 | Digital Content Distribution and Protection - Embodiments provide a system for content distribution and protection. The system first receives an order from a user for a protected document. In response to a successful user authentication, the system generates an access code for the user to access the protected document. In response to a received user reading request, the system validates the access code for a reading session. The system then transfers a set of URLs for accessing a set of pages and associated metadata in the protected document to the user. The set of URLs are valid for a period of time. Responsive to a request for reading a next set of pages, the system again validates the access code for the session and transfers another set of URLs for accessing the next set of pages. The system also logs user activities related to the protected document. | 07-04-2013 |
20130174273 | SYSTEMS AND METHODS FOR MANAGING DIGITAL RIGHTS BASED ON A UNION OR INTERSECTION OF INDIVIDUAL RIGHTS - Systems and methods are provided for aggregating digital access rights owned by a group of individuals and for correlating access rights to physical presence of the users to more accurately control access and distribution of copyrighted media. The intersection of content authorization information associated with each individual of a group may be analyzed. The aggregation and analysis of digital access rights enables multiple users to share the cost of a digital access right to access a content asset in a common area. | 07-04-2013 |
20130174274 | DATA POLICIES FOR ONLINE SERVICES - An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used. | 07-04-2013 |
20130174275 | Computer Implemented Methods And Apparatus For Providing Access To An Online Social Network - Disclosed are systems, apparatus, methods, and computer-readable storage media for providing access to an online social network. The online social network can be specific to an organization having one or more internal users. In some implementations, a request message is received from a requesting user to access social network data of the online social network. The requesting user is identified as an external user of the organization, and it is determined that the requesting user has an authorized status. Access to only a portion of the social network data is provided to the authorized requesting user. | 07-04-2013 |
20130174276 | CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION METHOD, AND CLIENT TERMINAL - If the user of a first portable terminal intends to let a second portable terminal try out a certain content, the user sends to a distribution server trial permission information including the user's own user ID, a content ID of the content of interest, and a digital signature. The distribution server authenticates the received information before distributing a streaming data of a trial-oriented content with the content ID and user ID attached to it as search keys. This allows the content that can be used on a given user terminal to be tried out on another user terminal without the latter user having recourse to the steps of searching for the content in question. | 07-04-2013 |
20130174277 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO RESOURCES - An approach is provided for controlling access to resources according to social connections and/or characteristics of the resources. An access control platform determines one or more resources associated with at least one user, at least one device associated with the at least one user, or a combination thereof. The access control platform further processes and/or facilitates a processing of social networking information associated with the at least one user, the at least one device, or a combination thereof to determine one or more social networking groups. The access control platform also causes, at least in part, a controlling of access to the one or more resources for one or more other users, one or more other devices associated with the one or more other users, or a combination thereof based, at least in part, on membership in the one or more social networking groups. | 07-04-2013 |
20130179990 | Confidential information access via social networking web site - A server computing device for a social networking web site receives from a user, via access of the web site, confidential information regarding the user, including information that the user does not socially share on the web site. The device associates the confidential information with a user identifier that uniquely identifies the user on the web site, and with an export group identifier corresponding to a type of the confidential information. The device associates the export group identifier with a password different from a user password the user employs to access the web site. The device receives, from a third party, a purported user identifier, a purported export group identifier, and a purported password, which the device validates against the user identifier, the export group identifier, and the password. Where validation is successful, the device permits access to the confidential information by the third party. | 07-11-2013 |
20130185807 | End User License Agreement Detection and Monitoring - An approach is provided for detecting and monitoring end user license agreement (EULA) compliance is provided. A request to access a executable software code is received from an end user. A EULA version corresponding to the requested executable software code is identified. A determination is made as to whether the end user has accepted the identified EULA. If the end user has not accepted the identified EULA, then an out of date EULA notification is sent to the end user, the EULA is sent to the end user requesting an acceptance to the EULA. A EULA response is received from the end user. If the end user accepts the EULA, then the end user is allowed access to the executable software code. | 07-18-2013 |
20130185808 | APPARATUS AND METHOD FOR PROTECTING DATA STORED IN DATA STORAGE DEVICE - A computerized method protects data stored in a data storage device. One or more safe destinations are set and correlated with predetermined data of the data storage device. When target data correlated with the safe destinations is needed to be transmitted to a target destination, whether the target destination matches with one of the safe destinations is determined. A data transmission program of the data storage device is executed, and the target data is transmitted to the target destination using the data transmission program, when the target destination matches with one of the safe destinations. If the target destination does not match with any of the safe destinations, a user is notified to input a password and the target data is transmitted to the target destination when the user has input a valid password within a predetermined time period. | 07-18-2013 |
20130185809 | SYSTEM FOR DELEGATION OF AUTHORITY, ACCESS MANAGEMENT SERVICE SYSTEM, MEDIUM, AND METHOD FOR CONTROLLING THE SYSTEM FOR DELEGATION OF AUTHORITY - In sequential processing including issuance of an approval token from a user to a cooperation source service via an access management service, a system for delegation of authority confirms whether each of the user and the cooperation source service has a sufficient authority to execute a service of a cooperation destination before issuing the approval token. | 07-18-2013 |
20130191929 | FEDERATED AUTHENTICATION - A system may receive, at a site, a first message for authentication from a browser hosted on a user device; send, from the site, a redirect universal resource locator of a partner system to the browser; receive a response from the partner system via the browser, the response including a second message indicating whether an authentication of a user of a first device, at the partner system, was successful; determine whether the authentication has been successful based on the second message; and register the first device when it is determined that the authentication has been successful based on the second message. | 07-25-2013 |
20130198860 | Identity Verification for at Least One Party to a Text-Based Communication - Methods and apparatus are provided for identity verification for at least one user to a text-based communication. An identity of at least one user to a text-based communication is verified by obtaining a plurality of characteristic features of at least one prior text-based communication between the at least one user and at least one additional user; comparing the plurality of characteristic features to a current session of the text-based communication; and verifying the identity of the at least one user based on a result of the comparison. The text-based communication can optionally be suspended if a user is not verified and/or an alarm can be generated. | 08-01-2013 |
20130198861 | VIRTUAL AVATAR AUTHENTICATION - In one general embodiment, a method for determining a controlling entity of a first avatar in a virtual world includes: receiving a request for access to a resource via a first avatar; providing a challenge to the first avatar in response to receiving the request; receiving a challenge response via the first avatar in response to the challenge; determining an identity confidence level based on the challenge response; making an identity determination for a controlling entity of the first avatar based on the identity confidence level; and providing or denying access to the resource based on the identity determination. | 08-01-2013 |
20130198862 | Identity Verification for at Least One Party to a Text-Based Communication - Methods and apparatus are provided for identity verification for at least one user to a text-based communication. An identity of at least one user to a text-based communication is verified by obtaining a plurality of characteristic features of at least one prior text-based communication between the at least one user and at least one additional user; comparing the plurality of characteristic features to a current session of the text-based communication; and verifying the identity of the at least one user based on a result of the comparison. The text-based communication can optionally be suspended if a user is not verified and/or an alarm can be generated. | 08-01-2013 |
20130198863 | DIGITAL ASSET AUTHENTICATION SYSTEM AND METHOD - The invention provides a digital asset authentication system and method. The invention includes a digital asset metadata register storing details of parties enrolled with the system, including at least one end user and at least one digital asset supplier, and details of digital assets available from the digital asset supplier. A security module is provided for producing a unique tag and for creating a digital asset security container for the tag comprising data relating to events involving the tag, and the tag and the security container are stored in a store. A processor executes authentication software in response to a request from said one end user for a respective digital asset to validate the request by reference to the metadata register to verify that the metadata register lists said one end user and the respective digital asset. In response to a valid request, the processor firstly causes the security module to produce the tag and to create the security container containing data relating to the end user, the digital asset request and the digital asset, and secondly generates a message for said one end user including the tag and authorizing release of said digital asset for download, play or use. | 08-01-2013 |
20130198864 | LICENSING FOR SERVICES - A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service. | 08-01-2013 |
20130198865 | TRANSMISSION APPARATUS, TRANSMISSION METHOD, AND RECORDING MEDIUM - A transmission apparatus capable of transmitting a first content stored in a first storage area to a receiving apparatus includes a determination unit configured to determine whether the receiving apparatus has authority to access a second storage area storing a second content associated with the first content, a storage unit configured to store the second content in a third storage area different from the second storage area in a case where the receiving apparatus does not have authority to access the second storage area, and a transmission unit configured to transmit to the receiving apparatus access information for accessing the third storage area storing the second content by the storage unit. | 08-01-2013 |
20130205407 | USER INTERFACE, MACHINE AND METHOD - A user interface ( | 08-08-2013 |
20130205408 | LIVE REPRESENTATION OF USERS WITHIN ONLINE SYSTEMS - The present disclosure relates to representation of users within online systems, such as social networks, online services, and platforms. A method for representing a user within an online system is provided, comprising receiving by the online system a live recording of a first user of the online system, the first user defining permissions to access the live recording; requesting a representation of the first user by a second user of the online system; determining if the second user is authorized to access the live recording based on the permissions; and if the second user is authorized, providing the live recording to the second user as the representation of the first user. Furthermore, an online system and a data structure representing a user of an online system are defined. | 08-08-2013 |
20130205409 | APPARATUS, AND ASSOCIATED METHOD, FOR ALERTING USER OF COMMUNICATION DEVICE OF ENTRIES ON A MAIL MESSAGE DISTRIBUTION LIST - Apparatus, and an associated method, for alerting a respondent that generates a reply to a received mail message of addressing of the reply message to a non-secure address. A detector detects reception of a received mail message, and a correlator determines whether any of the entries on a distribution list associated with the received mail message is of selected characteristics, i.e., non-secure. If determined to be non-secure, an annunciator generates an annunciation requiring the respondent to elect whether to include the identified address as a recipient of the reply message. | 08-08-2013 |
20130205410 | Methods and Systems for Securing Data by Providing Continuous User-System Binding Authentication - Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method proceeds to authenticating of the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method further includes providing access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method binds the captured image data of the user to the recorded data to produce audit data for the user when accessing the database of secure information. The method is executed by a processor. | 08-08-2013 |
20130212702 | Apparatus and Method for Data Security on Mobile Devices - A mobile device includes a lock screen configured to prevent unauthorized or inadvertent access to the mobile device by limiting access to the mobile device while displaying through the lock screen applications available on the mobile device. | 08-15-2013 |
20130212703 | Role-Based Content Rendering - Systems and methods for rendering role-based content are described herein. The system includes a registration module configured to define an application role in a metadata driven framework for providing selective access to the content. The content may include data and content objects. The registration module may also be configured to associate content objects with the application role. The system may also include an authentication module configured to authenticate a user from a plurality of users. The user may be authenticated based on log-in credentials of the user. The authentication module may also determine the application role of the user. Additionally, the authentication module may identify one or more content objects based on the determined application role of the user. The content objects may be identified based on the application role of the user. | 08-15-2013 |
20130212704 | SECURE DIGITAL STORAGE - Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein. | 08-15-2013 |
20130212705 | SYSTEM AND METHOD OF GENERATING A PER SALE WATERMARKING ON DIGITAL FILES - A system, method and computer readable media provided for watermarking a digital file. The method comprises altering samples of the digital file available for distribution upon request by adding a number such as +or a −1 to each sample of the digital file according to a probability value and compressing the digital file with the altered samples. Altering the sample of the digital file may be done on a per distribution or per sale basis. | 08-15-2013 |
20130212706 | BROADCASTING OF ELECTRONIC DOCUMENTS PRESERVING COPYRIGHT AND PERMITTING PRIVATE COPYING - A method of broadcasting electronic documents allowing the protection of copyright and private copying includes a network accessible control server taking customer orders, network accessible delivery and control servers, and equipment supporting a display for consulting the document. Each document copy is generated by the delivery server based on the document model ordered. A controller verifies digital rights in force at consultation time, and contains other digital rights acquired by the customer. Copy generation is triggered by the customer activating a URL link to the delivery server. This link was previously sent to the customer via electronic messaging by the order server, containing at least the unique identifier of the copy ordered. The copy is loaded onto the customer's equipment on completion of generation and can be consulted only after issuing a request to the control server containing the unique identifier, and the receipt of the response permitting consultation. | 08-15-2013 |
20130219516 | SECURE CONTENT TRANSFER USING DYNAMICALLY GENERATED OPTICAL MACHINE READABLE CODES - Technologies are generally described for peer-to-peer or peer-to-server-to-peer communication systems based on mobile devices, servers, and personal computers, which utilize proximity communication and optical codes such as two-dimensional barcodes, in order to securely initiate and authorize digital data, file, and multimedia transfers, as well as digital financial transactions. | 08-22-2013 |
20130219517 | PARENT-CHILD GUIDANCE SUPPORT FOR SOCIAL NETWORKS - The present disclosure relates to parent-child guidance support for social networks. A method for providing controlled access to an online resource via a child account comprises (a) when said child account is registered for said online resource, providing access to said online resource via said child account, and at least one of the following steps: (b) in response to a user request via said child account, registering said child account for said online resource only when an age specification of the child account is higher than an average age specification of user accounts currently registered for said online resource, and (c) when registering said child account for access to said online resource in response to a user request via said child account, also registering at least one parent account associated with said child account for said online resource. | 08-22-2013 |
20130219518 | Methods and Systems for Generating History Data of System Use and Replay Mode for Identifying Security Events Showing Data and User Bindings - Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use. | 08-22-2013 |
20130227709 | Content Control System - The present invention relates to a content control system. The system allows a user to navigate the internet using a desktop computer and selectively access content at various websites. For example, if a user were to visit a news website, some of the online content may be locked. However, using the present invention, a user can selectively access the locked content by scanning a barcode associated with the locked content. In this example, the content on the news website may have a barcode (or QR code) next to it on a user's computer screen (e.g., desktop computer). The user can scan the barcode on the computer screen using a mobile device (e.g., mobile phone). By scanning the barcode, an app on the user's mobile device sends a signal that instructs the desired website to unlock the content, which allows the user to view the unlocked content on their desktop computer. | 08-29-2013 |
20130232580 | SYSTEM AND METHOD FOR ADMINISTERING REMOTE CONTENT - A system comprising: a processor; a sensor electronically connected to the processor; and computer executable instructions readable by the processor and operative to use the sensor to determine an identity of a person capable of perceiving a content broadcasted through a broadcasting device. A method comprising using at processor to perform any or all of the following: using a sensor to determine an identity of a person capable of perceiving sensory perceivable content; and controlling the content based on the identity of the person. A computer readable medium having computer executable instructions for performing a method comprising using a sensor to determine an identity of a person that is capable of perceiving sensory perceivable content; and controlling the content based on the identity of the a person. | 09-05-2013 |
20130232581 | SYSTEM AND METHOD FOR SECURELY RETRIEVING AND PLAYING DIGITAL MEDIA - A system for securely downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass server/storage devices for receiving and storing digital content having predetermined gaps; and client devices communicating with the server/storage devices, and providing authorization to proceed. During playing of the digital content by the client devices, the missing gaps may be filled into the appropriate places, to allow the play of the coherent digital content. | 09-05-2013 |
20130232582 | NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK - Access control can include retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. | 09-05-2013 |
20130232583 | Method and System for Providing Digital Media Rental - There is provided a method and system for allocating access to digital media content. In one embodiment, the system may comprise a media server accessible over a communications network, a processor of the media server being configured to encrypt the digital media content to produce a secondary license for the digital media content, and to provide a temporary license key allowing a user to access at least a first portion of the digital media content during an activation usage interval of the secondary license for that portion of the digital media content assigned to the user. The media server further comprises an assignment database configured to store an assignment status of the license. Such a system is configured to permit the user to access the assigned portion of the digital media content during the usage interval. | 09-05-2013 |
20130239230 | DOCUMENT ACCESS AUDITING - The present disclosure includes systems and techniques relating to document access auditing. According to an aspect, the invention involves receiving a request relating to an electronic document associated with a document tracking system; retrieving actions-taken information associated with the electronic document and maintained by the document tracking system; combining and signing the electronic document and the actions-taken information to form a signed document that includes the actions-taken information; and providing the signed document to enable access to the actions-taken information independent of the document tracking system. According to another aspect, the invention involves presenting a consent query that requests consent to an audit event to be recorded by a document control system for an electronic document tethered to the document control system; receiving a consent indication with respect to a consent statement relating to the audit event; and sending information corresponding to the consent indication to the document control system. | 09-12-2013 |
20130247220 | CONTROLLING ACCESS TO DIGITAL IMAGES POST-TRANSMISSION - Embodiments of the present invention provide a system, method, and program product for controlling access to a digital image. A first computing device receives a digital image from a second computing device. The first computing device stores the digital image in local storage on the first computing device. The first computing device displays the digital image to an authorized user in a first user interface provided by the first computing device. Subsequently, in response to receiving instructions from the second computing device, the first computing device deletes the digital image from local storage on the first computing device. The first computing device can transmit a second digital image to another computing device for display in a user interface and, subsequently, transmit instructions to the other computing device that, when received, cause the other computing device to delete the digital image from local storage. | 09-19-2013 |
20130247221 | PROVIDING ACCESS TO DOCUMENTS REQUIRING A NON-DISCLOSURE AGREEMENT (NDA) IN AN ONLINE DOCUMENT SHARING COMMUNITY - Provided are a computer program product, system, and method for providing access to documents requiring a non-disclosure agreement (NDA) in an online document sharing community. A document request is received from a requesting participant at a requesting participant computer comprising one of the participant computers in the network environment. In response to receiving the document request, an access page is returned to the requesting participant computer including a non-disclosure agreement (NDA) requesting that the requesting participant accept terms of the NDA in order to access the content of the document in the storage system. The content of the document is returned to the requesting participant computer in response to receiving indication from the requesting participant computer accepting the terms of the NDA. | 09-19-2013 |
20130247222 | Systems and Methods for Preventing Access to Stored Electronic Data - The techniques described herein include data security systems and methods adapted to protect stored data from unauthorized access. Encryption keys can be maintained on a removable media that allow an authorized user of an agent computing device to access encrypted portions of the removable media. The agent computing device controls access using predefined access control information. An access elimination command communicated to the agent computing device can prevent further access to encrypted data on the removable media. | 09-19-2013 |
20130247223 | APPARATUS AND METHOD FOR ENSURING PRIVACY IN CONTENTS SHARING SYSTEM - A privacy protection policy is present in a content sharing system. A method for managing contents in a content sharing system includes receiving a content download request from a first account through a first device; and determining whether to carry out the download by considering at least one of a sharing range of a download-requested content, a content access right of the first account, a content access right of an owner account of the first device, a sharing range of a download folder, and sharing acceptance or rejection of an owner of the content. | 09-19-2013 |
20130247224 | OWNER PRIVACY IN A SHARED MOBILE DEVICE - Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like. | 09-19-2013 |
20130247225 | SYSTEMS AND METHODS FOR MANAGING RIGHTS TO BROADBAND CONTENT - Systems and methods for managing rights to broadband content are provided. A request for broadband content may be received by a server. The received request may include a client identifier associated with a customer device from which the request is received and a content identifier associated with the requested broadband content. Based at least in part upon the client identifier, a billing account associated with the customer device may be identified, and one or more users associated with the billing account may be identified. A set of access rights for the one or more users may be determined and, based upon an analysis of the set of access rights, a determination may be made as to whether access to the broadband content is authorized. | 09-19-2013 |
20130254899 | DATA PROTECTING SYSTEM AND PROTECTING METHOD - A data protecting method implemented by an electronic device includes periodically obtaining current environmental characteristics around the electronic device and store the current environmental characteristics in a memory; comparing the current environmental characteristics with previous environmental characteristics to determine whether the current environmental characteristics change; obtaining user characteristics of a user when the environmental characteristics changes; comparing the user characteristics with authorized users' user characteristics to determine if the user is authorized, and implementing data protection when the user is unauthorized. A data protecting system is also provided. | 09-26-2013 |
20130254900 | METHOD AND APPARATUS FOR SECURE SHARED PERSONAL MAP LAYER - Techniques to provide a secure, shared personal map layer include determining a geographic location. The geographic location is associated with operation of a device. The techniques also include determining indication that describes a relationship between the geographic location and a first user of the device. The techniques also include determining a privacy level for the indication. Then, the first user of the device is associated with the indication and the geographic location and the privacy level. In some embodiments, the techniques also include determining a personal description vocabulary word based, at least in part, on the geographic location and a context for the device. Then it is determined to present on the device a prompt that includes the personal description vocabulary word. | 09-26-2013 |
20130254901 | Managing Secure Sharing of Private Information Pertaining to Abuse or Neglect Across Security Domains - A method of granting a user in a first organization access to private information stored within an authorization profile of a second organization, an access agreement between the two organizations is formed. Authorization is requested for the user, the authorization profile is retrieved, and authorization to private information pertaining to abuse or neglect is granted if authorized by the access agreement. | 09-26-2013 |
20130263282 | BIOMETRIC AUTHENTICATION DEVICE, BIOMETRIC AUTHENTICATION SYSTEM, BIOMETRIC AUTHENTICATION METHOD, AND RECORDING MEDIUM - A biometric authentication device includes a processor to execute an operation including: obtaining biometric information from a user; creating verification characteristic data from the biometric information; verifying registered characteristic data registered in a storage device with the verification characteristic data and determining whether the user is a true user; permitting execution of re-authentications up to a predetermined number of times when the user is determined to not be the true user; managing the verification characteristic data by storing the verification characteristic data in an existing group or by creating a new group and storing the verification characteristic data therein, when the user is determined to not be the true user; determining whether the user is a false user based on the number of groups; and limiting the execution of re-authentications by the user when the user is determined to be the false user. | 10-03-2013 |
20130263283 | SYSTEM AND METHOD FOR RULES-BASED CONTROL OF CUSTODY OF ELECTRONIC SIGNATURE TRANSACTIONS - Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature. | 10-03-2013 |
20130263284 | MOBILE COMMUNICATION SYSTEM - The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users. In another aspect of the invention, mobile communication device is an eye-covering, a head covering, or an identification badge including a fingerprint sensor and a processor and is used for wireless authentication of the user. | 10-03-2013 |
20130263285 | Multiuser Web Service Sign-In Client Side Components - Embodiments of multi-user web service sign-in client side components are presented herein. In an implementation, the currently authenticated user account of a first application of a client is transferred to another application of a client. In another implementation, a common credential store is used to share data for a plurality of user accounts associated with a client between a plurality of applications of the client, and for the applications to output multi-user interfaces having portions corresponding to the plurality of accounts. | 10-03-2013 |
20130263286 | A METHOD OF AUTHENTICATING A USER OF A TERMINAL WITH A SERVICE PROVIDER - A method of authenticating a user of a terminal referred of as a first terminal, and suitable for communicating with a service provider via a first communications network, the provider requesting an authentication of the user of the first terminal before providing a service to the first terminal, wherein the authentication of the user is based on user authentication performed with regard to a second terminal. | 10-03-2013 |
20130269040 | AUTHORISING USE OF A COMPUTER PROGRAM - A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used. | 10-10-2013 |
20130269041 | ACCESS TO APPLICATION PROGRAMMING INTERFACE SYSTEMS AND METHODS - A method and system for granting premium access to a service application stored within a service provider (SP) computer system through an open API platform is provided. The method includes receiving a request for premium access to the service application from a developer of a developer application wherein the developer application is configured to request data from the service application, assigning a production key to the developer application, sending an electronic message to a service owner (SO) associated with the service application requesting premium access to the service application, granting premium access to the service application by the SO for the developer application, updating the production key at the open API platform to include premium access to the service application, and notifying the developer of the granting of the premium access to the service application for the developer application. | 10-10-2013 |
20130276141 | System and Method for Processing User Rights - A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a request for playback of the content at a second time, and processing a user right associated with the content to authenticate the user right in response to the request for playback, wherein the user right is authenticated based upon a state of the user right at the first time. | 10-17-2013 |
20130276142 | METHOD AND SYSTEM FOR GRANTING ACCESS TO SECURE DATA - Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved protection of data or other computing resources based at least in part upon limiting access to a select number of delegates. Limited access to cloud data based on customer selected or other criterion, reducing the possibility of security exposures and/or improving privacy is provided for. | 10-17-2013 |
20130276143 | Biometric User Equipment GUI Trigger - A user equipment for providing information most relevant to a user as the user becomes impaired or experiences diminishing capacity is disclosed. The user equipment includes a transceiver, a memory, at least one sensor for detecting a biometric measurement of a user of the equipment, a user interface and a processor. The processor filters the biometric measurement, calculates a metric based on the measurement, evaluates the metric, selectively adjusts an amount of information displayed on the user interface based on the evaluated metric and executes an application corresponding to a user actuation of an item of the displayed information. | 10-17-2013 |
20130283396 | SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS - The present invention relates to a method and system for protecting and limiting the execution of a software program only to an authorized user. The software program can be provided in any suitable software form, such as a binary code, or it can be written in a high level program language. In the present invention, the binary code of the program is analyzed and partitioned into parts, some of which are selected to be protected. The protected parts are selected so that during any execution of the software, at least some of the selected parts must be present and executed. The protected code is encrypted and at least partially saved on an attached secured computing device such as a secured disk on key with a small processor or controller, or a smart flash drive. | 10-24-2013 |
20130283397 | METHOD AND APPARATUS FOR PROVISIONING A MOBILE APPLICATION - A method and apparatus for provisioning a mobile application that is related to a desktop software application comprising capturing a code using a mobile device, where the desktop software application generates and displays the code for capture by the mobile device; decrypting the code using the mobile device; validating the code; validating a user based on the code; and enabling functionality of the mobile application for use by the mobile device based on the validation of the user. | 10-24-2013 |
20130283398 | Versatile Log System - A versatile log system is disclosed for producing logs for documents or other objects. The system allows authorized users to configure a log table and at least one coupled table, validate log entries for the log table, and validate data records for the coupled table. When the system is installed with investigative identity data search algorithm, identity data processing algorithm, interactive data entry features, and phrase construction feature, it can significantly improve production efficiency and data accuracy. | 10-24-2013 |
20130291121 | Cloud Abstraction - Disclosed is, among other things, techniques to allow optimal use of various cloud service providers. In one embodiment, this is done by providing an intermediate level service, a Cloud Abstractor, exposing an API that translates to the various provider cloud APIs. An application may call an API on the Cloud Abstractor, and the Cloud Abstractor will make calls to one or more clouds to perform the requested behavior. | 10-31-2013 |
20130291122 | DOCUMENT SECURITY - In one embodiment, a document is marked with an identifier and stored in a memory. Responsive to a request received from a user to perform an operation upon the document or a copy of the document at a requester computer, a database is accessed. The database is a database associating users authorized to access the documents or copies of the documents with operations the users are authorized to perform is accessed. Operation authorization is determined at least in part according to a document threat index. Upon determining the user is an authorized user and determining via the database the requested operation is an authorized operation, an access code is sent to the requester computer to enable the operation. | 10-31-2013 |
20130291123 | PRIVACY MANAGEMENT ACROSS MULTIPLE DEVICES - Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for managing privacy rights of a user related to the delivery of content. The method comprises providing a global privacy management interface that presents a selection tool for enabling a user to review privacy options and interests. The privacy options and interests include controls for presenting a list of identifiers that are associated with the user and interests associated with those identifiers. Each identifier is associated with a requesting source having been used by the user to access content. The interface enables de-selection of individual interests on a per-identifier or global basis. The method further comprises determining, in a server system, content to deliver to the user in view of the privacy selections. | 10-31-2013 |
20130291124 | Method and System for Managing Data in a Communication Network - A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving ( | 10-31-2013 |
20130298258 | MANAGING NETWORK IDENTITIES - Techniques for managing network identities include generating, with a local computing system, a tree structure representing a network comprising a plurality of entities, the tree structure comprising a plurality of nodes, each node of the plurality of nodes representing an entity of the plurality of entities, at least one entity of the plurality of entities is represented by more than one node of the plurality of nodes; assigning a unique identifier to each node; identifying each node of the plurality of nodes as being a protected node or an unprotected node; and transmitting, to a remote computing system, the tree structure, the unique identifiers for the protected nodes, and identity information of the entities for the unprotected nodes. | 11-07-2013 |
20130298259 | Database and Method for Controlling Access to a Database - A method for controlling access to a database is disclosed, as well as a corresponding database system. The method comprises: receiving, from a user, a request for a data post in said database; determining that said user should be allowed access to said requested data post based on a security context associated with said data post and said user; providing said user with access to said data post; and validating, by an external security system, at least one of the user and the data post, said validation being based on a validation field, controlled by the external security system and being associated with said user and/or data post. Hereby, the database can be operated with its native operational procedures, thereby enabling a very fast and efficient performance. At the same time, the validation by the external security system provides a high degree of security. | 11-07-2013 |
20130298260 | FEDERATION OF EMAIL - A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria. | 11-07-2013 |
20130305387 | AUTHORITY DELEGATION FOR BUSINESS OBJECTS - A method relates to authority checks governing user access to business object attachments in a store of business object attachments. The business object attachments are semantically associated with business objects of one or more remote computer systems. The method includes, at a content management interface layer that is communicatively coupled to the store of business object attachments, sending a request for user authority checks on a parent business object of a business object attachment to an originating computer system and receiving results of the user authority checks from the originating computer system. | 11-14-2013 |
20130305388 | LINK STATUS BASED CONTENT PROTECTION BUFFERS - Systems, methods, and devices for processing video data are disclosed. Some examples include a content receiver including an unsecure processor and an unsecure memory coupled to the unsecure processor. The example includes content protection zone hardware including a secure memory and an input for receiving content. The input coupled to the content protection zone hardware, wherein the content protection zone hardware determines if the received content is secure or unsecure and directs secure content to the secure memory and unsecure content to the unsecure memory. | 11-14-2013 |
20130305389 | SYSTEM AND METHOD FOR ACCESSING ELECTRONIC DATA VIA AN IMAGE SEARCH ENGINE - The present invention provides a system and method for accessing electronic data through entry of images as queries in search engine. The system uses various image capturing devices and communication devices to capture images and enter them into image database. Image recognition techniques encode images in a computer readable format. The processed image is then entered for comparison into at least one database populated with images and associated information. Once the newly captured image is matched with an image in the database, the information linked with that image is returned to the user. | 11-14-2013 |
20130305390 | METHOD, SYSTEM, AND DEVICE FOR LICENSE-CENTRIC CONTENT CONSUMPTION - A method, system, and device for license-centric content use or distribution, including a user interface configured to enable a user to manage content by managing a license associated with the content instead of a specific instance of the content, wherein the use or distribution of the content is granted from the license. | 11-14-2013 |
20130312113 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 11-21-2013 |
20130312114 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 11-21-2013 |
20130312115 | HUMAN-AUTHORIZED TRUST SERVICE - A method for authorizing access to data within a system is disclosed herein. The method includes authenticating a first trusted user identity corresponding to a first individual and granting that first trusted user identity a trust assertion privilege. The method then calls for transmitting an invitation to a second individual, the invitation including a trust assertion from said first user, and receiving and authenticating a second trusted user identity corresponding to said second individual. The trust assertion is dependent on a subjective decision by the first user to trust the second user. Next, a trust relationship between said first and second trusted user identities is recorded. | 11-21-2013 |
20130312116 | SOCIAL NETWORK SYSTEM FOR RESOURCE SHARING, AND METHOD FOR THE ESTABLISHMENT AND MAINTENANCE OF SAME - A social network system for resource sharing, and a method for the establishment and maintenance of same are provided. According to the present invention, the social network system for resource sharing includes: a plurality of entities constituting a social network; a sharing resource owned by at least one entity of the plurality of entities; a trust strength for representing the degree of trust in a relationship, which is formed in a unilateral or bilateral way between each of the entities in order to share the resource; and a communication protocol for sharing the resource among the plurality of entities. The trust strength is classified into a plurality of classes. Each of the entities grants a different access right to another entity according to each of the classes. | 11-21-2013 |
20130318628 | Systems and Methods for Providing Access to Computer Programs Based on Physical Activity Level of a User - Systems and methods for providing access to computer programs based on physical activity level of a user are provided. In this regard, a representative system includes: a mobile device having a movement monitoring system operative to monitor movement of the mobile device; and a threshold detection system communicating with the movement monitoring system and operative to provide access information to enable use of the computer program, use of which is otherwise disabled, the access information being provided responsive to the monitored movement of the mobile device corresponding to a threshold level of activity of a user of the mobile device. | 11-28-2013 |
20130318629 | PERSONAL CONTENT SERVER APPARATUS AND METHODS - Personal content server apparatus and associated methods that allow a user (e.g., cable or satellite network subscriber) to access content, such as a video program, from a location outside the subscriber's network. In one embodiment, a personal content server streams the content to the subscriber over a network connection from the local e.g., (subscription) network to a remote network upon authorization by a content manager process. Various access, business or operational rules are applied depending on the content and delivery mode; e.g., to live video broadcast, video-on-demand (VOD), or archived content from the subscriber's digital video recorder (DVR) or networked PVR. Secondary content (e.g., promotions, advertisements, etc.) can also be selectively replaced if desired in order to make the remotely delivered content more appropriate to the remote user's context. | 11-28-2013 |
20130318630 | SYSTEMS AND METHODS FOR VALIDATED SECURE DATA ACCESS - Methods, systems, and techniques for securing access to stored data are provided. Example embodiments provide a Storage Management System (“SMS”) that is configured to facilitate protected information sharing. The SMS may restrict access to shared information based on one or more criteria that validate an entity's right to access the information. For example, the SMS may restrict access to entities that are located in a particular geographic region, that are using a particular type of hardware or software, that hold particular credentials, or the like. In some cases, the SMS may require that an entity's claim to meet on or more required criteria be validated by a trusted third party. | 11-28-2013 |
20130318631 | Fraud Prevention in Online Systems - An online fraud prevention system enables a user who sponsors an online activity to select a particular level of fraud prevention from a plurality of levels of fraud prevention. The system associates the particular level of fraud prevention with the online activity. The system identifies, from among a plurality of methods of fraud prevention, a particular fraud prevention method associated with the particular level of fraud prevention. The fraud prevention system applies the particular fraud prevention method to the online activity. | 11-28-2013 |
20130318632 | SECURE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCY SITUATIONS - A system including a server system, a user terminal and a hardware token, for providing secure access to a data record. The server system comprises storage means ( | 11-28-2013 |
20130326636 | VERIFICATION THAT A USER ATTEMPTING TO ACCESS CONTENT IS A HUMAN USER - An easier and less frustrating way of verifying that a user attempting to access content is a human user is provided. For example, data indicative of a request by a user to access content from a content server is received. An output of geographic data associated with a geographic region is generated. A task to be performed by the user to access the content is provided as a function of the generated output. The output and the task are transmitted to the content server for presentation to the user. Performance of the task by the user is substantially indicative of the user being a human user. | 12-05-2013 |
20130326637 | PLATFORM AND METHOD FOR DYNAMIC SOFTWARE LICENSE - A platform and a method for dynamic software license are disclosed. The dynamic software license platform comprises a license pool, a register manager, a user configure unit and a license manager. The register manager receives a software application from a user end. The user configure unit grants a setting permission to the user end in response to the software application, and allows the user end to submit a license setting according to the setting permission. The license manager adds the software license provided by the software supplier to the license pool, and dynamically provides the software license from the license pool unit according to the license setting. | 12-05-2013 |
20130326638 | Sicherheitssystem - A method for a setting of security settings in relation for objects is provided. The method comprises the following: storing of access rights identifiers, object identifiers and user identifiers in a data storage, displaying at least each of an object symbol, an access right symbol, and a user symbol in a graphical user interface of a computer, wherein the object symbol relates to an object identifier stored in the data storage, wherein the access rights symbol relates to an access rights identifier stored in the data storage, and wherein the user symbol relates to a user identifier stored in the data storage. Moreover, a selection of an object symbol, a displaying of the selection, a selection of a user symbol and a movement of the user symbol in an environment of the access rights symbol, wherein a security setting to the object is set. | 12-05-2013 |
20130326639 | VIRTUAL MACHINE FOR PROCESSING MEDICAL DATA - The present invention relates to a virtual machine (VM) for processing digital data, in particular medical data, by executing a digital data processing application program, in particular a medical data processing application program (MeDPAP), the virtual machine (VM) being a simulation of a computer, a) the virtual machine (VM) comprising a volatile memory (ViMStor) configured to comprise a storage space for temporary data (TEMP) for temporarily storing the digital data; b) the virtual machine (VM) being configured to be accessed by any virtual machine user activated on a virtual machine user list, wherein any activated maintenance virtual machine user is denied any permission regarding the storage space for temporary data (TEMP), wherein denying any permissions is performed by logging into the virtual machine (VM) as an administrator and setting corresponding options; c) wherein any administrator has been deactivated on the virtual machine user list, wherein deactivating any administrator has been performed by logging into the virtual machine (VM) as an administrator and setting corresponding options for each administrator in the virtual machine user list; d) wherein the virtual machine (VM) is in a state in which the administrator has been logged off after deactivating the administrator on the virtual machine user list. | 12-05-2013 |
20130333053 | METHOD FOR PROTECTING FIRMWARE BEING UPDATED - A method for protecting firmware being updated is applicable to an electronic device installed with an open operating platform and applicable to a firmware update tool having a preset unlocking password. The method includes an unlocking step and a specific password generating step. In the specific password generating step, the unlocking password is updated according to the difference between product serial number-related information at the point in time of delivery of an electronic device. Although the preset unlocking password in the source code of the firmware update tool is disclosed, nobody other than the electronic product users and the electronic device manufacturers knows the first unlocking password and the second unlocking password. Accordingly, the method provides a security mechanism for the electronic device and the firmware update tool. | 12-12-2013 |
20130333054 | POST-DOWNLOAD PATIENT DATA PROTECTION IN A MEDICAL DEVICE - Patient data is stored in a medical device, such as an external defibrillator, and may be transferred, or downloaded, from the medical device to a computing device for storage or analysis. In response to the transfer, the medical device protects the patient data so that at least a subset of users cannot access the patient data from the medical device. The other device to which patient data is transferred from the medical device may be remote from the medical device or may be configured to be part of the medical device. The device to which the patient data is transferred from the medical device can be a remote computing device like a computer or server and/or may include or may be an intermediary data management device (DMD). The medical device may be a wearable medical device, such as a wearable defibrillator or a wearable automatic external defibrillator (AED). | 12-12-2013 |
20130340093 | System for Managing Computer Data Security Through Portable Data Access Security Tokens - A data storage system for controlling access to data, including: | 12-19-2013 |
20130340094 | DELIVERY CONTROL FOR HTTP COMMUNICATIONS AMONG MULTIPLE END USER COMMUNICATION DEVICES - An exemplary method is implemented by end-user communication devices for processing the receipt of an HTTP message wherein a received HTTP message comprises a digital packet having a header and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request from an originating device to acknowledge receipt of the subject HTTP message. The received user message is prevented from being displayed on a screen of the first end-user communication device of content until input is entered authorizing a reply to the acknowledgement request. Upon receiving the authorization: a reply HTTP message with an acknowledgement is automatically generated by the first end-user communication device and transmitted to the originating device; the content of the message is displayed. | 12-19-2013 |
20130340095 | Method of and Systems for Privacy Preserving Mobile Demographic Measurement of Individuals, Groups and Locations Over Time and Space - Disclosed are techniques for privacy preserving mobile demographic measurement of individuals, groups, and locations over time and space. A method of estimating demographic information associated with a user of a mobile device and/or a location while preserving the privacy of the user based at least in part on a location estimate of the mobile device of the user includes receiving an estimated geographical location of the mobile device of the user and receiving a time at which the mobile device was at the estimated geographical location. The method includes assigning substitute identifiers for the geographical location and the time at which the mobile device was at the estimated geographical location. The method includes associating the geographical areas substitute identifiers with demographic information and estimating demographic information associated with the user of the mobile device based on the substitute identifiers and based on the demographic information associated with substitute identifiers. | 12-19-2013 |
20130340096 | METHODS AND SYSTEMS FOR PROTECTION OF IDENTITY - The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor's secondary identification. | 12-19-2013 |
20130340097 | SYSTEMS AND METHODS FOR INTEGRATING PERSONAL SOCIAL NETWORKS WITHIN AN ORGANIZATION - A method includes receiving, from a user device, a first signal, the first signal including an authorization indicator associated with a social network system profile of a first user. A second signal is sent, the second signal including a first request for social network information associated with the first user. The first request is based at least in part on the authorization indicator. A third signal is received, the third signal including social network information associated with the first user. The method further includes receiving, from a second user, a fourth signal, the fourth signal including a second request for social network information associated with the first user. One or more metrics is defined, based at least in part on the social network information associated with the first user. A fifth signal is sent, the fifth signal sent such that a visual element based at least in part on the one or more metrics is displayed at an output device. | 12-19-2013 |
20130347126 | CLIENT SERVICES FOR WEB-BASED APPLICATIONS - A system for acquiring access to a web-based application includes one or more computer-readable storage media and an application (e.g., a web browser) for accessing and retrieving over a network a plurality of resources. The system also includes a program interface embodied on the one or more computer-readable storage media. The program interface is configured to present a common set of application program interfaces (APIs) that can be used by the application to demonstrate that a user of the application is entitled to access a first resource. The system also includes programming logic configured to determine if the user of the application is authorized to access the first resource. If it is determined that authorization has not been established to access the first resource, the application is directed to communicate with a marketplace to obtain authorization to access the first resource. | 12-26-2013 |
20130347127 | DATABASE MANAGEMENT BY ANALYZING USAGE OF DATABASE FIELDS - Apparatuses, computer readable media, methods, and systems are described for accessing table layout data identifying a plurality of fields included in a table stored in a database, accessing log data identifying a number of times each of the fields of the table has been queried, ranking the fields based on the number of times each of the fields of the table has been queried, determining a first subset of the fields that have not been queried at least a predetermined number of times, and generating an update to the table by removing the first subset of the fields from the table. | 12-26-2013 |
20130347128 | METHODS AND DEVICES FOR PRESENTING EMAIL ADDRESSES - Methods and devices for data entry are disclosed. An example method includes executing an application on a mobile device, the application requiring a login to access at least a portion of data accessible via the application, accessing a store of email addresses associated with a user of the mobile device, the email addresses including at least a forwarding email address, and presenting the email addresses including the forwarding email address for selection as the login. | 12-26-2013 |
20130347129 | System and Method for Second Factor Authentication Services - A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are returned to the customer server, which grants access only if both first and second factor authentication succeeds. | 12-26-2013 |
20140007257 | SYSTEMS AND METHODS FOR NARRATING ELECTRONIC BOOKS | 01-02-2014 |
20140007258 | SYSTEMS AND METHODS FOR GOVERNING THE DISCLOSURE OF RESTRICTED DATA | 01-02-2014 |
20140007259 | METHODS FOR GOVERNING THE DISCLOSURE OF RESTRICTED DATA | 01-02-2014 |
20140007260 | File Reading Protection System and a Protection Method Thereof | 01-02-2014 |
20140007261 | BUSINESS APPLICATION SEARCH | 01-02-2014 |
20140013444 | Authentication using a digital rights management policy - Method and apparatus are provided wherein, in one example embodiment, an authentication scheme may be defined as part of a digital rights management policy. Authentication rules are defined for a unit of digital content whose location can be anywhere. Further, the digital rights management system may support many authentication schemes while permitted schemes can be fine tuned for individual policies and therefore for individual units of digital content. According to other example embodiments, one or more preferred authentication schemes can be added to a rights management policy. They can be either requested or required for authentication. In addition, in other example embodiments, the reader application may be informed of specific authentication schemes being demanded for a document. If none of the authentication schemes are available then the user can be informed without attempting to authenticate unsuccessfully. | 01-09-2014 |
20140013445 | Controlled Resources Based on Good Behavior - Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters. | 01-09-2014 |
20140013446 | Method and System for Providing Presence Information - A system and method for a user to send presence information to authorized contacts in her device's address book and to receive the presence information of those contacts in her device's address book that have authorized her. A user can authorize any contact in her address book. Optionally, a user can only authorize a contact and be authorized by a contact if she is in that contact's address book. A local application on the device interacts with and displays the device's address book, manages the authorization of contacts, updates the user's presence, and receives and displays the presence of contacts. The local application updates the user's presence manually, semi-automatically, or automatically. Semi-automatic updates involve synchronizing with the device's calendar. Automatic updates may involve the use of location data, the device's built-in sensors, and augmented reality. | 01-09-2014 |
20140013447 | Method for User Access Control in a Multitenant Data Management System - The invention discloses a computer executable method for managing user's access to a service adapted to access a data object in a multitenant data management system. The method is characterized in that the method comprises the steps of determining data object's association with an entity, determining the existence of a trust relationship between the user and the entity in the context of the service, determining the user's access rights to the data object, and granting the user access to the service, if the data object is determined to be associated with the entity, the trust between the entity and the user is determined to be valid in the context of the service, and the user is determined to have valid access rights to the data object. Also a computer program product is disclosed. | 01-09-2014 |
20140013448 | Method and System for Allocating Access to Digital Media Content - There is provided a method and system for allocating an entitlement to digital media content. In one implementation, the system includes a media server accessible over a communications network and configured to utilize a processor to issue the entitlement including a transferable authorization to access the digital media content to a first user, and to store an entitlement record identified with the first user and authorizing access to the digital media content by the first user in a memory of the media server. The media server is further configured to receive a communication including a data corresponding to the transferable authorization to access the digital media content from a second user and to update the entitlement record to authorize access to the digital media content by the second user. | 01-09-2014 |
20140020115 | Social Sharing of Multilayered Document - A method for sharing multilayered electronic content among users of a social network within a digital education platform is provided. In one embodiment, the digital education platform allows a user to create user-generated content associated with a multilayered document and share the content with other users in an education social network. The user can specify which users to share the user-generated content and assign an access right to each of those users that may access the user-generated content. When the digital education platform receives a request to access the user-generated content from a certain user, an access right associated with that user for the user-generated content is determined and access is granted according to the access right. | 01-16-2014 |
20140020116 | BLOCKING OF UNLICENSED AUDIO CONTENT IN VIDEO FILES ON A VIDEO HOSTING WEBSITE - A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content with licensed audio content. An audio replacement tool is provided that enables the user to permanently mute the original, unlicensed audio content of a video file, or select a licensed audio file from a collection of licensed audio, and insert the selected in place of the original audio. Where a video file includes unlicensed audio, the video hosting website provides access to video files to a client device, along with an indication to the client device to mute the audio during playback of the video. | 01-16-2014 |
20140026229 | DELEGATION OF ACCESS RIGHTS TO AN ACCOUNT AFTER THE DISAPPEARANCE OF THE USER - A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user. | 01-23-2014 |
20140026230 | Method, System, Login Device, and Application Software Unit for Logging in to Document Management System - The present invention provides a method, system, login device, and application software unit for logging in to a document management system. | 01-23-2014 |
20140033326 | Management of Application Access - Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls and/or other security settings relating to application programs. Additionally, or alternatively, particular functions and/or functionality associated with application programs may be individually configured. Settings reflecting the access controls and/or other security settings can be stored and can be applied at the user device. The security management application also can be configured to determine if security settings and/or access controls are to be overridden. Data can be collected from various sensors and/or other sources to use in determining if particular application programs and/or application program functionality is to be allowed. Thus, normally disallowed activities can be allowed in emergency conditions, when in a business location associated with a particular device, and/or at other times and/or under other circumstances. | 01-30-2014 |
20140033327 | Siftsort - The present invention relates generally to information processing, and more particularly to techniques for securely organizing, sharing, accessing and storing valuable information related to a family or individual in conjunction with a computer-based platform. Users will have the ability to organize, share, access, send and receive information online using a plurality of personal devices. A computer web browser, mobile device web browser, facsimile machine, scanning device can send and receive information over a communication link with the system using standard software applications such as email, mobile messaging, scanning software and facsimile software. The present invention provides a user friendly web based platform that allows individuals to instantly setup a secure account and store important information, as well as, establish a seamless and effective contingency plan to organizing highly sensitive and personal information. | 01-30-2014 |
20140033328 | SECURE COMPACT FLASH - Methods and apparatus are provided, such as a memory card with a processor and nonvolatile memory coupled thereto. The nonvolatile memory has a secure area configured to store a user password and a serial number in encrypted form. The card is configured to grant access to the secure area when the card receives a password that matches the stored user password and the card is coupled to a system having the serial number. | 01-30-2014 |
20140033329 | Server Geospatially Organized Flat File Data - A flat file data organization technique is used for storing and retrieving geospatially organized data. The invention reduces transfer time by transferring a few large files in lieu of a large number of small files. It also moves the process of locating a given data file away from the file system to a proprietary code base. Additionally, the invention simplifies database management by having quadtree packets generated on demand. | 01-30-2014 |
20140041051 | ACCESSING MEDIA - In general, one aspect of the subject matter described in this specification can be embodied in a method for receiving a request, from an application in an application execution environment, to play a media asset that has associated media information. The application has associated application information and is restricted to an isolation environment provided by the application execution environment. In response to the request, content of the media asset is provided to a component of a computer system for playing. Access by the application to the content of the media asset during the playing is restricted based on the media information and the application information. | 02-06-2014 |
20140041052 | METHODS AND SYSTEMS FOR ESTABLISHING AND ENFORCING DOCUMENT VISIBITILY RIGHTS WITH AN ELECTRONIC SIGNATURE SERVICE - Techniques for generating and enforcing document visibility rights associated with a document in use with an electronic signature service are described Consistent with embodiments of the invention, document visibility rights can be established for each person designated to sign and/or receive a copy of a document, and on a per-page, per-document section, or per-source document basis. Additionally, visibility rights may be conditional, such that various events (including the singing of a document) may modify visibility rights making a previously un-viewable page or document section viewable to a particular person. | 02-06-2014 |
20140041053 | DATA BLOCK ACCESS CONTROL - In one implementation, a data block access system accesses access control information associated with a plurality of data blocks of a storage volume at a data store, and determines whether a user associated with a request for access to a data block from the plurality of data blocks is authorized for the requested access. The data block access system determines whether the user is authorized for the requested access based on the access control information associated with that data block. | 02-06-2014 |
20140041054 | ATTESTATION OF POSSESSION OF MEDIA CONTENT ITEMS USING FINGERPRINTS - A method for verifying a user's access to a content media item includes discovering at least one content item stored on a storage medium associated with a client device. A fingerprint of a selected portion of the media content item is obtained. The selected portion is a portion less than an entirety of the media content item. The fingerprint is communicated to an online service. Access to an online copy of the media content item is received if the fingerprint matches a known fingerprint of a media content item available to the online service. | 02-06-2014 |
20140041055 | SYSTEM AND METHOD FOR ONLINE ACCESS CONTROL BASED ON USERS SOCIAL NETWORK CONTEXT - System and method to control access by a user to an online service, the method including: receiving a request from a user to use an application; identifying, via a processor of a computing device, a social networking characteristic of the user; classifying the user based upon the social networking characteristic, to produce a classification of the user; and controlling an access to the online service based upon the classification of the user. The characteristic may be public or private. Controlling access may include permitting, impeding, or facilitating access. Display of a link may be changed, and/or the processing of the link if selected may be changed. Users may be classified at least as preferred, malicious, non-malicious, non-target and generic default. | 02-06-2014 |
20140041056 | SYSTEMS AND METHODS FOR MULTIPLE PHOTO FEE STORIES - In one embodiment, a method includes receiving a designation of one or more items of digital media; receiving a communication regarding the one or more items of digital media; associating the one or more items of digital media with the communication based on the designation; and setting a privacy level for the communication and the one or more items of digital media on a social-networking system based on a privacy setting of a user on the social-networking system. | 02-06-2014 |
20140041057 | DIGITAL DELIVERY SYSTEM AND USER INTERFACE FOR ENABLING THE DIGITAL DELIVERY OF MEDIA CONTENT - A system, method, and computer readable storage medium provide multi-platform accessibility of media content in a global computer network. Media content is selected in a client computer. Based on a format of the content, a media content player is loaded. If the content is not digital rights managements (DRM) protected, it is loaded and played in the player. If the content is DRM protected, a license to play the content is requested via an API and obtained via a server process. A web server computer creates/updates an authorized client user by communicating with a DRM server. The web server then creates a session with the DRM server and enables authorization to play by communicating with the DRM server that transmits the license to the client computer. Based on the license, the client loads and plays the content in the player. | 02-06-2014 |
20140047556 | SECURE REDACTED DOCUMENT ACCESS - Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for viewing documents is executed, the viewing application comprising standard code for the viewing application that can not process the container data type, and custom code configured to allow the viewing application to process a container data type. A container of the container data type is received from a remote computing device comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. The container is processed based on a location of the computing device and the custom code. | 02-13-2014 |
20140047557 | PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored. | 02-13-2014 |
20140047558 | SYSTEM AND METHOD FOR PROVIDING ACCESS OF DIGITAL CONTENTS TO OFFLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption. | 02-13-2014 |
20140047559 | SYSTEMS AND METHODS FOR PROVIDING PRIVACY SETTINGS FOR APPLICATIONS ASSOCIATED WITH A USER PROFILE - Systems and methods for providing privacy settings for applications associated with a user profile are provided. Exemplary methods include receiving a request from a member of a web-based social network to install an application in association with a member profile, installing the requested application, providing privacy settings selections to control access to data associated with the installed application, receiving a privacy settings selection from the member, and displaying data associated with the application based on the privacy settings selection. | 02-13-2014 |
20140047560 | COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE MOBILE DEVICE CONTENT VIEWING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT - In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, through a secure viewing facility, where the secure viewing facility utilizes a camera or other biometric sensor to monitor an authorized user's actions in the determination of whether the secure viewing facility will permit the computer data content to be viewed on the computer's display, and/or in the control of the viewing process itself. | 02-13-2014 |
20140047561 | ELECTRONIC APPARATUS, CONTROL METHOD FOR ELECTRONIC APPARATUS, AND PROGRAM - An electronic apparatus includes: a touch panel that, when touch operations are carried out in which one or a plurality of indicating means come into contact with or proximity to the touch panel, supplies touch information that indicates the positions of contact points at which the one or plurality of indicating means come into contact with or proximity to the touch panel; a storage unit that stores, as authentication data, the number of the contact points in the touch operations that is indicated by the touch information; and an authentication unit that, upon receiving the touch information after a request for user authentication, carries out user authentication based on a comparison of the number of the contact points that is indicated by the touch information and the authentication data stored in the storage unit. | 02-13-2014 |
20140053280 | Control Pool Based Enterprise Policy Enabler for Controlled Cloud Access - A method for controlling access to a Cloud, comprising receiving traffic from an Enterprise user at a gateway, wherein the traffic carries a first key specific to the Enterprise user for use internal to the gateway, replacing the first key with a second key, wherein the second key is a Cloud-negotiated key generic to a plurality of Enterprise users which permits access to the Cloud, and sending traffic to the Cloud | 02-20-2014 |
20140059703 | Method and System to Impose Enterprise Security Mechanisms throughout a Mobile Application Lifecycle - Particular embodiments provide a method to authenticate a user of an application running on a mobile operating system (OS) installed on a mobile device, wherein the mobile OS invokes callback methods of the application upon making changes to an execution state of the application. Code embedded into the application causes the application to communicate with a management agent installed in the mobile OS upon invocation of a hooked callback method. Upon invocation of the hooked callback method, the embedded code assesses whether the user should be provided an authentication challenge prior to enabling the application to run in the foreground, and presents the authentication challenge if necessary. Finally, the embedded code returns execution control from the management agent back to the application wherein the application executes the at least one callback method prior to running in the foreground. | 02-27-2014 |
20140059704 | CLIENT DEVICE, SERVER, AND STORAGE MEDIUM - Provided is a client device, including an identification unit that identifies a person included in content information acquired by a content information acquisition unit, and generates first identification information indicating an identified person, a communication unit that associates and transmits the content information and the first identification information to an external device, and a generation unit that generates an access request for content information stored in the external device. The access request includes second identification information specifying a user who accesses the content information stored in the external device, and the communication unit transmits the access request to the external device, and from the external device receives content information that is at least partially access-restricted based on a comparison by the external device between the second identification information included in the access request and the first identification information associated with the content information stored in the external device. | 02-27-2014 |
20140059705 | DOCUMENT CONTROL APPARATUS AND DOCUMENT CONTROL METHOD - The document access authorization violation detection apparatus detects, for each of documents, whether or not there is any violation in access authorization to access the document, by using statistical values calculated from duty position levels, which represents height levels of corresponding official positions of users who are authorized to access the document, or inter-organization distances, which are obtained by digitizing inter-organization positional removes from respective groups, to which the users belong, to a group whose member number is larger than any other one of the groups. As a result, the document access authorization violation detection apparatus makes it possible to efficiently detect whether or not there is any violation in access authorization with respect to each of documents. | 02-27-2014 |
20140059706 | METHOD AND SYSTEM FOR FACILITATING DATA ACCESS AND MANAGEMENT ON A SECURE TOKEN - A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is provided in the smart card which allows data stored thereon to be shared by multiple parties. Access to data stored on the smart card is controlled by various access methods depending on the actions to be taken with respect to the data to be accessed. | 02-27-2014 |
20140068787 | INSTANT ACCOUNT ACCESS AFTER REGISTRATION - A method for user registration may include in response to receiving registration data of the user from a client, creating an inactivated user account, generating a temporary session that includes a temporary session identification, transmitting the temporary session identification to the client, and subsequent to the transmitting the temporary session identification, sending an e-mail containing a hyperlink for verification to the user. | 03-06-2014 |
20140068788 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, PROGRAM AND CLIENT TERMINAL - There is provided an information processing apparatus including a processing request acquisition unit configured to sequentially acquire a plurality of processing requests from a user, and an authentication execution unit configured to distribute and execute user authentication processing according to a timing of acquiring the plurality of processing requests. | 03-06-2014 |
20140075570 | METHOD, ELECTRONIC DEVICE, AND MACHINE READABLE STORAGE MEDIUM FOR PROTECTING INFORMATION SECURITY - An embodiment of the invention provides an electronic device. The electronic device is configured to protect a set of private data of an authorized user of the electronic device. The electronic device includes a biometric sampler, a biometric authenticator, and a data provider. The biometric sampler is configured to covertly collect a set of biometric samples from a current user of the electronic device. The biometric authenticator is configured to covertly use the set of biometric samples of the current user and a set of biometric data of the authorized user to verify whether the current user is the authorized user. The data provider is configured to give the current user access to a set of fake data instead of the set of private data if the current user is not the authorized user. | 03-13-2014 |
20140075571 | Role-oriented database record field security model - A database management system implements a role-oriented authorization scheme that facilitates operating system (OS) supported encrypted field access for a table in the database. A security model provides for various roles that have varying responsibilities and rights with respect to the database tables and the data supported therein. In this approach, data that is considered sensitive is encrypted. A system administrator role is authorized to create, update, and maintain a table but is not authorized to view sensitive field data, i.e., data stored in encrypted columns of the table. A security administrator role is authorized to define column masks with OS-enforced security access control to the sensitive field data. By separating (fencing) these responsibilities, the security model enforces end-to-end encryption across the entire database management system. | 03-13-2014 |
20140075572 | RFID SYSTEM WITH SEGMENTED RFID DATA OWNERSHIP - A method according to one embodiment includes receiving data from a radio frequency identification (RFID) tag; receiving waypoint information relating to the RFID tag; setting ownerships of discrete portions of the data based at least in part on the waypoint information; allowing an owner of one of the discrete portions of the data to view the discrete portion of the data owned by the owner, or derivative thereof; and not allowing the owner to view discrete portions of the data that are not owned by the owner. | 03-13-2014 |
20140075573 | PRIVILEGED ACCESS TO MANAGED CONTENT - Privileged access to managed content is disclosed. In some embodiments, a privileged portion of application code manages user access to managed content at a level of access greater than the user would otherwise be afforded. The privileged code moves a content management session up or down in levels of access as required to allow a user to perform through the application one or more specific actions it is desired to permit the user to do in a particular context (e.g., at a particular time in the lifecycle of an item of content and/or a particular point in a business process or work flow), including to permit the user to perform an action it is not desired to let the user perform in other contexts, such as write a particular value to a content item it is not desired to allow the user to write to otherwise. | 03-13-2014 |
20140075574 | API MONITORING METHOD AND DEVICE THEREFOR - Embodiments of the present invention provide an API monitoring method and device. The API monitoring method includes steps such as identifying a plurality of APIs as privacy-sensitive APIs; in response to detecting an invocation of one of the privacy-sensitive API by an application, determining whether the invoked API and the application satisfy a predefined condition; and if the invoked API and the application satisfy the predefined condition, suspending the invocation of the API by the application, displaying a message, wherein the message indicates that the application attempts to invoke the privacy-sensitive API; and determining whether or not to resume the invocation of the API based on a user response to the message. The device may be used to carry out the method. | 03-13-2014 |
20140082747 | INFORMATION PROCESSING SYSTEM, OPERATING DEVICE, AND PROGRAM - An information processing system including an operating device and an information processing main body device, the operating device comprising: an application control unit configured to acquire function information of at least one of application program installed in the operation device; and a use-authority determination unit configured to receive the operation from the user and notice to the application control unit, the information processing main body device comprising a authentication unit configured to submit to the use-authority determination unit a user authentication result including a use-authority information, wherein the use-authority determination unit determines whether or not the user is allowed to use the at least one of the application program on the basis of the function information and the use-authority information. | 03-20-2014 |
20140082748 | USER INFORMATION MANAGEMENT APPARATUS AND USER INFORMATION MANAGEMENT METHOD - A user information management apparatus stores various types of user information on a user in a storage unit, causes a providing unit to provide a user with an access code used to access the user information on the user stored in the storage unit, and when receiving the access code from the facility device installed in a facility that provides a service, causes the transmitting unit to transmit the user information corresponding to the service provided by the facility having the facility device among the various types of the user information stored in the storage unit. | 03-20-2014 |
20140090084 | COLLABORATIVE COMIC CREATION - System and method for collaborative comic creation and editing by a plurality of users. Users may access the comic from a central server (aka shared data center) over the internet. When a user begins to make a change to a selected object in the comic, a momentary object lock may be generated and propagated to the other users to prevent them from making conflicting changes to the object. Modified comic data defining the change may then be sent from the user's computer to the central server for storage and propagation to the other users to update the comic at the user terminals and the central server. Each user may have a set of editing privileges which define the comic data the user may change. A permanent lock may be generated for each user and applied against the comic data that the user is not entitled to change. | 03-27-2014 |
20140090085 | DATABASE ACCESS CONTROL - A method for database access control includes receiving an access request from a requesting user, the access request identifying one or more data entries stored in a base table storing a plurality a data entries each associated with a data category. The identified one or more data entries from the base table are retrieved and a security table including one or more data categories to which the requesting user is authorized to access is generated based on an identity of the requesting user. The data entries associated with a data category included in the security table are outputted as a result table. | 03-27-2014 |
20140090086 | Digital File Distribution in a Social Network System - Systems and methods for obtaining a digital file similar to one used by a device associated with a member of a social network are provided. Digital file information about the digital file is stored on a web-based social network database. The digital file may be located on the same server as the web-based social network database or a third party server such as a mobile phone carrier. A user of the web-based social network database requesting the digital file may require a different format of the digital file than that used by the device of the member. If a different format is requested by the user, a server finds or converts the digital file to be compatible for use by a device specified by the user. | 03-27-2014 |
20140090087 | METHOD OF MANAGING MAP INFORMATION, NAVIGATION SYSTEM, INFORMATION TERMINAL, AND NAVIGATION DEVICE - A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by retrieval based on the input information, the retrieval identifier indicating whether the map information is personal data or public data; storing the map information as the personal data into a storage device, the map information being indicated to be the personal data by the retrieval identifier attached in the attaching, and storing the map information as the public data into the storage device, the map information being indicated to be the public data by the retrieval identifier; and executing a navigation process using at least one of the personal data and the public data which are stored in the storage device. | 03-27-2014 |
20140096265 | METHOD AND A TECHNICAL EQUIPMENT FOR CONTROLLING METADATA ACCESS - A method for controlling access to metadata or a property in metadata of an electronic object comprises receiving a request from an identified user to access metadata of an electronic object; determining one or more pseudo-users that are allowed to access the requested metadata of the electronic object and their corresponding access modes; retrieving at least one person identity by utilizing at least one property value of one or more properties of the electronic object, which one or more properties correspond to the determined one or more pseudo-users; comparing the identity of the requesting identified user to the retrieved person identities, and if there is a match; providing to the requesting identified user an access to selected properties in the metadata, which selected properties are determined according to the access mode. The invention also relates to a method for defining access to metadata of an electronic object. | 04-03-2014 |
20140096266 | Protecting Online Meeting Access Using Secure Personal Universal Resource Locators - Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled. | 04-03-2014 |
20140096267 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURELY COLLECTING, SAFEGUARDING, AND DISSEMINATING ELECTRONICALLY STORED INFORMATION - Applicant has created methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information to facilitate an account owner's management of her personal, private, business, and legal documents. The method for safeguarding can include a double authentication process that only grants exclusive access to an account owner's encrypted information through the use of a uniquely generated security key. The method for collecting information can include a real-time encryption process to permit an account holder to securely upload and store electronic media in category-based compartmentalized locations. Further, the method can include a process for generating category-based advertisements through an integrated marketing platform with geo-fencing capabilities to facilitate the account owner's selection of a variety of services related to the stored information. Finally, the method for disseminating information can include authenticating a request to disseminate the stored information to one or more trustees. | 04-03-2014 |
20140096268 | INFORMATION PROCESSING APPARATUS, DATA RETURNING METHOD AND STORAGE MEDIUM - According to one embodiment, an information processing apparatus provides a data storage service via a network for storing data of a user. The apparatus includes a recipient setting module and an account issuing module. The recipient setting module is configured to accept and set a recipient of data and recipient-receivable data, designated by the user. The account issuing module is configured to issue an account to the recipient set by the recipient setting module. The account has an access right for enabling the recipient to access the recipient-receivable data. | 04-03-2014 |
20140101780 | Method for comment response request feeds to a social networking profile - A method for adding comments to documents and billing items in the context of an online network. As the comments are created a message system within the network automatically sends a notification to the member or members of the online community to whom the comment is directed, showing them the comment and providing a live link to the associated document or billing item. Each comment is associated with a specific document or billing item, and can be customized to be directed to one or several users of the social network, and those users may also then create responses to the original comment using the same method. | 04-10-2014 |
20140101781 | PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION - Systems are provided, including inventive servers configured to eliminate the traditional limitations on the distribution of real-time video/audio/images while at the same time making real-time broadcasting to millions of viewers accessible to anyone with a video/audio/image enabled mobile device and internet connection. At the same time, the same audience of millions can interact in real-time with fellow viewers as the broadcast occurs. This may be done in a secure/controlled way via, in some embodiments, DRM supports. | 04-10-2014 |
20140109241 | Data Protection Method and Electronic Device - A data protection method for an electronic device is disclosed. The data protection method includes setting a log-in password for a private file stored in a public folder, creating a private folder having a same folder name as the public folder to store the private file in the private folder, and comparing an input password with the log-in password for the private folder to determine to display the private folder or the public folder. | 04-17-2014 |
20140115722 | User Generated Content Distribution - Methods, apparatuses, and systems facilitating search, discovery, submission and/or distribution of digital objects over networks. In one implementation, the system allows users to search, discover, and/or submit a digitally encoded multi-media object in any number of different formats and direct that content to any device or devices. | 04-24-2014 |
20140123312 | TOKEN-BASED ACCESS CONTROL - Systems and methods for enabling token-based access control to data are provided. In particular, some embodiments use a token-based access management system to allow or restrict an individual's ability to access data. The access management system uses tokens to define rules (e.g., a Boolean matching rule or algorithm that results in a true/false output indicating the decision) within the access management system to determine if the token is valid and if the individual should be granted access to the requested data. Tokens may further have tool constraints for controlling access. In some cases, the tokens may expire upon completion of a task or after a pre-set amount of time. A generic workflow utilizing tokens and at least one specific workflow showing employees utilizing tokens as part of performing a task responsive to a user. | 05-01-2014 |
20140123313 | ACCESSING INFORMATION DURING A TELECONFERENCING EVENT - A method for accessing information during a teleconferencing event. The method includes identifying a reference to a document transmitted by a telecommunication device participating in a teleconferencing event and identifying a name of the referenced document. The method includes determining, by a computer, an identity of a user of the participating telecommunication device. The method further includes determining the user has permission to access the identified document and, in response, transmitting the identified document to the participating telecommunication device. | 05-01-2014 |
20140123314 | SYSTEMS AND METHODS FOR FACILITATING THE SHARING OF DIGITAL BUNDLES OF SERVICES BETWEEN USERS - Systems and methods are disclosed for allowing a primary user to share a digital service, in a bundle of services implemented by a plurality of different service providers, with a secondary user. In accordance with one implementation, a method includes receiving a request from the primary user to share a first service in the bundle of services with the secondary user. The method also includes generating, using at least one processor, a first token that associates the secondary user with the first service. The method further includes sending the first token to one of the plurality of different service providers for the first service. Additionally, the method includes modifying a status of the primary user to restrict access to the first service by the primary user while the first service is being shared with the secondary user. | 05-01-2014 |
20140123315 | SYSTEM AND METHOD FOR PRESENTING FLIGHT TRACKING DATA TO A USER BASED UPON THE USER'S ACCESS PERMISSIONS TO VARIOUS SOURCES - A computer-implemented system and method for the processing and presentation of flight tracking data from a number of sources, with at least one source include a user access restriction, is disclosed. Substantially real-time flight tracking data is received over a digital network from a number of different sources and is stored in at least a database. Various determined flight paths are stores for a single flight based upon the number of flight data sources contributing data regarding that flight. Upon receiving a query from a user, the user's access with respect to the available data providers in retrieved and the best flight for the selected flight which is determined only from data that the requested user is authorized to access is presented. In one form, the results may be presented to the user in the form of digital map having an aircraft image and historical flight path shown. | 05-01-2014 |
20140123316 | ACCESS CONTROL OF DATA IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module receiving, from a user device, a data access request and accessing hierarchical data access control information. The method continues with the DS processing module obtaining a logical memory access control file from the hierarchical data access control information and determining a data access request type of the request is within access rights of the user device. When the data access request type is within the access rights of the user device, the method continues with the DS processing module obtaining a data object access control file from the hierarchical data access control information. The method continues with the DS processing module determining, from the data object access control file, whether the data access request type is restricted. When the data access request type is not restricted, the method continues with the DS processing module processing the data access request. | 05-01-2014 |
20140123317 | CONFIDENTIAL INFORMATION MANAGEMENT SYSTEM - A confidential information management system includes an entry control apparatus, an information storage unit, an electronic apparatus, and an access control unit. The electronic apparatus includes a user authentication unit that decides whether a user is authorized to log in in the electronic apparatus, and a communication unit communicable with a mobile terminal of the user. The access control unit registers, when the user authentication unit permits the user to log in in the electronic apparatus, the mobile terminal to communicate with the communication unit, and decides whether the mobile terminal is permitted to access confidential information in the information storage unit. The access control unit also validates the registration of the mobile terminal of the user permitted to log in in the electronic apparatus while the entry control apparatus recognizes that the user is in the controlled area, and permits the mobile terminal to access the confidential information. | 05-01-2014 |
20140123318 | ACCESSING INFORMATION DURING A TELECONFERENCING EVENT - A method for accessing information during a teleconferencing event. The method includes identifying a reference to a document transmitted by a telecommunication device participating in a teleconferencing event and identifying a name of the referenced document. The method includes determining, by a computer, an identity of a user of the participating telecommunication device. The method further includes determining the user has permission to access the identified document and, in response, transmitting the identified document to the participating telecommunication device. | 05-01-2014 |
20140123319 | System, Method and Apparatus For Facilitating Resource Security - A method and apparatus are provided for facilitating resource security. A method may include monitoring for resource requests by one or more applications on a device. The method may further include determining, based at least in part on the monitoring, that one of the one or more applications has requested access to a resource. The method may additionally include causing the determined resource request to be logged in a log of resource requests by the one or more applications. A corresponding apparatus is also provided. | 05-01-2014 |
20140130185 | Methods And Systems For Processing Content Rights - A system and method for processing content access rights and/or entitlement rights are disclosed. A method, in one aspect, provides for receiving a selection of a content option, requesting access information associated with the selected content option, receiving access information comprising location information relating to a compatible format, requesting access rights from a first service associated with the location information, wherein the first service requests an access decision relating to the selected content option from a second service based upon the access rights, and receiving the access rights. | 05-08-2014 |
20140130186 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 05-08-2014 |
20140137268 | Rights control method and apparatus for digital living network alliance - Disclosed in the disclosure are a rights control method and an apparatus for Digital Living Network Alliance (DLNA). An address/rights recoding unit is expanded at a DLNA apparatus side to record what addresses and corresponding rights; a service control program is expanded at the DLNA apparatus side, and when another DLNA apparatus requires the present DLNA apparatus to provide a service, the address of said another DLNA apparatus and the address/rights recording unit are compared and the rights is found out. Only users with a Media Access Control (MAC) address set as allowed to have related service can be allowed to use the service of the DLNA apparatus of the technology and to obtain Extensible Markup Language (XML) files of the apparatus and the service description. The service of DLNA service points can be flexibly arranged so as to enable different access users to obtain different rights, thus well guaranteeing the security of the multimedia data and the flexibility of the multimedia service management. The security, privacy and manageability of the DLNA apparatus are ensured. | 05-15-2014 |
20140137269 | REQUESTING ACCESS TO RESTRICTED OBJECTS BY A REMOTE COMPUTER - A method for requesting access rights for an object of a computerized system, comprising invoking in a remote computer linkable to the computerized system an add-on program configured for notifying an owner of the object of the computerized system according to received contact data of the owner of the object, thereby requesting from the owner of the object access rights to the object independently of the computerized system, and an apparatus for performing the same. | 05-15-2014 |
20140143891 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object and the first synthetic context-based object, then the data is returned to the requester. | 05-22-2014 |
20140150114 | VISUAL SECUREMENT OF SENSITIVE DATA - Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed. | 05-29-2014 |
20140150115 | ASSIGNING ELECTRONICALLY PURCHASED ITEMS OF CONTENT TO USERS - The described embodiments include a content provider device that can assign items of content (applications, digitally-rendered music, books, videos, etc.) to users upon receiving assignment messages from administrative devices. The items of content can be electronically transferred to the user's devices to be used by users. The content provider device can also revoke assignments of items of content from users upon receiving revocation messages from administrative devices. The revocation generally causes the loss of one or more rights to the item of content for the user. For example, the content provider device can stop providing services for the item of content and/or can cause the item of content to be deleted from a corresponding user's device. | 05-29-2014 |
20140150116 | CONTROLLING RELEASE OF SECURE DATA - Controlling release of secure data is described. In an embodiment data verified by a trusted authority and other personal data may be stored in a data store on a mobile device. In an example the data store may be secured cryptographically. In an example the data store may be encrypted using one or more encryption keys. In response to receiving a request from a requesting application one or more of the data items may be provided to the requesting party to verify an aspect of a user's identity. In an example, in response to receiving a request from a requesting application user input may be requested, the user input specifying whether or not the data item may be released. In an example, the data store may be provided with a certificate, which may be revoked to prevent access to the stored data items. | 05-29-2014 |
20140150117 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, PROGRAM AND STORAGE MEDIUM - To reduce a fear in that another person notices limitation of a range of information that forms a basis of a screen provided to a user, a page generation unit identifies a publicly-displayable range of information on the user based on control information, which is information different from a password and is identified based on content of an operation performed in a password input field with an input device. The page generation unit limits the range of the information that forms the basis of the screen provided to the user so that the range of the information falls within the publicly-displayable range identified by the page generation unit. | 05-29-2014 |
20140150118 | INFORMATION PROCESSING DEVICE, CONTROL METHOD THEREFOR, PROGRAM, AND INFORMATION STORAGE MEDIUM - To provide an information processing device that is capable of restricting the use of an application or content in an unauthorized device to which the application or the content is copied. A storage situation information storing unit ( | 05-29-2014 |
20140157433 | MANAGEMENT APPARATUS, MEMBERSHIP MANAGING METHOD, SERVICE PROVIDING APPARATUS, AND MEMBERSHIP MANAGING SYSTEM - A management apparatus stores a usable or non-usable state representing whether a right is usable or non-usable by a user in a facility in which a service is provided by a service provider using a service providing apparatus. And, the management apparatus updates the use usable or non-usable state to a non-usable state in a case where a use request of the right is received and transmits the use request to a terminal apparatus. And, the management apparatus permits the use of the right to the user by updating the usable or non-usable state to a usable state in a case where a notification of satisfaction is received from the terminal apparatus or the service providing apparatus, the notification of satisfaction indicating that the user, who requests the use of the right in the use request, satisfies a use requirements of the right. | 06-05-2014 |
20140157434 | SYSTEM AND METHOD FOR ACCESSING A SERVICE - According to one example of the present invention, there is provided, a method of accessing a service. The method comprising: receiving, from a requesting user, a request for a number of accessing users to have access to the service, generating service access data associated with the service, providing, to the requesting user, the generated service access data for distribution to the accessing users, receiving, from an accessing user, service access data, determining, based in part on the received service access data, whether the service can be provided, and where it is so determined, providing the service to the accessing. | 06-05-2014 |
20140157435 | SEAMLESS SECURE PRIVATE COLLABORATION ACROSS TRUST BOUNDARIES - Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored within the file itself, without giving away secret data. User specific personal keys are preferably only stored on the users' device(s). A unique ID is also created for each protected file; a password is generated that depends on (a) a key value that can either be (i) the user's personal key in the case of a file that is to be private or (ii) a shared key in the case of a file that is to be shared with other users, and (b) the unique file ID. The password is then encrypted using a recovery key and also stored in the file itself. The file is secured using a format that supports password-based content encryption. | 06-05-2014 |
20140157436 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING SAME - An information processing apparatus includes a memory and a processor coupled to the memory and configured to receive an instruction to transfer a first application to an execution environment, detect a second application that shares a resource with the first application, the resource being information used upon executing the first application and the second application, provide information for causing a user to determine whether to prohibit transferring the second application to the execution environment when the second application is detected, and invalidate a state in which the second application shares the resource with the first application when instruction to prohibit transferring the second application to the execution environment is received. | 06-05-2014 |
20140157437 | Creating Distinct User Spaces Through User Identifiers - A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform. | 06-05-2014 |
20140165212 | SYSTEM AND METHODS THEREOF FOR TRACKING AND PREVENTING EXECUTION OF RESTRICTED APPLICATIONS - A system and method for tracking and preventing an execution of an application on a user device are provided. The method comprises receiving a request to determine if an application is a restricted application for a user of the user device; receiving at least one context parameter respective of the application; receiving at least one variable related the user of the user device; determining whether the application is a restricted application based on the analysis of the at least one context parameter and the at least one variable parameter; and disabling an access of the user to contents of the application if the application is determined to be restricted. | 06-12-2014 |
20140173751 | SYSTEM AND METHOD FOR CHATTING WITH MACHINES - A human-machine chatting system facilitates real-time two-way communications between a user and a machine. During operation, the system monitors performance of a machine, runs a chat application on behalf of the monitored machine, and determines whether a user is authorized to access performance information associated with the monitored machine. In response to the user being authorized to access the performance information, the system allows the user to obtain the performance information via the chat application. | 06-19-2014 |
20140173752 | HANDLING REPEATED REQUESTS FOR THE SAME USER DATA - In accordance with some embodiments, data may be automatically provided on preordained conditions for specific types of data. Thus specific types of data or specific requestors may be treated differently. The system may be programmed to respond appropriately to requests for certain types of data from certain types of requestors. This offloads the need to review specific requests in many cases and enables an automated system for providing requested data as appropriate. | 06-19-2014 |
20140173753 | CONTROLLING CONSUMPTION OF HIERARCHICAL REPOSITORY DATA - One exemplary embodiment involves receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and a set of user groups to access private resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one authorized access privilege. The embodiment also involves modifying a metadata associated with the private resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups, the metadata associated with the private resources being modified to at least indicate the authorized access privilege. Additionally, the embodiment involves receiving a second request for authorized access to a set of resources associated with the networked hierarchical repository and providing the authorized access based on whether the metadata associated with the set of resources indicates to provide the authorized access. | 06-19-2014 |
20140173754 | Identity Attribute Exchange and Validation Broker - Methods and systems are described herein for performing attribute authentication for use by a relying party in providing access to a resource as requested by a user. Attribute authentication may be performed entirely by a single identity service provider, or by multiple identity service providers each authenticating a subset of a plurality of user attributes, such as name, address, phone, email, and the like. Each attribute may be authenticated with a level of assurance. Levels of assurance may vary from attribute to attribute. Different levels of assurance may be required for different attributes before the relying party may grant access to the user-desired resource. An authentication broker may act as a registry or broker of identity service providers, and may store information usable by relying parties to establish a trust relationship with a particular identity service provider on demand, as needed by a relying party. | 06-19-2014 |
20140173755 | ORCHESTRATED INTERACTION IN ACCESS CONTROL EVALUATION - An orchestrated access system is described herein that provides an access control decision function that is augmented by interfacing with a real-time collaborative communication system that maintains a state of various users' availability to communicate. The orchestrated access system provides real-time approvals for access control scenarios where the policy would not otherwise grant access. The system provides an experience for the requesting user to select an appropriate approver among multiple potential approvers based on the relationship of the potential approver to the requesting user, the relationship of the potential approver to the resource, and the availability of the potential approver for real-time communication. The system can provide a record of approver and request parameters in a database to optimize further interactions. Thus, the orchestrated access system provides an improved experience for granting access to resources within an organization for both the requesting user and the approver(s). | 06-19-2014 |
20140181994 | LINKING TOKEN DETECTION AT A SINGLE COMPUTING PLATFORM WITH A USER IDENTIFICATION TO UNLOCK CONTENT IN VIRTUAL SPACE INSTANCES PRESENTED VIA MULTIPLE COMPUTING PLATFORMS - Token detection at a single computing platform may be linked with a user identification to unlock content and/or effectuate modifications in virtual space instances presented via multiple computing platforms, in accordance with one or more implementations. Exemplary implementations may enhance consistency in a user's experiences of a virtual space across multiple computing platforms. | 06-26-2014 |
20140181995 | PUBLICATION AND REMOVAL OF ATTRIBUTES IN A MULTI-USER COMPUTING SYSTEM - Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments, a consumer information manager (CIM) associated with a user of a multi-user computing system may receive a notification, from a dimension authority (DA), of a decrease in a population count of users of the computing system who have published an attribute within the computing system, and may determine whether the user has published the attribute. In response to receiving the notification of the decrease and determining that the user has published the attribute, the CIM may determine a likelihood that continued publication of the attribute will enable identification of the user, compare the likelihood to a threshold, and, when the likelihood exceeds the threshold, remove the attribute from publication. Other embodiments may be disclosed and/or claimed. | 06-26-2014 |
20140189885 | PERMITTING A USER ACCESS TO PASSWORD PROTECTED DATA - A method of permitting a user access to password protected data at a device, the user associated with a first and second password, wherein the passwords are of the same format, and entry of the first password requires less user input actions than are required for entry of the second password, the method comprises a user interface component of the device requesting from the user, entry of the first password; in response to receiving an entry entered by the user using said device, processing the user entry in a password verifying component of the device to compare the user entry with the first password associated with the user; if no user entry matches the first password in a predetermined number of attempts permitted by the password verifying component, the user interface component requests from the user, entry of the second password. | 07-03-2014 |
20140189886 | Template For Customer Attributes - The present disclosure extends to methods, systems, and computer program products for establishing an attribute template for a customer for distribution to third party recipients. In operation, customer information is received and placed as attributes in a template that is then made available to predetermined recipients. | 07-03-2014 |
20140189887 | Systems and Methods for Crisis Management and Situational Awareness - Systems and methods for managing events, including either a server or a client device, are provided. Assets and events are defined. Information is received by a client device via an input device, associated with an asset and an event, and transmitted to the server. Information is also received by a client device from another client device. Client devices also access information from the server and display the accessed information and information received from other client devices. The server receives information from client devices and stores the information in association with an asset and an event to which the information pertains. The server also receives and stores information from client devices that is designated for transmission to other client devices. The server also permits client devices to access its stored information. The server stores multiple pieces of information pertaining to the same asset or event in association with each other. | 07-03-2014 |
20140196156 | CAPTURING AND MANIPULATING CONTENT USING BIOMETRIC DATA - A method, system, and computer program product for capturing and manipulating content using biometric data are provided in the illustrative embodiments. Biometric data is received from a biometric sensor associated with the data processing system, the biometric data forming a first biometric data. The content is received, the content being captured using the data processing system by a first user associated with the first biometric data. The content is modified using information from a first profile associated with the first biometric data. | 07-10-2014 |
20140196157 | DYNAMICALLY UPDATING PRIVACY SETTINGS IN A SOCIAL NETWORK - A social network allows its members to regulate what data is accessible to other members using one or more privacy settings. A particular member of the social network can modify the one or privacy settings to grant or deny different users access to different data. When a member modifies a privacy setting, the social network determines which information pathways communicating data between members are affected. The affected information pathways are then modified responsive to the privacy setting to communicate data identified by the modified privacy setting and enforce the new privacy restrictions. | 07-10-2014 |
20140201849 | SECURING EMBEDDED CONTENT IN A DISPLAY FRAME WITH PLAYER TRACKING SYSTEM INTEGRATION - Systems and methods are described for receiving restricted content in an embedded frame of a display. A first content server provides content for presentation to a client. In response to a request to present restricted content stored on a second server, the first server creates a URL query string including user credential data for authorizing the restricted content. The first server adds one or more hidden parameters to the URL query string and creates a signature based on the URL query string. The first server adds the signature to the URL query string to form a final query string and sends the final query string to a second content server in a request for the restricted content. The first server receives the restricted content and presents the restricted content in the embedded frame. | 07-17-2014 |
20140201850 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 07-17-2014 |
20140208439 | INJUSTICE DETECTING SYSTEM, INJUSTICE DETECTING DEVICE AND INJUSTICE DETECTING METHOD - The present invention provides an injustice detecting system enabling detection of an injustice that is performed through an operation that cannot be distinguished from normal operation. This injustice detecting system is provided with: a history recording unit for recording operation history information of a monitored device; an audit information disclosure unit for disclosing audit information including at least information indicating that an audit for detecting an injustice is to be implemented; and an injustice detecting unit for detecting the injustice on the basis of pre-disclosure operation history information which is operation history information generated before the audit information is disclosed, and post-disclosure operation history information, which is operation history information generated after the audit information is disclosed. | 07-24-2014 |
20140215639 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING DATA RE-INSTALLATION - Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure re-installs and optionally activates data at least partially installed on a secure element without intervention middleware to repair a personalization procedure failure. Thus, personalization data on a secure element (SE) may be comprehensively managed by interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and a central trusted service manager (central TSM). The processing time required to manage the re-installation procedure is minimized. | 07-31-2014 |
20140215640 | SYSTEM AND METHOD FOR STORAGE OPERATION ACCESS SECURITY - A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data. | 07-31-2014 |
20140215641 | METHOD AND APPARATUS FOR ACCESSING SECURE DATA IN A DISPERSED STORAGE SYSTEM - A method begins with a first computing device receiving a first request from a user device to access secure data. The method continues with the first computing device processing the first request to determine a level of access. When the level of access is acceptable, the method continues with the first computing device facilitating sending a set of encoded data slices to the user device. The method continues with a second computing device receiving a second request from the user device. The method continues with the second computing device processing the second request to determine the level of access. When the level of access is acceptable, the method continues with the second computing device facilitating sending a second set of encoded data slices to the user device. When the level of access is at a given level, the sets include a reconstruction threshold number of encoded data slices. | 07-31-2014 |
20140215642 | SECURITY GATEWAY COMMUNICATION - A gateway device and methods performed therein to prevent unauthorized client devices from connecting to the host network of the gateway device is described. The gateway device does not respond right away to an individual client message sent to the gateway device. Instead, the gateway device only responds to a predetermined sequence of the client messages, which is only known to the gateway device and authorized client devices. Because the gateway device will not respond to random client messages and the likelihood that an unauthorized client device can correctly guess the predetermined sequence of the client messages is low, the risk of a malicious party being able to hack into the host network, for example, by using port scanning techniques, can be mitigated. | 07-31-2014 |
20140223578 | SECURE DATA DELIVERY SYSTEM - A secure data provider controls access to one or more data sources on behalf of a requesting party. A negotiated query is transmitted to one or more of the data sources associated with the request based, at least in part, on the information being requested. The response to the query is modified based, at least in part, on an authorization level of the requesting party, and the modified response is transmitted to the requesting party. | 08-07-2014 |
20140223579 | Software and Method for Securing Information Online - A method for securing information online comprises prompting a user to enter personal information and financial information just one time or the first time only, storing the personal information and financial information, prompting the user to indicate a limited quantity of the personal information and financial information to be shared with a client web server, providing a limited-time password usable at the client web server, receiving a request from the client web server for information regarding the user based at least in part on use of the one-time password by the user at the client web server, and providing the limited quantity to the client web server. | 08-07-2014 |
20140223580 | METHOD OF AND APPARATUS FOR PROCESSING SOFTWARE USING HASH FUNCTION TO SECURE SOFTWARE, AND COMPUTER-READABLE MEDIUM STORING EXECUTABLE INSTRUCTIONS FOR PERFORMING THE METHOD - A method and apparatus for processing software using a hash function to secure the software includes generating a first identifier using a hash function, from a first serial number, based on a user input; and generating a security execution file by combining the first identifier with the software, wherein the first serial number is authentication information used to verify an access right to the software. The method and apparatus further include, in response to receiving an outside request for access to the software, requesting information proving an access right; generating a second identifier using the hash function, from a second serial number that is included in the received information proving the access right; and in response to a determination that the second identifier matches the first identifier, allowing an access to the software. | 08-07-2014 |
20140223581 | IDENTITY VERIFICATION SYSTEMS AND METHODS - Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network are described. In an exemplary implementation in an Internet environment, a server hosts an application providing selective access by the user to confidential data related to the user. The user provides initial data to the application as part of a request to access the confidential data. At least one database having the confidential data stored therein is accessed by the server to retrieve confidential data relating to the user located in the database based on the initial data received from the client interface. An exam creation function causes the server to create an exam comprising at least one question based at least in part on a portion of the confidential data relating to the user. This function creates the exam based on at least one exam definition. An exam administration function causes the server to transmit the exam to the client interface for presentation to the user. The user is granted access to the confidential data subsequent to determination that the user successfully passed the exam. | 08-07-2014 |
20140245459 | SYSTEMS, METHODS AND APPARATUSES FOR BROKERING DATA BETWEEN WIRELESS DEVICES, SERVERS AND DATA RENDERING DEVICES - Provide dare methods, systems and apparatuses for data brokering between hand held wireless devices (WDs) and data rendering devices (DRDs). DRDs in the form of multimedia devices used for rendering data by printing (e.g. to a networked printer) or displaying video data (e.g., televisions, video monitors, and projectors) are provided with data for rendering at the DRD at the request of WDs. DRDs are capable of receiving data data from a network at the request of a WD and/or directly from a WD as the host and then rendering or displaying the data on devices capable of receiving and processing the data. DRD (e.g. printers and multimedia video devices) can also be controlled by the WD during display of the data and to control display of the data. | 08-28-2014 |
20140245460 | MODIFY EXECUTION OF APPLICATION UNDER TEST SO USER IS POWER USER - Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test is hosted in a real-time modifier. A security crawl is performed on the application under test logged in as the user. The user is treated as a power user. | 08-28-2014 |
20140245461 | TECHNIQUES FOR IN-APP USER DATA AUTHORIZATION - Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be operative on the processor circuit to receive a request from an application to perform a task on a device and to return a response to the request to the application based on active permissions for the application. The token component may be operative on the processor circuit to manage a token database and to determine the active permissions for the application based on the token database. Other embodiments are described and claimed. | 08-28-2014 |
20140245462 | PERSONAL SITE PRIVACY POLICY - A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the requester and the user. User information is provided to the requester based on the requester's relationship to the user. | 08-28-2014 |
20140245463 | SYSTEM AND METHOD FOR ACCESSING MULTIMEDIA CONTENT - A systems and method for accessing multimedia content are provided. The method for accessing multimedia content includes receiving a user query for accessing multimedia content of a multimedia class, the multimedia content being associated with a plurality of multimedia classes and each of the plurality of multimedia classes being linked with one or more portions of the multimedia content, executing the user query on a media index of the multimedia content, identifying portions of the multimedia content tagged with the multimedia class based on the execution of the user query, retrieving a tagged portion of the multimedia content tagged with the multimedia class based on the execution of the user query, and transmitting the tagged portion of the multimedia content to the user through a mixed reality multimedia interface. | 08-28-2014 |
20140250537 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR DATA GOVERNANCE AND LICENSING - Various embodiments provide a data governance and licensing system for monitoring usage of tracking data associated with transport of a plurality of packages and for facilitating licensing arrangements in connection therewith. In certain embodiments, the system comprises: one or more memory storage areas containing a variety of data and one or more computer processors. The one or more computer processors are configured to: receive observed data associated with access of tracking data by at least one accessing party; analyze at least a portion of the observed data to determine identification data for the accessing party; compare the identification data and the authorized user data to determine whether the accessing party is an authorized party; determine whether one or more discrepancies exist between the observed data and either generic usage data or authorized user data; and if so, generate either a license proposal or a license revision request. | 09-04-2014 |
20140250538 | DISTINGUISH VALID USERS FROM BOTS, OCRs AND THIRD PARTY SOLVERS WHEN PRESENTING CAPTCHA - Embodiments of the present invention relate to a method of providing an automated public Turing test to a client display system. The method includes providing an image having a plurality of random characters, as well as providing a browser code to the client, whereby the browser code is adapted to restrict display of the image to only a predetermined portion of the image. The method further includes detecting a client response to receiving the predetermined portion of said image. | 09-04-2014 |
20140250539 | Real-Time Management System for Mobile Electronic Devices - Disclosed are a real-time management system for mobile electronic devices and its operating method. The real-time management system includes a mobile electronic device and a main system. After a web developer's management priority of the mobile electronic device is enabled and the mobile electronic device is electrically connected to the main system, the web setting and browser setting of the mobile electronic device are duplicated to the main system to form a mapping area, and the mobile electronic device and the main system turn on a communication port as a specific channel through a web debugging mode, so that the main system and the mobile electronic device constitute a proxy server for performing real-time operations in the mapping area and displaying the operation results through a touch screen of the mobile electronic device without requiring the installation of other application programs, so as to skip the complicated setup procedure. | 09-04-2014 |
20140259182 | SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT - Various aspects of a system and method for managing media content may include a media management server communicatively coupled to a media vending device. A portable media storage device may be authenticated in response to a first request to transfer the media content from the media vending device to the portable media storage device. The transferred media content and the portable media storage device are authenticated in response to a second request to render the transferred media content at a media rendering device. | 09-11-2014 |
20140259183 | PORTABLE STORAGE DEVICE AND DATA SECURITY-CONTROL METHOD THEREOF - The invention is a portable storage device and a data security-control method thereof. The portable storage device has a controller, a non-volatile memory and a communication port. The non-volatile memory and the communication port are connected to the controller. The non-volatile memory has a data storage area and a cache area. The controller executes a data caching function through the cache area to increase data accessing speed. When the communication port is connected to a host, the controller determines whether the host loads a data security-control driver. If the host does not load the data security-control driver, a permission of the host for assessing the non-volatile memory is restricted. The non-volatile memory is then protected from erroneous data accessing to assure data security. | 09-11-2014 |
20140259184 | System and Method for Obscuring Displayed Information - A method includes obtaining information from an application to display to a user of a device having a screen from which information may be viewed by more than one person, generating a cover to selectively obscure sensitive information contained in a portion of the screen displaying the information, and receiving user input to selectively invoke or remove the cover relative to sensitive information to obscure display of the sensitive information on the screen. | 09-11-2014 |
20140259185 | MERCHANDISING MEDIA BASED ON OWNERSHIP AUDIT - A machine performs an ownership audit on source media files whose media tracks are used, or proposed for use, in a mash-up media file. The machine may access a first group of media identifiers from a user's media library and identify authorized media files that the user is authorized to play or use in a mash-up. The machine may access a second group of media identifiers that identify source media files selected by the user for inclusion in a mash-up. The machine may determine whether all source media files are authorized and then present a notification that indicates whether the mash-up media file can be generated, or has been generated, exclusively from authorized media files. If a source media file is not authorized, the notification may include a suggestion that the user purchase an authorization to play the media file, use it in a mash-up, or both. | 09-11-2014 |
20140259186 | METHOD, SYSTEM, AND DEVICE FOR LICENSE-CENTRIC CONTENT CONSUMPTION - A method, system, and device for license-centric content use or distribution, including a pre-existing digital rights management (DRM) system having a unique interface to a repository of data thereof to govern use of content; a shared license repository configured to access the data to govern the use of the content and to communicate with the unique interface of the pre-existing DRM system; and a user interface configured to interact with the pre-existing DRM system, and configured to allow the user to send a license associated with the content from the shared license repository to the pre-existing DRM system or to another shared license repository. | 09-11-2014 |
20140283119 | Tiered Access to On Chip Features - In accordance with some embodiments, multiple blind debug passwords are provided. Each of a plurality of interested entities may have its own password and each password may unlock a specific set of features offered by an integrated circuit. In some embodiments each entity does not know the other passwords of the other entities. Potentially interested entities include an integrated circuit end customer, the original equipment manufacturer, the entity that provided the features to the integrated circuit and a conditional access provider. All debug features may be controlled solely via access to the debug tiers which are accessed by multiple debug passwords. Lower tier passwords are required in order to access higher tiers. Debug features may be separated into multiple tiers with more intrusive access requiring multiple debug passwords in order to gain access. | 09-18-2014 |
20140283120 | Methods And Systems For Managing Data Assets - Methods and systems for managing data assets and rights thereto are disclosed. One method can comprise generating an access token representing access rights of one or more users or device. A request for access to data can be received from the one or more users and the request can be granted or denied based upon the access rights of the one or more users. The access token can be modified based upon granting or denying the request. | 09-18-2014 |
20140283121 | Computer Systems and Methods for Capturing Electronic Service Requests and Responses - A system and method for capturing electronic service requests and responses are disclosed. According to one aspect, the system is configured to monitor and/or capture electronic service requests and responses. Service providers and/or consumers may provide information that is utilized to determine an accessibility level that is to be associated with the electronic service requests and responses. The accessibility level may then be stored and/or associated with the electronic service request and/or response data for subsequent use by a user who meets the defined access criteria in order to derive valuable information from the electronic service request and response data that is stored. In some embodiments, a tiered architecture of access may be utilized to allow different users access to different types of service request and response data. | 09-18-2014 |
20140283122 | DELIVERING AUTHOR SPECIFIC CONTENT - Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream. | 09-18-2014 |
20140283123 | METHODS AND SYSTEMS FOR DETECTING, VERIFYING, PREVENTING AND CORRECTING OR RESOLVING UNAUTHORIZED USE OF ELECTRONIC MEDIA CONTENT - A method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content. In one embodiment, the method comprises providing an electronic system that allows auditors to register to audit the use of electronic media content, providing the auditors with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, owners of electronic media content or other intellectual property or users who have subscribed to the use of electronic media content, obtaining information from auditors through the electronic system regarding unauthorized use of the electronic media content and verifying that the information received from auditors is complete. | 09-18-2014 |
20140283124 | Method for Managing Access to Documents Protected by Digital Rights Management - A method for managing user access of a document protected by digital rights management (DRM), includes the steps of a server checking whether a user who is attempting to access a DRM-protected document has necessary rights to access the document, the server denying the user's access to the document if the user does not have the necessary rights to access the document, the server providing, if the user does not have the necessary rights to access the document, the user with an instant and pre-prepared prompt containing a unique identification (ID) of the document to direct and assist the user to complete required tasks for acquiring rights to the document, and upon completion of the required tasks by the user, the server granting the necessary rights to the user to access the document. | 09-18-2014 |
20140283125 | FACIAL RECOGNITION-BASED INFORMATION DISCOVERY - A system and method thereof for control, by a user, regarding information made publicly available about the user to authorized services and/or applications based on an image of the face of the user. A system and method thereof for obtaining user-related information based on facial recognition. | 09-18-2014 |
20140283126 | Managing Privacy For User-Generated Lists In An Online System - A user of a social networking system creates a list of objects and associates the list with a list privacy level identifying the list's accessibility to other social networking system users. For example, the list privacy level indicates other social networking system users capable of accessing the list. For example, a user creates a list including other users and associates a list privacy level with the list. Hence, the user may specify a privacy level of subsequently posted content so that users included on the list, but not other users, may access the posted content. | 09-18-2014 |
20140283127 | Masking sensitive data in HTML while allowing data updates without modifying client and server - The principal object of this embodiment is to propose a method and system for masking sensitive data in web applications while allowing data updates without modifying client and server by intercepting the data live at HTTP/HTTPS network layer, improving the data security of data, providing authorized and restricted access for visibility of information to the users. | 09-18-2014 |
20140283128 | Specifying Applications to Share in a Shared Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. In some embodiments, the device provides tools to select applications for the secondary access mode. | 09-18-2014 |
20140283129 | METHOD, SYSTEM, AND DEVICE FOR PROVIDING A MARKET FOR DIGITAL GOODS - A system includes one or more processors and computer-readable storage media storing instructions executable by a processor to storing a digital good in a cloud data store that is accessible by a user devices associated with a first user and a second user through their respective accounts. When a request to transfer the access rights to the digital good from the account of the first user to the account of a second user, the transfer of the access rights to the digital good is authorized based on satisfaction of one or more business rules and the access rights are transferred from the account of the first user to the account of the second user while said digital good remains in said cloud data store. The access rights are deleted from the account of the first user. | 09-18-2014 |
20140283130 | MEDIA MANAGEMENT SYSTEM - A method for managing media content may include converting an artistic item on a hard-copy media implementation to a digital media file. The method may include receiving a request from a first user to borrow the digital media file. The method may also include determining whether an access right of the digital media file is available. Responsive to determining that the access right of the digital media file is available, the method may further include determining a loan term for loaning the digital media file to the first user. The method may include granting the access right of the digital media file to the first user during the loan term. The method may also include authorizing the first user access to the digital media file during the loan term. | 09-18-2014 |
20140283131 | Assignment of Security Contexts to Define Access Permissions for File System Objects - A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including permissible roles and defining a set of access permissions associated with each of the permissible roles is assigned to a file system object. A user security context is assigned to a user based on authentication information from the user, and the user security context identifies a user role for the user. An executable security context is assigned to an executable program. When the user has launched the executable program, a process is created and assigned the user security context and the executable security context. Responsive to the process attempting to access the file system object, at least one of the user security context and executable security context is verified against the object security context to determine if the attempted access should be allowed. | 09-18-2014 |
20140289866 | METHOD AND SYSTEM FOR MOBILE OPERATING SYSTEM TAKEOVER - A software system stored in a memory in a mobile device for preventing access to software applications, said mobile device containing a plurality of software applications, the software system comprising means for allowing a first user to toggle the mobile device between a regular mode and a safe mode; means for identifying, based on information received over a communications network or based on selections by the first user, one or more of the software applications as restricted software applications and one or more of the software applications as safe software applications; means for preventing a second user different from the first user from accessing the restricted software applications while the mobile device operates in the safe mode by displaying a safe mode desktop that excludes icons for the restricted software applications; and means for allowing the first user to access the restricted software applications by displaying a regular desktop having icons for both the restricted software applications and the safe software applications while the mobile device operates in the regular mode. | 09-25-2014 |
20140289867 | Automatic Learning Multi-Modal Fraud Prevention (LMFP) System - A computerized learning multi-modal fraud prevention system and method for generating a data signature of a user, such as one engaged in electronic commerce, to prevent fraudulent activities by machines and persons imitating the user. Steps comprise: fetching a signal of a user's signature stored in memory; generating at least one challenge sequence based on the signal to create a second signature; presenting the generated challenge sequence to the user; collecting the user's challenge response to the generated challenge sequence; computing a quality factor between the user's challenge response and the generated challenge sequence; computing a transaction quality factor and content quality factor and reporting an impostor or re-challenging if the quality factor is below a threshold. Lastly, generating a new signature based on any portion of a user's challenge response and/or any portion of the previously generated signature and/or any portion of collectable information from the user's device memory. | 09-25-2014 |
20140289868 | SHARABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS - Shareable content items links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by a link submitter, a request to access a server-stored content item at a sharable link; denying the access requested by the link submitter based on one or more use restrictions associated with the shareable link; prompting the link submitter to request approval to access to the server-stored content item at the shareable link; responsive to receiving approval for the link submitter to access the server-stored content item at the shareable link, modifying the use restrictions associated with the shareable link to allow the link submitter to access the server-stored content item at the shareable link. | 09-25-2014 |
20140289869 | SYSTEM AND METHOD FOR PROCESSING USER INTERFACE EVENTS - A system and method to detect and prevent non-human interaction between a client and a web server invokes an effect to change the event generation behavior at the client. Subsequent event streams from the client to the server are analyzed to determine whether the event streams contain events corresponding to expected reactions of a human operator at the client to the effect. Indications of non-human behavior may invoke more direct human testing, for example using a dynamic CAPTCHA application, or may cause a termination of the client/URL interaction. | 09-25-2014 |
20140289870 | APPARATUS AND METHODS FOR OBTAINING A PASSWORD HINT - A method and apparatus for obtaining a password hint is disclosed. In some embodiments, the method includes: receiving a spatial pattern from a user; obtaining a password comprising a plurality of characters; obtaining a password hint comprising an arrangement of characters, wherein the arrangement of characters includes the plurality of characters of the password and additional characters, and the plurality of characters of the password are located within the arrangement of characters according to the received spatial pattern. The method may also include storing the password hint or providing the password hint to the user. | 09-25-2014 |
20140298486 | GRANTING ACCESS TO DIGITAL CONTENT OBTAINED FROM A THIRD-PARTY SERVICE - Described herein are third party digital content services for granting access to digital content. The third party digital content service is not associated with any particular end-user device or brand of end-user device and thus does not comprise means for transferring digital content directly to end-user devices configured to only receive digital content from an authorized vendor specific digital content service. The third party digital content service receives input from a user identifying an item of digital content which has been purchased or otherwise obtained from the third party digital content service. The third party digital content service then transmits a grant request to a vendor specific digital content service authorized to deliver content to a vendor specific end-user device or application. The grant request comprises authorization information for a vendor specific end-user account associated with the user. | 10-02-2014 |
20140298487 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140298488 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 10-02-2014 |
20140298489 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140304833 | METHOD AND SYSTEM FOR PROVIDING ACCESS TO CROWDSOURCING TASKS - A method and system for enabling a secure access to data corresponding to a task on a server is disclosed. The task is accessible at a crowdsourcing platform and performable by a crowdworker. The method includes receiving an input for accepting the task on the crowdsourcing platform. The method includes initiating at least one human response test in response to the acceptance of the task by the crowdworker on a computing device. The method includes receiving a response from the crowdworker for the at least one human response test, wherein the response is sent from the computing device. The method includes communicating at least one locator to the computing device if the response is correct. The at least one locator enables the crowdworker to access the data at the server. | 10-09-2014 |
20140304834 | Personalized Secure Data Access Techniques - A technique for a user to access secure data in a PIN-like combination fashion that is substantially undetectable by a third party observer or keystroke tracking computer virus. The technique includes establishing a counter-combination of indicators that may be aligned with set indicators of a user's combination. The counter-combination indicators may be personalized indicators as an aid to the user in entering set indicators in a manner that may be largely undetectable to an observer. | 10-09-2014 |
20140304835 | MULTI-IDENTITY FOR SECURE FILE SHARING - Techniques for controlling access to shared data files such as stored in a collaborative file sharing service. Organizations want to have access to data originated by their employees and want that access to continue even when the employees leave the company. Also, organizations do not want former employees to have access to the company's files. A file storage service uses an Organization's recovery key while creating a recovery record for a file (which may be stored in a folder), and protected using a Work identity. The individual person who originally creates a file and/or shares a folder securely with others is considered the folder's owner as long as he is part of the same Organization. User's identities are validated upon access. The keys are also purged from a local key store as soon as identity changes are detected. In this way, the folder owner will not be able to decrypt files stored in a folder shared using a Work identity if the identity is canceled by the Organization. | 10-09-2014 |
20140304836 | DIGITAL RIGHTS MANAGEMENT THROUGH VIRTUAL CONTAINER PARTITIONING - In embodiments of the present invention improved capabilities are described for securely sharing documents among users within separate business entities, comprising providing a virtual container control facility, on a computing device with an operating system, and at least one virtual container where commands from the operating system for saving, copying, and printing of computer files are restricted for users other than unrestricted users; storing by a first unrestricted user of a first business entity a computer file in the virtual container; granting access permission by the first unrestricted user to view and edit the computer file by a restricted user of a second business entity; and receiving editing of the computer file by the restricted user, the editing creating an edited computer file within the virtual container that is accessible by the unrestricted user. | 10-09-2014 |
20140304837 | SYSTEM AND METHOD FOR CONTROLLING SAME, ACCESS MANAGEMENT SERVICE SYSTEM AND METHOD FOR CONTROLLING SAME, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An access management service system that manages use of a service provided by a resource service system, comprises: a holding unit which holds information of a user and information of a client system in a storage unit; a determination unit which, if an authorization request for use of the service is received from the client system due to an instruction from a user having authority to use the service, determines whether a group to which the user belongs and a group to which the client system belongs match based on the information held in the storage unit; and a presentation unit which, if the determination unit determines that the groups match, presents, to the user, a screen for instructing whether or not to permit delegation of the authority of the user to the client system. | 10-09-2014 |
20140317759 | METHOD AND APPARATUS FOR PROCESSING DOCUMENT IN TOUCH-SENSITIVE DEVICE - A method and apparatus are provided for processing a document in a touch-sensitive device by performing a document locking function in order not to expose a specific portion that contains significant content requiring security or confidentiality in a document, and by unlocking a locked portion of a document. In the method, when a document locking input is detected from a displayed document, the displayed document is folded in a direction of a first drag input. Thereafter, when the first drag input is removed, the displayed document is locked by completing the folding of the displayed document. | 10-23-2014 |
20140325677 | OPTICAL SECURITY ENHANCEMENT DEVICE - An optical security device can be used to view sensitive information provided in an obscured format via a potentially untrusted and/or compromised computer. The techniques described herein enable use of untrusted computers for access to sensitive information. The optical security device employs one or more forms of visual cryptography such as spatial cryptography and/or temporal cryptography in some instances via a programmable mask and/or a programmable color filter to reveal sensitive information that is provided in an obscured form by a potentially untrusted computer. | 10-30-2014 |
20140325678 | OPTICAL SECURITY ENHANCEMENT DEVICE - An optical security device can be used to view sensitive information provided in an obscured format via a potentially untrusted and/or compromised computer. The techniques described herein enable use of untrusted computers for access to sensitive information. The optical security device employs one or more forms of visual cryptography such as spatial cryptography and/or temporal cryptography in some instances via a programmable mask and/or a programmable color filter to reveal sensitive information that is provided in an obscured form by a potentially untrusted computer. | 10-30-2014 |
20140325679 | METHOD AND APPARATUS FOR NOTIFYING OF SECURITY INFORMATION IN ELECTRONIC DEVICE AND COMPUTER-READABLE RECORDING MEDIUM FOR THE SAME - An apparatus and a method for displaying information required to be secured in a wireless communication terminal are provided. The method includes recognizing generation of notification information of one or more processes activated in a first operation mode among a plurality of operation modes including the first operation mode and a second operation mode; and notifying a user of a part of the notification information when a current operation mode is the second operation mode. | 10-30-2014 |
20140325680 | METHOD AND BROWSER FOR BROWSING WEB PAGE, AND STORAGE MEDIUM - The present invention discloses a method and a browser for browsing a web page, and a storage medium, and the method comprises: prestoring identity information of an owner user; receiving a web page browsing request from a browsing user, and obtaining the identity information of the browsing user; comparing the identity information of the browsing user with the prestored identity information of the owner user to determine whether the browsing user is the owner user; browsing a web page in a private browsing mode when the browsing user is determined as the owner user; and browsing a web page in a non-private browsing mode when the browsing user is determined as a non-owner user. By the invention, the privacy of browsing behaviors of the owner user may be effectively protected, and the owner user is enabled to examine browsing behaviors of other non-owner users. | 10-30-2014 |
20140331333 | Image Analysis and Management - Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device. Employees of an enterprise may use a mobile device to store both work product images (e.g., images of sensitive or proprietary information) and non-work product images (e.g., personal images). An enterprise may desire to enforce security protocols on the work product images, but the employee may not want the security protocols applied to the non-work product images. In some embodiments, by installing and executing an image manager that is able to analyze and manage images, the enterprise can enforce security protocols on only the work product images. Such security protocols may include the prevention of unauthorized viewing of the work product image (e.g., by encrypting the work product image) or deleting any work product image from the mobile device when the employee's employment has ended. | 11-06-2014 |
20140331334 | Display System, Display Method, Display Terminal and Non-Transitory Computer-Readable Recording Medium Stored With Display Program - A display system for displaying a document includes a tablet terminal and a head mounted display device (HMD). The tablet terminal includes a display device which does not display confidential information that a third party is not allowed to browse, but displays non-confidential information that the third party is allowed to browse with regard to the document. The HMD includes a glasses-type display unit which does not allow the third party to browse, but allows a HMD user to browse, a communication unit which receives the confidential information, and a video camera for capturing the non-confidential information displayed on the display device. The glasses-type display unit, based on the captured non-confidential information, displays the received confidential information so that the received confidential information is visually recognized by the HMD user in a state of being aligned with the non-confidential information displayed on the display device. | 11-06-2014 |
20140331335 | METHOD FOR AUTOMATICALLY TAGGING DOCUMENTS WITH MATRIX BARCODES AND PROVIDING ACCESS TO A PLURALITY OF SAID DOCUMENT VERSIONS - A method of tagging a document for future access, the method comprising the steps of: (a) Saving a document on a server, (b) Accessing said document by a tagging process program, (c) Having said tagging process program: (i) generate a tag referring to the location of said document on said server; and (ii) add said tag to said document, while said tag being visible on the printed version of the document, wherein, said tag can be scanned by a device equipped with an optical scanner and as a result said document would be accessible to said device. | 11-06-2014 |
20140338001 | COLLABORATIVE PARENTAL CONTROL OF STREAMING MEDIA - A network device receives a request for a selected video from a first user at a client device, and determines similarities between a second user associated with the first user and other parents in a collaborative community, wherein the similarities are determined based on the second user's, and the other users', prior censoring of videos. The network device obtains all exclusions applied by the second user, and the other users, in the collaborative community to the selected video, wherein each of the exclusions comprises a portion of the selected video identified for censoring by one of the users in the collaborative community. The network device further selectively applies each of the determined exclusions to the selected video based on the determined similarities, and sends the selected video, with the selectively applied exclusions, to the requesting first user at the client device. | 11-13-2014 |
20140338002 | FACILITATION OF SOCIAL INTERACTIONS - Embodiments relate to facilitating social interactions. An aspect includes determining that a first communications device is in communicative contact with a second communications device, identifying at least one artifact relating to a user of the first communications device, and searching at least one database for information about a user of the second communications device that is in common with the user of the first communications device with respect to the artifact. Also, results of the searching are provided as a topic of conversation to the first communications device. | 11-13-2014 |
20140338003 | DISTRIBUTED SECURE CONTENT DELIVERY - Techniques for distributed and secure content delivery are provided. Requests for content are routed to a centralized service where the requestors are authenticated for access to the content. The centralized service generates access statements for the requestors. The requestors are redirected to particular distributed content services having access to the desired content. The distributed content services verify the access statements and vend the desired content to the requestors. | 11-13-2014 |
20140344951 | KID MODE USER INTERFACE WITH APPLICATION-SPECIFIC CONFIGURABILITY - A user interface is disclosed that is configured to provide a multi-user, multi-application experience for users of a given computing device, where each user account of the device is configurable with applications suitable for that user and each application has a usage timer associated therewith. Thus, each user may have access to applications that are different from another user of that device, and each user can be allocated application usage time independent from other users. The usage timers can be configured to reset once a usage period has lapsed. In some cases, the size of icons displayed for a given user account are automatically sized based on the age range of that user. A reward program may automatically increase the time allotted for given applications/content upon successful usage/consumption of educational applications/content. In a classroom/group setting, multiple computing devices may be simultaneously set into Kid Mode by a master computing device. | 11-20-2014 |
20140344952 | INDEXING AND SEARCHING DOCUMENTS WITH RESTRICTED PORTIONS - One or more computer devices may receive a document from private content that is accessible by a set of users, and may extract metadata from the document. The metadata may provide information relating to one or more aspects of the document. The one or more computer devices may determine, based on the metadata, whether a portion of the document includes information that is only to be accessible by a particular user from the set of users, and may append a restrict indicator to the metadata when the portion of the document includes information that is only to be accessible by the particular user. The restrict indicator may identify the particular user and the portion of the document. The one or more computer devices may store the metadata and the restrict indicator in a personal search index. | 11-20-2014 |
20140344953 | PRIVACY SENSITIVE PERSONA MANAGEMENT TOOLS - The disclosed tools include enhanced and flexible tools to enable users who may be business competitors to share non-generic data in a substantially generic and in a substantially equitable manner. The resulting incentive to more freely share data between competitors will benefit users such as brand owners and enhance content delivered to their end users based on shared data. | 11-20-2014 |
20140344954 | METHOD FOR CONTROLLING CONTENT AND DIGITAL DEVICE USING THE SAME - The present specification discloses a method for controlling a thumbnail image page including thumbnail images with respect to visual information for which security is set, and a digital device using the same. The digital device according to the present specification provides a first thumbnail image page mode (“first mode” hereinafter) to a display unit when security information on a user corresponds to predetermined security information and provides a second thumbnail image page mode (“second mode” hereinafter) to the display unit when the security information on the user does not correspond to the predetermined security information. For example, the thumbnail image page displays thumbnail images with respect to visual information for which security is set in the first mode, whereas the thumbnail image page does not display thumbnail images with respect to visual information for which security is set in the second mode. | 11-20-2014 |
20140344955 | MAINTAINING A COMMON IDENTIFIER FOR A USER SESSION ON A COMMUNICATION NETWORK - A wireless system receives a registration from a user device and transfers a request for the user device to an authorization server. The authorization server authorizes a user session for the user device and transfers a common identifier for the user session to the wireless system. The wireless system receives the common identifier and transfers a registration for the user device to an application node. The application node receives the registration and transfers a request for the user device to the authorization server. The authorization server authorizes a user application for the user device and transfers the common identifier for the user application to the application node. The wireless communication system tracks the user session and transfers user session data records having the common identifier. The application node tracks the user application and transfers user application data records having the common identifier. | 11-20-2014 |
20140351956 | ENFORCING RESTRICTIONS RELATED TO A VIRTUALIZED COMPUTER ENVIRONMENT - An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the VM, such as who may use the VM, when the VM may be used, and on what physical computers the VM may be used. There may be similar restrictions related to a general ability to modify a VM, such as who may modify the VM. There may also be restrictions related to what modifications may be made to a VM, such as whether the VM may be modified to enable access to various devices or other resources. There may also be restrictions related to how the VM may be used and what may be done with the VM. Information related to the VM and any restrictions placed on the operation of the VM may be encrypted to inhibit a user from circumventing the restrictions. | 11-27-2014 |
20140359789 | Trusted Circle Information Access Management User Interface - A user interface to enable subscribers to control dissemination of outgoing information and filter visibility/reception of incoming information, without unduly complicating the interface. The UI enables a subscriber to: assign ranks of trust (ROT) to contacts, stipulate minimum ROT contacts must be assigned to access information shared by the subscriber, and stipulate minimum ROT contacts must be assigned to send information to the subscriber. The UI displays a trusted circle sphere to enable subscribers to assign ROT to contacts. Each line of latitude (LOL) on the sphere represents a separate ROT a contact may be assigned. Contacts are assigned ROT by dragging contact thumbnails onto relevant LOL. The UI additionally displays a ROT graduated color bar to enable subscribers to designate minimum ROT. To designate minimum ROT, a subscriber draws a line from an information item/delivery mechanism displayed on the information control to a ROT on the graduated color bar. | 12-04-2014 |
20140359790 | METHOD AND APPARATUS FOR VISITING PRIVACY CONTENT - Described is a method, apparatus for visiting privacy content. The method includes: obtaining system input event, and extracting input data corresponding to the system input event; obtaining sample data matching with the input data; accessing to an application corresponding to the sample data; and displaying privacy content of the application. The method and the apparatus for visiting privacy content is used to reduce user operating steps and improve operating efficiency. | 12-04-2014 |
20140359791 | MANAGING NETWORK IDENTITITES - Techniques for managing network identities include generating, with a local computing system, a tree structure representing a network comprising a plurality of entities, the tree structure comprising a plurality of nodes, each node of the plurality of nodes representing an entity of the plurality of entities, at least one entity of the plurality of entities is represented by more than one node of the plurality of nodes; assigning a unique identifier to each node; identifying each node of the plurality of nodes as being a protected node or an unprotected node; and transmitting, to a remote computing system, the tree structure, the unique identifiers for the protected nodes, and identity information of the entities for the unprotected nodes. | 12-04-2014 |
20140366157 | MULTIPLE CONTAINERS ASSIGNED TO AN APPLICATION - The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file system that an assigned application can access to store data, while other applications are restricted access to the container. In some instances, it may be beneficial for multiple applications to share some data, while still maintaining other data in a secure location, thus an application can be assigned to multiple containers, a personal container that can only be accessed by the application, and a shared container that can be accessed by multiple applications. Further, an application can be assigned an alternate container, in addition to the personal container. The alternate container can be used when an alternate user is using the client device, thus restricting the alternate user from accessing any sensitive data stored in the personal container. | 12-11-2014 |
20140366158 | Using Biometric Verification to Grant Access to Redacted Content - Some embodiments provide an electronic device with a novel content redaction engine. The content redaction engine of some embodiments determines whether to redact content for output based on whether a user is biometrically verified. When the content redaction engine receives verification data indicating that the user is biometrically verified, the device displays content without any portion redacted. On the other hand, when the content redaction engine does not receive such verification data, the device displays the content with at least a portion redacted. The electronic device of some embodiments additionally includes a biometric reader and a biometric verification engine. The biometric reader reads a person's uniquely identifying biometric data (e.g., thumbprint/fingerprint, iris scan, voice, etc.). This biometric information is then read by the biometric verification engine for comparison to a stored set of verified user biometric data. When the biometric data matches the stored data, the person is verified. | 12-11-2014 |
20140366159 | CONTINUOUS DIGITAL CONTENT PROTECTION - Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content. More specifically, sensor data can be employed as a basis for initially providing an authorized user access to protected content and subsequently terminating access to the protected content. For additional security, content can be embedded with user identifying information in the form of a watermark. Further, such user identifying information can be provided to a content owner identifying one or more users who viewed the content. | 12-11-2014 |
20140366160 | Application Marketplace Administrative Controls - The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace. | 12-11-2014 |
20140366161 | Management of Application Access - Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls and/or other security settings relating to application programs. Additionally, or alternatively, particular functions and/or functionality associated with application programs may be individually configured. Settings reflecting the access controls and/or other security settings can be stored and can be applied at the user device. The security management application also can be configured to determine if security settings and/or access controls are to be overridden. Data can be collected from various sensors and/or other sources to use in determining if particular application programs and/or application program functionality is to be allowed. Thus, normally disallowed activities can be allowed in emergency conditions, when in a business location associated with a particular device, and/or at other times and/or under other circumstances. | 12-11-2014 |
20140373175 | ON-DEMAND CUSTOM ENTITLEMENT CARDS FOR PRODUCTS AND SERVICES - An entitlement card can be assigned a product key real-time to provide a custom order of benefits including product and/or service, amount, and time. A method facilitating product key assignment for an entitlement can include receiving a request for activating a custom entitlement product key from, for example, a point of purchase. The request includes a request for particular benefits to a redeemer, including the particular product and/or service to be provided and the quantity and time period for the product and/or service. The method further includes assigning the benefits to the product key at the time of the request and activating the product key, which may be later redeemed for the assigned benefits. | 12-18-2014 |
20140373176 | PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS - A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. The computer executes a search using the modified list of search terms. The computer identifies a search result that includes the first type of field which further includes a search term that is included in the modified list of search terms. | 12-18-2014 |
20140373177 | PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS - A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. The computer executes a search using the modified list of search terms. The computer identifies a search result that includes the first type of field which further includes a search term that is included in the modified list of search terms. | 12-18-2014 |
20140373178 | Method, Apparatus and Server for User Verification - The present disclosure discloses a method, apparatus, and server for user verification to store a plurality of pictures in a database and define a plurality of rotational directions. The method includes: when receiving from a client a request for a checkcode, rotating a picture retrieved from a database according to a defined rotational direction; after storing a correlation between an identification of the client and the rotational direction of the retrieved picture, outputting the rotated picture to the client; receiving a rotational direction of the picture from the client; finding the stored correlation between the identification of the client and the stored rotational direction of the retrieved picture according to the identification of the client; determining whether or not the rotational direction of the picture returned from the client matches the stored rotational direction. If they match, user verification is passed; otherwise, the user verification is failed. The large number of pictures in the database makes it difficult for enumeration. In addition, by using the rotational direction as identification information to verify user, the safety and accuracy of user verification can be enhanced. | 12-18-2014 |
20140373179 | Method for Scalable Access Control Decisions - Content access may be provided and processed by assigning responsibility for obtaining entitlement data to the client's browser. Thus, in one example, the client may be configured to synchronize and coordinate data lookups associated with a content request, rather than relying on the server to do so. The network architecture may use a mediator design pattern, in which the client's browser acts as the mediator (i.e., middleman) between a content server and an entitlement data server. Accordingly, synchronous calls between server-side services might not be required. Instead, data necessary for the content server to process a client request for access to protected content may be received in the incoming request from the client's browser. | 12-18-2014 |
20140373180 | SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT - Systems and methods enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity. | 12-18-2014 |
20140380505 | Access Control for Personalized User Information Maintained by a Telematics Unit - A system and method are described herein that enable a vehicle user to establish, store (in a limited access storage location), and restore personalization information for the vehicle user on a vehicle. In particular the system manages personalization information to configure settings for a registered vehicle user in a vehicle including a telematics unit. The system is configured to carry out the method including establishing, for the registered vehicle user, a personalization information dataset within a networked vehicle user database. The system is further configured to submit a request to download the personalization information dataset from the networked vehicle user database, the request identifying the registered vehicle user and the vehicle. The system is also configured to download in accordance with the request to download, via a mobile wireless link to the telematics unit, values from the personalization information dataset to the telematics unit of the vehicle. | 12-25-2014 |
20140380506 | CONTROLLED DISTRIBUTION OF A VISUAL ASSET THAT INCLUDES IMAGES OF PARTICIPANTS - A system, method and a non-transitory compute readable medium for controlled distribution of a content of a visual asset that comprises an image of a participant, the method may include receiving a request to enable a certain viewer to receive the visual asset; selecting by a processor, in response to a characteristic of the certain viewer and in response to participant image access authorization metadata, a selected version of the visual asset to be provided to the certain viewer, out of a first version of the visual asset and a second version of the visual asset; wherein the first version of the visual asset comprises an identifiable image of the participant; wherein the second version of the visual asset comprises a non-identifiable image of the participant; wherein participant image access authorization metadata that allows access to the identifiable image of the participant requires an approval of the participant; and providing a response to the request that comprises the selected version of the visual asset. | 12-25-2014 |
20140380507 | INFORMATION MANAGEMENT SYSTEM AND INFORMATION MANAGEMENT METHOD - An information management system includes a registration information storing section, a permission information receiving section, and a registration information management section. The registration information storing section stores registration information for which a first user has a usage right. The permission information receiving section receives, from a second user not having the usage right for the registration information, input of usage permission information that is notified from the first user to the second user and for temporarily permitting the second user to check the existence of the registration information and to use the registration information. Based on the usage permission information, the registration information management section enables the second user to check the existence of the registration information and to use the registration information. | 12-25-2014 |
20140380508 | METHOD AND SYSTEM FOR AUTHENTICATING USER IDENTITY - Embodiments of the present application relate to a method for authenticating user identity, a system for authenticating user identity, and a computer program product for authenticating user identity. A method for authenticating user identity is provided. The method includes generating a first verification code by a server, displaying the first verification code to a user in an application scenario of a service requiring user identity authentication, receiving a second verification code sent by the user via another application that is other than the application scenario, comparing the second verification code sent by the user and the first verification code generated by the server, and determining whether the user has passed identity authentication based on a result of the comparison. | 12-25-2014 |
20140380509 | Even More Subscription Media On Demand - An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorizations. Encrypted user-selected files and a player program are transmitted to each customer for metered access to received data files as limited by the authorization, and customers can make additional selections and play the encrypted files freely while the authorization remains established. The system can transmit the data files from local storage, and also provide links to encrypted files that are stored at remote vendor facilities. Authorizations can be for selected portions or class levels of the catalog, and for terms measured as calendar time, play time, and collective number of plays. Also disclosed is a method for facilitating the distribution and accessing of electronic files. | 12-25-2014 |
20150020215 | CELL LEVEL DATA ACCESSIBILITY - Methods, systems, and computer-readable media for determining access rights for stored data are presented. Data tables may store data that is accessible to users. A request for explicit access to data may be received from a user. The system may determine the user's identity and further determine combined access rights based on the request for explicit access to data and the identity of the user. For example, implicit access rights for a user may be based on the identity. Based on the determined access rights, the system may retrieve data from the data tables. In an embodiment, the access rights may define that a first portion of a column is to be retrieved while a second portion of the column is to be restricted, or that a first portion of a row is to be retrieved while a second portion of the row is to be restricted. | 01-15-2015 |
20150020216 | SYSTEMS AND METHODS FOR ENABLING AN AUTOMATIC LICENSE FOR MASHUPS - Systems and methods for managing digital rights settings are provided. In some aspects, the systems and methods described include receiving user input including an order for obtaining access rights to a media asset. Control circuitry determines whether of media asset is associated with a first package of media assets. The control circuitry cross-references a database of user order history to determine whether the user has obtained access rights for each media asset in the first package of media assets. If the user has obtained access rights for each media asset in the first package of media assets, the control circuitry generates digital rights settings for each media asset in the first package of media assets to enable the user to create a mashup. The mashup includes portions of at least one media asset in the first package. The control circuitry generates a display based on the digital rights settings. | 01-15-2015 |
20150020217 | SYSTEM AND METHOD RELATED TO DRM - A system for controlling access to copyrighted data comprises, at least: a plurality of users having computers, each computer being assigned a unique identity and each computer being configured for communicating with external units via a core network; a core network operated by a telecommunications organization; an access handler configured to communicate with the computers via the core network and a communication interface configured for routing incoming data traffic to a first database; wherein the first database includes at least one table, in which table the unique identities of the computers are associated with access rights for each one of the unique identities, and the first database is configured to communicate with a second database and a third database/server; the second database includes copyrighted data material, and the second database is further configured to communicate via the core network with the computers for transferring requested copyrighted data material. | 01-15-2015 |
20150020218 | SYSTEM AND METHOD FOR PROVIDING A PERMANENT DATA RECORD FOR A CREATIVE WORK - System and method for providing a permanent data record for a creative work. In one embodiment, a process is provided to include receiving a request for a permanent data record to be issued for the creative work. The request can indicate a type of data record to be issued. Data corresponding to the creative work may also be received. The process can include generating the permanent data record using the received data, such that the received data is unalterable. Further, the permanent data record can be associated with the creative work. | 01-15-2015 |
20150026823 | METHOD AND SYSTEM FOR ENTITLEMENT SETTING, MAPPING, AND MONITORING IN BIG DATA STORES - A method and system for securing sensitive data content in big data stores is provided. In an example method, entities within the big data store that contain sensitive data are identified. Then, users who have entitlement to access these sensitive entities are identified, along with their level of entitlement. Access controls are then set, based on which users can operate on the sensitive entities. Access or attempts to access these entities is monitored on an ongoing basis. An example system maps entitlement to entities within the big data store that contain sensitive content, to monitor access to these entities and to set access controls for users accessing the big data store. | 01-22-2015 |
20150026824 | DEVICE AND METHOD FOR PROVIDING USER ACTIVITY INFORMATION IN PORTABLE TERMINAL - A device and a method for providing user activity information in a portable terminal are provided. The method includes receiving and storing log data from a specific application, generating user situation information representing a current status of a user based on the stored log data, and transmitting the generated user situation information to the specific application. | 01-22-2015 |
20150026825 | METHOD OF NAVIGATING THROUGH DIGITAL CONTENT - Electronic publications are increasingly replacing physical media, where standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with a method of navigating electronic content comprising the ability to generate a user interface that supports individual page turns as well as small, moderate and large adjustments of position within the electronic content, wherein the user interface supports these adjustments in a manner that is consistent. The method further comprising the ability to receive an indication of an action by a user relating to an adjustments of position within an item of multimedia content rendered on a display device; determine a characteristic of the action; determine a first action relating to the retrieval of additional content of the item of multimedia content based on the characteristic of the action; and determine a predetermined subset of a plurality of objects to render to the user based on the characteristic of the action. | 01-22-2015 |
20150033364 | Method and Apparatus for the Protection of Application Software - A method for the protection of an application comprises: receiving a command for locking the specified application; extracting user's biometric information; using the user's biometric information to lock the specified application. Furthermore, an apparatus for the protection of an application comprises: a receiving module, a extraction module and a locking module. In the invention, the user's biometric information is obtained and used to lock the specified application, so that the specified application can be locked and the user can use other applications conveniently; furthermore, the protection of the specified application is also improved. | 01-29-2015 |
20150040245 | PRIVACY-PRESERVING MATCHING SERVICE - Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute-based matching. | 02-05-2015 |
20150047053 | SERVER, TERMINAL, AND TRANSFER METHOD FOR DIGITAL CONTENT UNDER COPYRIGHT PROTECTION - A server, comprising a communication unit for receiving a user identifier and a unique identifier of digital content to be transferred from a first terminal, and feeding back intermediate information to the first terminal, and for receiving intermediate information and second terminal device information from a second terminal, and sending a license to the second terminal; a rights acquisition unit for acquiring rights information of the digital content to be transferred; a generation unit for generating the intermediate information; an authentication unit for authenticating the intermediate information from the second terminal; a license generation unit for generating a license. Information may be generated according to user identifier of the transferor and rights information of the digital content. The acceptor may gain use rights of the digital content based on received intermediate information, so that transfer flow of the digital content is optimized, leading to more convenient user operations. | 02-12-2015 |
20150047054 | METHOD AND SERVER FOR PROVIDING ONLINE GAME CONTROL SERVICE - Disclosed is a skill for intercepting access to a game server by users who are under a predetermined age when a game access time reaches a predetermined time. A method for providing an online game control service includes: by a game management server, determining whether a present time belongs to a time range between a predetermined first time and a predetermined second time that is prior to the predetermined first time; searching users who are accessing the game management server and are under a predetermined age when the present time is included in the time range; and intercepting access to the game management server by the searched users who are under the predetermined age when the present time reaches the predetermined first time. | 02-12-2015 |
20150047055 | MESSAGE DISTRIBUTION CONTROL - A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content. | 02-12-2015 |
20150047056 | PRIVACY SELECTION BASED ON SOCIAL GROUPS - A method of setting privacy level values for a user. The method includes receiving a designation of a relative privacy level for the user and receiving a selection of a group of other users for the user. Plural sets of privacy level values are associated with the group of other users. The method also includes setting privacy level values for the user based on the designation of the relative privacy level and the plural sets of privacy level values associated with the selected group of other users. | 02-12-2015 |
20150047057 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester. | 02-12-2015 |
20150052619 | PRIVACY CONTROL-ADJUSTABLE VEHICLE MONITORING SYSTEM WITH A WILD CARD MODE - A novel privacy control-adjustable vehicle monitoring system and a related method of operation provide a dynamically-adjustable access grant or denial of privacy-sensitive vehicle information to a vehicle monitoring personnel based on a driver's response to an electronic request made by the vehicle monitoring personnel. In one embodiment, vehicle information is categorized into a mandatory disclosure dataset and a privacy-adjustable dataset, wherein the mandatory disclosure dataset is disclosed to the vehicle monitoring personnel at all times, while the privacy-adjustable dataset is accessible if the driver grants access via a driver's user interface on an onboard vehicle user interface, or on a mobile electronic device. Furthermore, a special wild card mode visible to the driver enables the vehicle monitoring personnel to access an entire set of vehicle information for a limited period per access and for a limited number of accesses per period, based on a pre-arranged consent with the driver. | 02-19-2015 |
20150052620 | MANAGEMENT OF USER RIGHTS TO MEDIA CONTENT - In one example embodiment, a server includes a receiver configured to receive, from a first device, a request to issue user rights to media content; a user rights divider configured to divide full user rights to the media content into a plurality of user sub-rights to the media content; and a user rights manager configured to issue one or more of the plurality of user sub-rights to the media content to a user account authenticated on the first device. | 02-19-2015 |
20150059002 | Mobile Information Gateway for Service Provider Cooperation - A mobile information gateway comprises a wearable human interface module having an image delivery and display mechanism for presenting information overlaid upon a wide field of view, a computing and communication module adapted receive information from the human interface module and adapted to send commands and information to the human interface module including information for presentation; and a backend service server coupled for processing data from the computing and communication module including user identification and verification. The present invention also includes a method for using the mobile information gateway for augmented use by employees interacting in the back office of a financial services company and comprises capturing information with a first human interface module; processing the information captured by the first human interface module; retrieving a set of shared information based upon the processing of the information captured by the first human interface module; presenting the shared set of information overlaid upon a field of view of the first user using the first human interface module; and presenting the shared set of information overlaid upon a field of view of the second user using a second human interface module. | 02-26-2015 |
20150059003 | System and Method for Identity Management - A computer-implemented method includes: receiving a request for associating a first index of privileges and permissions with an identity token, the first index specifically encoding the privileges and permissions of a first subscriber in accessing transactional data of the requester, the request including the identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to determining that the identity token is valid and verifying that the requester is the person identified by the identity token, associating the first index of privileges and permissions of the first subscriber with the identity token; and providing the identity token associated with the first index of privileges and permissions of the first subscriber, the identity token enabling the first subscriber to access transactional data of the requester in accordance with the first index of privileges and permissions. | 02-26-2015 |
20150059004 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CREATION, TRANSMISSION,AND TRACKING OF ELECTRONIC DOCUMENT - A system for creating and delivering a locked electronic document in a computing environment includes a computer readable system memory comprising at least one program module, a bus coupled to the computer readable system memory, a processor coupled to the bus, and program instructions stored on the system memory for execution by the processor. The program instructions create a lead sheet having a unique embedded identifier, add a payload to the lead sheet to form the electronic package, add a blanking layer to the electronic package to obscure the payload from view of a recipient, send the electronic package in the computing environment to a designated recipient, validate the designated recipient's identity, and remove the blanking layer in response to validating the designated recipient's identity, thereby allowing the recipient to view the payload. | 02-26-2015 |
20150067889 | Entitlement Predictions - Systems, methods, and devices for predicting entitlements to computing resources. An entitlement associated with a user of a computer system may be identified. The entitlement may indicate a computing resource of the computer system that is accessible to the user. A set of attributes associated with the user may be selected, and an entitlement probability value may be obtained. The entitlement probability value may be based on the set of attributes and indicate a probability that the user is authorized to have the entitlement. The entitlement probability value may be used to determine whether to include the entitlement in an access review. Depending on the entitlement probability value the entitlement may be included in the access review or excluded from the access review. | 03-05-2015 |
20150067890 | IDENTIFICATION SYSTEM - The invention concerns a method of identification of a person to be identified, comprising: receiving, from an input device ( | 03-05-2015 |
20150074823 | SERVER, TERMINAL AND DIGITAL COPYRIGHT MANAGEMENT METHOD - The present invention provides a server comprising: a selection unit configured to select a target content from each digital file among a plurality of digital files according to a selection instruction received from a terminal; an extraction unit configured to extract privilege information corresponding to the target content from file key information corresponding to each digital file among the plurality of digital files, so as to obtain a plurality of privilege information; an authorization information generation unit configured to generate authorization information according to the plurality of the privilege information; and a processing unit configured to, when an authorization request is received from the terminal, transmit the authorization information to the terminal so that the terminal performs predetermined operations on the target content according to the authorization information. The present invention further provides a terminal and a digital copyright management method. | 03-12-2015 |
20150074824 | SECURE DATA STORAGE APPARATUS AND SECURE IO APPARATUS - A secure data storage apparatus capable of independently holding security information within a hardware device of the storage apparatus, and of implementing write prohibition and read prohibition of data is provided. As means for specifying security such as write prohibition/write inquiry/read prohibition/read inquiry for data of a given size or a given number of pieces of data, a storage component for holding security information is prepared in addition to a storage component for holding data. For each unit of storage of the storage component for holding data, corresponding security data is held in the storage component for holding security information. In this way, in response to occurrence of a request to access data, security information corresponding to a storage area for holding the data is referred to, and an operation is performed in accordance with the security information. | 03-12-2015 |
20150074825 | SYSTEM AND METHOD FOR CONTROLLING PRIVACY SETTINGS OF USER INTERFACE WITH INTERNET APPLICATIONS - A system and method for controlling access to a user's account has a graphical user interface for displaying content on the user interface, a display window in the user interface for displaying content from at least one content source associated with the user's account, and a plurality of profile access modes selectable by the user for determining the scope of the user's access to the account, including a limited profile access mode for limiting the scope of user's access to the account and the content visible on the account. The system also has an identifier associated with the limited access mode. When the user attempts to access the account from a source associated with the identifier associated with the limited access mode, the user's account is accessible only through the limited profile access mode. | 03-12-2015 |
20150074826 | AUTHORIZATION INFORMATION MANAGEMENT SYSTEM, ELECTRONIC DEVICE AND METHOD FOR MANAGING AUTHORIZATION INFORMATION - According to one embodiment, an authorization information management system has a first electronic device and a second electronic device. The first electronic device and the second electronic device are configured to communicate with each other. The first electronic device is configured to store first authorization information in the second electronic device and not in the first electronic device. The first authorization information the first authorization information is indicative of authorization by a user to access data used for a service provided by a server on a network and is issued to an application installed on the first electronic device by the server. | 03-12-2015 |
20150074827 | ELECTRONIC DEVICE, SYSTEM AND METHOD FOR SECURING DATA - An electronic device capable of securing data is provided. The electronic device includes a storage device for storing data and a number of securing strategies. Each of the securing strategies includes a securing condition for triggering a data securing action and one or more identifiers of the data to be secured. If the electronic device determines that a securing condition is met, the electronic device secured the data having the one or more identifiers corresponding to the met securing condition. A data securing system and method are also provided. | 03-12-2015 |
20150074828 | METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO RESOURCES AND PRIVILEGES PER PROCESS - To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process. | 03-12-2015 |
20150074829 | Mechanism for Facilitating Management of Data in an On-Demand Services Enviroment - In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one embodiment and by way of example, a method for facilitating management of data in an on-demand services environment is provided. The method of embodiment includes detecting an attempt by a user to manipulate data via a collaboration application at a computing system, wherein the attempt includes attempted deletion of the data posted for viewing using the collaboration application. The method may further include determining whether the user is authorized to manipulate the data, and blocking the attempt if the user is not authorized to manipulate the data. | 03-12-2015 |
20150074830 | METHOD AND APPARATUS FOR IDENTIFYING INSTALLED SOFTWARE AND REGULATING ACCESS TO CONTENT - A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is received for secure content from a user device and the integrity of the environment of the user device is verified. Appropriate usage rights are retrieved based upon the results of the verification of integrity and the content is rendered on the user device in accordance with the appropriate usage rights. | 03-12-2015 |
20150074831 | Method and System for Federated Over-the-Top Content Delivery - A method is provided for managing over-the-top delivery of content through a plurality of content delivery networks (CDN). The method provided works transparently with standard HTTP servers supporting an initial request for content from a client to a first preferred CDN. If the first CDN does not have the content, the method includes provisions for the first CDN to acquire the content from a second CDN, or for the client to request the content from a second CDN directly. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method. | 03-12-2015 |
20150082459 | GEOLOCATION WITH CONSUMER CONTROLLED PERSONALIZATION LEVELS - A geolocation system provides for multiple levels of privacy authorization allowing flexible use by consumers who wish to obtain the benefits of localized product information promotion, balanced against a desire for precise control of their personal information. The geolocation system in one embodiment may convert scattered location data into continuous consumer trajectories to attain more accurate readings of consumer activity including dwell time, heat maps and customer conversions between different locations. | 03-19-2015 |
20150082460 | GATEWAY-BASED AUDIT LOG AND METHOD FOR PREVENTION OF DATA LEAKAGE - A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection module configured to validate and reconstruct commands received from the server and to transmit the validated reconstructed commands, the protection module further configured to create a security image associated with a specific user; and a secured transmission module configured to transmit the security image to the server while ensuring that the security image is sent securely to the associated user, wherein the server is further configured to receive the security image via the secured transmission module and to present the security image to the associated user. | 03-19-2015 |
20150082461 | EVENT DRIVEN PERMISSIVE SHARING OF INFORMATION - Event driven permissive sharing of information is disclosed. In an aspect, user equipment can include information sharing profiles that can facilitate sharing information with other devices or users, such as sharing location information. The information sharing profiles can include trigger values, such that when a target value transitions the trigger value, a permission value is updated to restrict or allow access to sharable information. As such, event driven permissive sharing of information allows for designation of temporary friend information sharing with user-defined triggers. | 03-19-2015 |
20150082462 | Selective Content Accessibility in a Social Network - A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select how content will be published and control the accessibility of uploaded content using a privacy setting for each content item that the user posts. The privacy setting defines, or identifies, the set of connections who may view the posted content item. The posted content item is placed in a particular communication channel in the social networking service, such as a newsfeed or stream, where the content item can be viewed by those who are permitted to view it according to its associated privacy setting. Varying granularities of privacy settings provide flexibility for content accessibility on a social networking service. | 03-19-2015 |
20150082463 | MEDIA RIGHTS MANAGEMENT ON MULTIPLE DEVICES - Media rights are managed to include not just device authentication, but to include elements of user, device, and service authorization. A user can play media on a mobile device, continue playing the media on a desktop computer, and subsequently move to a large screen television and media rights are automatically identified to provide the most appropriate authorized content. This allows an authorized user to seamlessly access different forms of the same content on a variety of authenticated devices using the same digital rights management mechanisms. | 03-19-2015 |
20150082464 | SECURITY ADAPTER PROGRAM AND SECURITY ADAPTER APPARATUS - A security adapter apparatus according to embodiments includes a reception unit, a first manipulation unit, a delivery unit, and a transmission unit. The reception unit receives a request message that specifies a service name from the external application unit. The first manipulation unit searches the first storage unit based on the service name in the received request massage and manipulates the request message so that the request message contains an application name resulting from the search as a destination. The delivery unit delivers the manipulated request message to a first common bus. The transmission unit transmits a transmission message to the external application unit when the transmission message is received from one of the internal application units via a bus connection adaptor and the first common bus. | 03-19-2015 |
20150089668 | IDENTITY-BASED CONTENT ACCESS CONTROL - In embodiments, apparatuses, methods and storage media are described that are associated with performing identity-based access control for content. A content consumption device may be configured to control access to presented content based on identities of one or more content consumers that are physically proximate to the device. The content consumption device may be configured to perform facial and/or voice recognition on one or more content consumers to determine an identity for the one or more content consumers. The content consumption device may be configured to determine access permissions for the identified content consumers. At various times, access to a piece of content may change based on who is physically proximate to the content consumption device. Other embodiments may be described and claimed. | 03-26-2015 |
20150089669 | CONTENT PROVISION DEVICE, CONTENT PROVISION METHOD, PROGRAM, AND RECORDING MEDIUM - Content suitable for a user is provided to an information processing terminal that is confirmed to be used by the user. An accepting unit accepts an access from a user terminal. A determining unit determines whether or not to provide the user terminal with the content suitable for the user based on a length of a period from a previous access to this access of the user terminal. A processing execution unit executes processing for providing the user terminal with the content in a case where it is determined to provide the user terminal with the content suitable for the user. | 03-26-2015 |
20150089670 | APPARATUS, SYSTEM AND METHOD FOR MANAGING ELECTRONIC CONTENT LICENSES - For a particular content item duly acquired by a user is registered user information including user identification information, content identification information and model information and apparatus ID of each apparatus authorized to use the content item. For a same model, the user can be granted an authorization to use the content item in a plurality of apparatus of different apparatus IDs. In requesting an additional authorization to use the content item in a new target apparatus, the user sends to a license manager a request including model information and an apparatus ID of the target apparatus. Even where the authorization to use the particular content item has already been granted to another apparatus of a given model up to a predetermined maximum usable number, a further authorization is grantable to the target apparatus of another model than the given model, taking into account the model information included in the request. | 03-26-2015 |
20150089671 | DELIVERING AUTHOR SPECIFIC CONTENT - Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream. | 03-26-2015 |
20150096052 | Children's Online Personal Info Privacy Protection Service - A children's online personal information privacy protection service is disclosed, implemented in one embodiment within a Home Subscriber Server (HSS) of an IMS communication network. The HSS maintains service profiles including child user flags identifying which users are child users; and the service profiles for child users includes items of child user personal information content and access authorization data. The access authorization data is adjustable based on parental consent to allow or disallow access to certain network entities. When queried for information content by a network entity, the HSS consults the child user flag to determine whether the query relates to a child user, and if so, controls access to the information content based on the access authorization data. | 04-02-2015 |
20150096053 | Method And Apparatus For Managing Access To Electronic Content - According to at least one example embodiment, a method and corresponding content protection server for managing access to electronic content comprise retrieving access policies, or permissions, associated with a content item from a corresponding content sharing application, or rights issuer. The access policies are translated into a format recognizable by a digital rights management (DRM) engine, and forwarded to the DRM engine. The translated access policies are then provided by the DRM engine to a client device where the translated access policies are enforced in managing any potential access to the content item. | 04-02-2015 |
20150096054 | System And Method For Processing User Rights - A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a request for playback of the content at a second time, and processing a user right associated with the content to authenticate the user right in response to the request for playback, wherein the user right is authenticated based upon a state of the user right at the first time. | 04-02-2015 |
20150096055 | Monitoring Digital Images - Digital images are monitored by enabling access to a digital image, receiving a notification associated with the digital image from a first user, and regulating access of the first user to the digital image based on the notification received from the first user. | 04-02-2015 |
20150101063 | INFORMATION PROCESSING APPARATUS AND METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes the following elements. A checking unit checks whether or not a position of a user is outside the premises of an organization to which the user belongs. A first obtaining unit obtains, if it is checked that the position of the user is outside the premises, information specifying documents which are stored in a document management device disposed on the premises and which are allowed to be used by the user, instead of obtaining the content of the documents. A presenting unit presents a list of the documents. A selector selects a document from among the documents in the list in accordance with an operation of the user. A second obtaining unit obtains the content of the selected document from the document management device. A providing unit provides the obtained content of the document to an output device which outputs the content of the document. | 04-09-2015 |
20150101064 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - There is provided an information processing apparatus including an image acquisition unit configured to acquire a photographed image, an image transmission unit configured to transmit the photographed image as a shared image, an instruction information reception unit configured to receive instruction information on operation of a user who performs imaging, which is acquired as a response to the shared image, and an instruction information output unit configured to output the instruction information to the user. | 04-09-2015 |
20150101065 | USER CONTROLLED DATA SHARING PLATFORM - A method of controlling access to stored data is provided. In one embodiment, a method of controlling access to stored data comprises receiving a request from a recipient to access to the stored data, where the stored data is associated with an individual. The method may also comprise notifying the individual of the request to access the stored data. The method may also comprise requesting authorization for the recipient to access the stored data. The method may also comprise receiving a response from the individual regarding authorization to access the stored data and, upon a determination that authorization is granted, allowing the recipient access to the stored data. In one embodiment the method is configured to be implemented on a computing device with a processor. | 04-09-2015 |
20150101066 | SYSTEM AND METHOD FOR THE DISPLAY OF RESTRICTED INFORMATION ON PRIVATE DISPLAYS - The present invention is directed to a system and method for restricting data, or portions thereof, to specific display devices when accessed by a user. Furthermore, the system and method of the invention are directed, in part, to evaluating in real time, the access level of a device and restricting the availability of sensitive information on the device according to the access level as determined by device location and hardware configuration. | 04-09-2015 |
20150101067 | SYSTEMS AND METHODS FOR DYNAMIC ACCESS TO PROGRAM FEATURES - The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that determines which features are to be made available to a particular user. The server system may send the feature access information to the user such that the information is accessible to the multimedia client program. The multimedia client program may dynamically control the user's access to the program's feature set by using the feature access information to validate and verify the user. In addition, the feature access information may be accessible to the server system, such that the server system may periodically update the feature access information, such as, for example, when the user accesses the server system to download multimedia content. | 04-09-2015 |
20150101068 | SYSTEMS AND METHODS FOR LOSSLESS COMPRESSION OF DATA AND HIGH SPEED MANIPULATION THEREOF - The present disclosure includes a system, method, and article of manufacture for lossless compression of data and high speed manipulation of the data. The method may comprise associating a customer with a plurality of levels, and counting, in near real time, a number of transactions at each level in the plurality of levels based on a transaction history of the customer at each of a plurality of merchants. The method may further comprise counting the number of transactions during a time period. Similarly, the method may comprise determining an opportunity comprising an offer based upon the counting, determining an opportunity based upon a count indicating a transaction by the customer with a merchant, and/or determining an opportunity with a first merchant based upon a count indicating a transaction by the customer with a second merchant. | 04-09-2015 |
20150106956 | SYSTEMS AND METHODS FOR DYNAMIC ACCESS TO PROGRAM FEATURES - The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that determines which features are to be made available to a particular user. The server system may send the feature access information to the user such that the information is accessible to the multimedia client program. The multimedia client program may dynamically control the user's access to the program's feature set by using the feature access information to validate and verify the user. In addition, the feature access information may be accessible to the server system, such that the server system may periodically update the feature access information, such as, for example, when the user accesses the server system to download multimedia content. | 04-16-2015 |
20150113666 | PROTECTING DISPLAY OF POTENTIALLY SENSITIVE INFORMATION - The security and privacy of a user is enhanced by distinguishing between potentially sensitive information and non-sensitive information being displayed on a display of a computing device. In an embodiment, potentially sensitive information on a display is identified by parsing information to be displayed. A front-facing camera of the user's computing device is used to monitor the user's background and compare any changes to a threshold amount. In response to a detected change in the background, actions are taken to alert the user or reduce the visibility of identified potentially sensitive information shown on the display screen. | 04-23-2015 |
20150121546 | Device and Process for Restricting Access to Features on Electronic Devices Based on the Size of the Surface Area of the Finger and Other Factors - An electronic device configured to restrict access to features includes a processor configured to execute instructions and a display device configured to generate an interface based in part in response to the processor. The electronic device further includes a touch screen associated with the display device and configured to sense a user input, wherein the input is provided to the processor, a memory configured to store the instructions to operate the electronic device, the processor further configured to determine at least one of a physical aspect of the user input and a user interaction with the electronic device, the processor further configured to execute a plurality of features associated with the electronic device, and the processor further configured to disable some of the features based on the determination of at least one of a physical aspect of the user input and a user interaction with the electronic device. | 04-30-2015 |
20150121547 | System and method for peer-to-peer lending of digital content within an expanded social network - The invention is directed toward a system and method for peer-to-peer lending of digital content within an expanded social network. The invention provides for systems and methods for the searching of users with a particular digital content, displaying the digital content owned by users within a borrowers' expanded social network, requesting of the loaning of the digital content from lender(s), and the tracking of loaned digital content, either connected to a network or via in-person transfer of digital content. In addition, embodiments of the present invention provide systems and methods to allow for the borrower to add and share annotations (such as notes or multimedia annotations) to the digital content. The system comprises a client computer connected to a server computer with a database through the internet, an interface software module, a social networking software module, a content management software module, and a user annotation software module. | 04-30-2015 |
20150121548 | System and method for protected publication of sensitive documents - Protected publication of sensitive documents with authentication and accountability enables storing and sharing confidential files, while reducing risk that a recipient will distribute and share the file information with unauthorized recipients. Every user request for an original file generates a unique provided file based on the original file, the user request, and configuration information. The provided file has characteristics that make the provided file based on a first user request unique from any other provided file based on any other user request. Unique characteristics include changing the format of the original file to another format for the provided file, altering file properties, altering file content, and watermarking. | 04-30-2015 |
20150121549 | ACCESSING PROTECTED CONTENT FOR ARCHIVING - According to one embodiment of the present invention, a system for accessing protected content includes a first computing device with at least one processor. The system determines one or more users associated with information required to access content of a protected document based on a set of rules. A request is generated and sent to at least one second computing device associated with the one or more determined users to retrieve and utilize the required information to access the content of the protected document. Embodiments of the present invention further include a method and computer program product for accessing protected content in substantially the same manner described above. | 04-30-2015 |
20150121550 | DATA MANAGEMENT SERVER AND DATA MANAGEMENT PROGRAM - A processing right data management server includes an authority data DB that stores authority data, provides an organization list screen displaying a list of organizations in response to a request from a user terminal used by a user, receives from the user terminal an organization designated on the organization list screen, identifies the authority data corresponding to the designated organization, provides, according to the identified authority data, an authority setting screen configured to display a list of the business processes and processing rights corresponding to the business processes, receives, from the user terminal, settings change information regarding the processing right whose settings have been changed on the authority setting screen, and updates the authority data according to the settings change information regarding the received processing right. | 04-30-2015 |
20150121551 | SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS - In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted REK are received from an entity that generated a User Domain Authorization for the one of the RI and the LRM and the REK is used to generate a User Domain Rights Object (RO) that includes the User Domain Authorization and the encrypted REK. | 04-30-2015 |
20150121552 | SOFTWARE UTILIZATION PRIVILEGE BROKERING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a subscription service for documenting, verifying, administering, and auditing use of entitled software products in third-party networked computing environments (e.g., a cloud computing environment). Specifically, aspects of the invention provide an Entitlement Brokering System (EBS) (also referred to as an entitlement broker) that reduces the risk associated with clients improperly running licensed software products on their computing infrastructure, thus increasing the reliability and auditability of the software product's entitlement status and accelerating intake of new or existing clients through automation of the entitlement verification process. | 04-30-2015 |
20150128290 | DIGITAL COMMUNICATIONS - A device to apply a digital fingerprint to a digital signal comprises a means of intercepting or acquiring a signal, a storage element and a processor for executing computer implemented programme code components in the storage element to effect the methods. The methods include transforming a plurality of signal samples onto a discrete orthonormal basis and ranking the transformed samples according to their magnitude. The n largest principal components of the ranked transformed samples are optionally permuted to generate a re-ordered set of principal components, which are then altered by a marking angle. The marked principal components and unmarked non-principal components are converted and combined and applying an inverse of the transform function to the combined principal and non-principal components to generate a fingerprinted digital signal. Methods to prepare the signal for marking, recover the digital fingerprint and verify the distributor and/or recipients of the signal are also disclosed. | 05-07-2015 |
20150128291 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - There is provided an information processing apparatus including a user analysis unit configured to analyze a result of detection by a user detection apparatus that detects users neighboring a device and to acquire user attribute information indicating a characteristic of each detected user, and an interface control unit configured to control a mode of presenting information to be provided for the users, the mode being determined based on the user attribute information. | 05-07-2015 |
20150128292 | METHOD AND SYSTEM FOR DISPLAYING CONTENT INCLUDING SECURITY INFORMATION - A method and a system for displaying content including security information by using a Virtual Reality (VR) technology are provided. A method for displaying content by an electronic device includes a see-through-type display apparatus and may include connecting a communication channel to another electronic device having a display unit, receiving security information from the other electronic device, and displaying the received security information through the see-through-type display apparatus. | 05-07-2015 |
20150135332 | Deferred Delivery of Electronic Signature Agreements - Techniques for deferred delivery of electronic signature agreements are described. In one or more embodiments, a request is received for a user of a client device to provide an electronic signature on a document. Access to the document by the user of the client device is delayed until a predefined time. The document can be communicated to the client device at or before the predefined time. Additionally, the user of the client device is allowed to provide the electronic signature on the document at or after the predefined time. | 05-14-2015 |
20150135333 | METHOD AND APPARATUS FOR MANAGING SOFTWARE ENTITLEMENTS - A computer implemented method and apparatus for managing software entitlements. The method comprises receiving a user request to enable access to a first software product that requires a special entitlement, wherein the user is entitled to access one or more second software products that require a corresponding one or more general entitlements, and wherein the first software product and the one or more second software products are resident in a memory accessible via a single access portal; verifying a user entitlement to the first software product requiring the special entitlement; and providing a license to enable access to the first software product that requires the special entitlement and the one or more second software products that require the general entitlement. | 05-14-2015 |
20150135334 | METHOD OF ACCESS TO A LOCAL SERVICE OF A DEVICE COMMUNICATING VIA A TERMINAL - A method of access to a local service of a device communicating via a terminal, the method comprising steps of: access to the service via an access terminal by a communicating device; reading by the access terminal of data of the communicating device, the data being personal data relating to the communicating device and/or third-party service data; writing by the access terminal of the data of the communicating device, the third-party data written being chosen from among a set of third-party service data, the choice of the third-party data to be written by the access terminal being dependent on the choosing criteria. | 05-14-2015 |
20150135335 | COMPUTER SYSTEM AND METHOD FOR PROTECTING DATA FROM EXTERNAL THREATS - A system and method for protecting data from external threats includes a computer system having a plurality of input/output units, a key device that is removably mated with one of the input/output units, a processor, a local memory, a primary bulk storage device, a secondary bulk storage device, a first communication unit and a second communication unit. A method includes performing software and hardware verification of a first and second user password, and selectively engaging each of the bulk storage devices and communication units when the system is in one of a protected mode and an open mode. | 05-14-2015 |
20150143537 | Identification of Unauthorized Disclosure - Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a document may be generated and transmitted to a plurality of users. The document transmitted may be the same document (e.g., no additional documents are created for different users). Upon accessing the document, users in different groups of users may view different data items in a data item field in the document. If a disclosure is made, the data item disclosed may aid in identifying the group of users who viewed that data item and may be the source of the disclosure. That identified group may then be further sorted or divided into two or more subgroups and another document may be transmitted to the plurality of users. The process may continue in this manner until a source of the disclosure is identified. | 05-21-2015 |
20150143538 | Portable Eye-Controlled Device, Verification Device and Method, Computer Readable Recording Medium and Computer Program Product - The present invention provides a portable eye-controlled device, which is coupled to a security apparatus and is adapted to verify a user's authority, the portable eye-controlled device comprising: a displaying unit for displaying a password menu to perform a password entering procedure; an image-capturing unit for capturing an eye image of the user's eye; and a processing unit for analyzing the eye image to obtain an input string from the user and compare the input string with a predetermined safe password, wherein, processing unit generates a verification message to the security apparatus when the safe password matches the input string. | 05-21-2015 |
20150143539 | Method and System for Backing Up and Restoring License - A method for backing up and restoring a license is provided, which solves the problem of right proliferation in the prior art caused when an original license is transmitted to a user when a server restores the license. The method includes: backing up, at a server, license information of a first device, and associating the license information with a user identifier, the license information reflecting the current state information of a license when the first device reports the license information the last time; requesting, by a second device, the server to restore the license; and validating, by the server, a user identifier of the second device and the user identifier associated with the license information, and upon determination that the two user identifiers are consistent, generating a license based on the license information backed up, and transmitting the license to the second device. A terminal device, a server, and a license processing system are also provided. | 05-21-2015 |
20150143540 | SYSTEM AND METHOD FOR SELECTIVELY REDACTING INFORMATION IN ELECTRONIC DOCUMENTS - A computer implemented system and method is provided for imposing access controls on selective portions of electronic documents by defining data attributes as conditions for access to particular information in a document. Commands from a redactor identify at least one portion of an electronic document to be subject to access control. A set of selectable access control directives defining conditions for accessing the identified portions is presented to the redactor. Access control is imposed on the identified portions in accordance with the defined conditions in response to receiving the selective access control directives. | 05-21-2015 |
20150143541 | INFORMATION INPUT AND OUTPUT APPARATUS - There is provided an information input and output apparatus including a screen control unit that generates a screen which includes at least one region to input or output information, as a window, a display attribute storage unit that stores a display and a non-display of each of the windows on the screen, and a position and a size of each of the windows when the windows are displayed on the screen, as a display attribute for each window, a display unit that displays the screen generated by the screen control unit, and a contact position detecting unit that is disposed along a display surface of the display unit, and outputs a coordinate for each contact position to the screen control unit when contacts are simultaneously detected at a plurality of positions. The screen control unit determines a region that is formed by connecting a plurality of contact positions, on the basis of coordinate information of the plurality of contact positions acquired by the contact position detecting unit, and changes the display attribute of the window in accordance with the region. | 05-21-2015 |
20150143542 | LICENSING FOR SERVICES - A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service. | 05-21-2015 |
20150150147 | MANAGING RESTRICTED TAGGED CONTENT ELEMENTS WITHIN A PUBLISHED MESSAGE - A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface. | 05-28-2015 |
20150150148 | CONFIGURING AND CONTROLLING DIGITAL ECOSYSTEM OF DEVICES, USER PROFILES, AND CONTENT - Systems and methods are disclosed for accessing plural user profiles of respective users associated with an establishment, accessing device information pertaining to plural devices associated with the establishment, accessing content information pertaining to plural media content, receiving a user request for first content, and based at least in part on a first user profile and based at least in part on the content information, determining whether a first user associated with the first user profile is authorized to access the first content. Responsive to a determination that the first user is not authorized to access the first content, the request for first content is denied. Responsive to a determination that the first user is authorized to access the first content, a first device is identified that the first user is authorized to use and that can present the first content. | 05-28-2015 |
20150150149 | ELECTRONIC EQUIPMENT HAVING DISPLAY HAVING DIVIDED SCREEN AND CONTROL METHOD THEREOF - Provided is an electronic equipment, where divided display is performed and different user operates each screen, to protect privacy of showing contents. Accordingly, a permission user to whom access to privacy information made into a privacy protection object and its privacy information is permitted is set to privacy setup information. As for a privacy protection processing part, the divided display of the display screen of an operation part is performed, in case that a login user of a divided screen of one side differs from a login user of another divided screen of another side, when showing on one screen privacy information set as privacy setup information, an operation part is controlled to reduce a visibility of one screen. | 05-28-2015 |
20150150150 | SYSTEMS AND METHODS FOR LICENSING NON-DESTRUCTIVE TESTING CONTENT - A non-transitory computer readable medium may include executable instructions which, when executed by a processor, cause the processor provide for a repository of digital content and to create a first license based on the digital content. The instructions further cause the processor to transmit the first license and the digital content to a non-destructive testing (NDT) device, and wherein the digital content is configured to be executed by, used by, or displayed by the NDT device, or a combination thereof, based on the first license. | 05-28-2015 |
20150294092 | APPLICATION SECURITY FRAMEWORK - In accordance with the teaching described herein, systems and methods are provided for prodding secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token. | 10-15-2015 |
20150294097 | USER BIOMETRIC PATTERN LEARNING AND PREDICTION - A user device collects timing data that indicates screen touch timing behavior during multiple touch events associated with at least one of a hold time for a particular button or a transition time between two particular buttons. The user device also collects force data indicating screen touch force behavior during the multiple touch events. The user device identifies a user biometric pattern for the touch event based on the timing data and the force data, and stores the user biometric pattern. | 10-15-2015 |
20150294101 | RUNNING APPLICATIONS, AND AUTHENTICATING USERS - Various examples provide a method and an apparatus of running applications. When a user clicks on an icon of an application displayed on a touch screen, a fingerprint is collected. It is judged whether the collected fingerprint matches with a stored fingerprint. A user interface of the application is displayed if the collected fingerprint matches with the stored fingerprint. Various examples also provide a method and an apparatus of authenticating users. When a user clicks on an area for authentication in a user interface of an application displayed on a touch screen, a fingerprint is collected. It is judged whether the collected fingerprint matches with a stored fingerprint. It is determined the user has passed user authentication if the collected fingerprint matches with the stored fingerprint. | 10-15-2015 |
20150295934 | PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS - A computer generates a modified list of search terms by adding synonyms of the search terms and terms that are related to the search terms to a list of search terms. The computer removes frequently used words from the modified list of search terms. The computer responds to a determination that a user has authorization to view a field of a document by adding to the modified list of search terms an encrypted version of a search term included in a list of search terms. A search using the modified list of search terms returns a result that identifies the document as a search result when either the unencrypted or the encrypted version of the search term is found in a list of index terms associated with the first document. | 10-15-2015 |
20150302210 | SECURE DATA ACCESS - Embodiments for preventing data loss and allowing selective access data include systems and methods that determine that a file has been created or received; determine a fingerprint of the file, wherein the fingerprint is a record of the file for comparison to the file at a later time; determine at least one permitted use related to the file, wherein the permitted uses comprises a permitted user and a permitted action; determine that the file is being accessed by a user; determine whether the user is a permitted user of the file based on an identity of the user; compare the file to the associated fingerprint of the file when the user is a permitted user; determine the action being taken by the user when the file matches the associated fingerprint; and permit the action to occur when the action is a permitted action of the file. | 10-22-2015 |
20150302216 | SECURE ENDPOINT FILE EXPORT IN A BUSINESS ENVIRONMENT - Embodiments for preventing data loss in a business environment are provided. In some embodiments, a secure endpoint file export application assigns users to different classes having different permissions for accessing and writing data. In an embodiment, the system and method are configured to identify a plurality of users in a business environment; classify the plurality of users according to business needs; assign the users to one of at least two classes based on the classification; determine that the first user is permitted to access the data; transmit the secure file to a second user who is permitted to write the data in the secure file to removable media; write the data in the secure file to the removable media; and track a location of the removable media. | 10-22-2015 |
20150302223 | METHOD AND SYSTEM FOR ACCESSING CENTRALISED PATIENT DATA - A system and method is provided to allow access to centralised patient data captured from a medical device across an open network to a third party. The system and method receives the request based upon patient-specific information, checks the request and allows access if the request matches stored information. | 10-22-2015 |
20150304331 | SERVICE PROVISION SYSTEM - A user is provided with a service based on the user's private information while the information is kept secret from any provider involved in the provision of the service. A service provider provides a service using a result of an analysis performed based on two or more information items with respect to stored data. Data received from a user device and stored by a server are data after a process has been performed by using a secret parameter of the user on at least respective parts of data input for these two or more information items. This process is defined such that performing the analysis based on the two or more information items on data stored on the server produces the same result as performing the analysis based on the two or more information items on data input in the user device. | 10-22-2015 |
20150310188 | SYSTEMS AND METHODS OF SECURE DATA EXCHANGE - In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities, wherein computer data content and access rights for the computer data content is shared between a first and second user, the computer data content and access rights for the computer data content are transformed into a DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities. | 10-29-2015 |
20150310226 | Methods, Systems, and Products for Anonymous Loan Documents - Methods, systems, and products create anonymous loan documents. Electronic loan documents are prepared for a borrower of a loan. An anonymous shadow copy of the electronic loan documents is generated that removes personally identifying information, such as names, addresses, and social security numbers. The anonymous shadow copy of the electronic loan documents may then be electronically published. | 10-29-2015 |
20150310227 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - Disclosed are an information processing system and an information processing method which enable coordination of information pertaining to a user while taking security into consideration. The information processing system includes a cookie issuance unit | 10-29-2015 |
20150317485 | SYSTEM AND METHOD FOR DATA GOVERNANCE - A system for determining information about a resource. The system includes a profiler to generate a targeted subset of users for at least one selected resource according to at least one of: a pre-defined goal and usage statistics of the resource with respect to the goal; an addressor to request from the subset of users information regarding the goal and a collector to collect and analyze the information and to update attributes of the resource according to the information. | 11-05-2015 |
20150317486 | COMPUTER RELATIONAL DATABASE METHOD AND SYSTEM HAVING ROLE BASED ACCESS CONTROL - In a method of controlling access to secured data, a repository operatively coupled to one or more databases storing secure data is employed to intercept a user query of one database of the one or more databases. A user who generated the user query and a user role assigned to the user is automatically determined from the intercepted query. The intercepted query is parsed. Security information of the identified objects is looked up in a metamodel stored in the one or more databases. Based on the determined user role and the identified objects to be filtered out of the user query, an expression tree to filter out secure data is automatically built and the user query is modified by appending the expression tree to the user query. The modified query is applied to the one database. | 11-05-2015 |
20150324445 | Systems and Methods for Receiving, Aggregating, and Editing Survey Answers from Multiple Sources - A software-implemented method may receive, organize, and aggregate survey answers from multiple survey sources into a single database, regardless of the initial method of collection. Survey answers may require certain common information fields. The survey answers may include media which is transferred from the survey source to the database, and the original copy at the survey source deleted upon a completed transfer. A survey participant may access his own answer, associate it with a user account using a passcode, and make edits to the answer; the source of a survey may also edit an answer by resubmitting the answer. Edited answers may be displayed along with the original version, for instance in a “threaded” display format. | 11-12-2015 |
20150324552 | Share Restriction for Media Items - Embodiments are described herein that allow for applying a share restriction on a plurality of media items that is part of a playback queue. In one aspect, a method is provided that involves a first computing device (a) receiving input data indicating an instruction to share a playback queue, where the playback queue includes at least a plurality of media items, (b) determining one or more characteristics of the plurality of media items, where at least one of the one or more characteristics indicates a source of the plurality of media items, (c) based on the determined one or more characteristics of the plurality of media items, assigning to the plurality of media items a share restriction that limits access to the plurality of media items, and (d) transmitting to a second computing device an indication of the share restriction assigned to the plurality of media items. | 11-12-2015 |
20150324556 | CONTENT DELIVERY PRIORITIZATION IN MANAGED WIRELESS DISTRIBUTION NETWORKS - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 11-12-2015 |
20150324601 | Managed Wireless Distribution Network - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 11-12-2015 |
20150324603 | SOCIAL NETWORK SITE INCLUDING TRUST-BASED WIKI FUNCTIONALITY - A social network site with enhanced user interaction functionality. In particular implementations, a method includes receiving, at a social network site, a request from a first user for a personal page corresponding to a second user; transmitting a response to the request, wherein the response comprises the requested personal page of the second user, Wherein the personal page comprises one or more controls that enable modification of the personal page; responsive to an activation of the one or more controls by the first user, determining if the first user is included in a group of trusted users associated with the second user, wherein the group of trusted users are permitted to modify the personal page of the second user; and conditionally storing data characterizing modification of the personal page by the first user. | 11-12-2015 |
20150324605 | METHOD AND APPARATUS FOR SHARING CONTENT BETWEEN ELECTRONIC DEVICES - A method of a first device and an electronic device are provided. The method includes receiving a request signal related to contents stored in the first device from a second device communicatively coupled to the first device; transmitting the contents to the second device in response to the request signal, wherein the contents are security applied contents; and releasing the security of the contents by authenticating a user related to the contents. | 11-12-2015 |
20150326583 | MOBILE DEVICE, PROGRAM, AND CONTROL METHOD - When a pre-determined time period has elapsed after a user access is last detected, a mobile device performs protection processing on account-related information. The mobile device includes an access detection unit that detects that a user accesses the mobile device, and a time period determination unit that determines whether or not a pre-determined time period has elapsed from a last user access time point at which the user last accessed the mobile device. The mobile device further includes a storage location acquisition unit that acquires a location in the data storage unit in which the account-related information is stored, and a protection unit that performs the protection processing on the account-related information based on the storage location of the account-related information acquired by the storage location acquisition unit, when the time period determination unit determines that a pre-determined time period has elapsed from the last user access time point. | 11-12-2015 |
20150332061 | PREFERENCE-BASED MANAGEMENT INTERFACE FOR USE OF PORTABLE DEVICE APPLICATIONS AND ASSOCIATED METHOD OF USE THEREOF - A preference-based management interface for use on a portable electronic device, such as a wireless phone, a tablet, or any other device, and the associated method of use thereof, and more specifically the invention relates to a parental credit-based software interface that manages a child's cell phone or portable tablet applications using a credit-based system to allow a child to accumulate play time of favorite applications by accumulating credited time by using applications a parent has set up in the interface to promote use by the child. | 11-19-2015 |
20150332062 | Messaging Systems and Methods - A messaging system for providing messaging service between or among user accounts includes a message database server. The message database server includes an account module to maintain user accounts and an upload module to receive message data from a user communication device associated with a user account. The message data may include a message and a share list that authorizes identified user accounts in which the message is to be shared. A single instance storage module may store the message as a single instance. A share module may share the message with the identified user accounts and delete the message at a predetermined time as specified in the share list. | 11-19-2015 |
20150332063 | DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A document management apparatus includes a receiving unit and a granting unit. The receiving unit receives a document to which a first user has an access right and an action history of the first user. If the similarity between the action history of the first user and an action history of a second user is higher than or equal to a threshold value, the granting unit grants the access right to the document to the second user. | 11-19-2015 |
20150332065 | METHOD AND APPARATUS FOR CONTROLLING A BROWSER - A method and apparatus for controlling a browser are provided. The method includes: acquiring a characteristic identifier of a user; comparing the characteristic identifier of the user with a pre-stored benchmark characteristic identifier to determine whether the characteristic identifier is identical to the benchmark characteristic identifier; if the characteristic identifier is identical to the benchmark characteristic identifier, entering a pre-set private browsing mode wherein a browser plug-in saves the browsing history data of the user; and when the user completes the browsing, receiving an instruction from the user to close the plug-in and exit the private browsing mode. The method and apparatus for controlling a browser save the browsing data of a user in private browsing mode and prevent other users from accessing such data without the correct characteristic identifier. | 11-19-2015 |
20150339461 | PRESENCE-BASED CONTENT RESTRICTION - Systems and methods are provided for enforcing content restrictions. The provided systems and methods may include receiving presence data for a user associated with an electronic mobile device, where the presence data indicates a location of the user in a known area, receiving an identification of content either being accessed or requested to be accessed in the known area, accessing a store of policy data, the policy data including an identification of particular items of content and use restrictions thereon, identifying an applicable restriction on the content, the applicable restriction being selected from the store of policy data based on one or more of the presence data and the identification of content, and applying the applicable restriction on content in the known area. | 11-26-2015 |
20150339486 | SYSTEMS AND METHODS FOR FRONT-END AND BACK-END DATA SECURITY PROTOCOLS - A security framework and methodology is provided which provides front-end security through authentication and authorization, and back-end security through a virtual private data-store created within an insecure environment using existing object-relational mapping (ORM) layers or database drivers. The front-end security utilizes numerous multi-factor authentication metrics and a distributed denial of service (DDoS) cryptographic boundary to proactively attack malicious users using a cryptographic puzzle, and the back-end security provides data encryption and decryption, data privacy, data integrity, key management, pattern monitoring, audit trails and security alerts while simultaneously hiding the complexity behind an identical or similar ORM or database drive application programming interface (API). | 11-26-2015 |
20150339491 | DATA ALLOCATION AMONG DEVICES WITH DIFFERENT DATA RATES - An allocation instruction is received that includes a target data operand and a storage medium operand indicating a storage medium for storing the target data. A data dependency is identified that specifies metadata that includes access control information specifying which users have permission to perform a write operation to the file that includes the target data. In response to determining that the allocation instruction allocates the target data from a first storage medium to a second storage medium having a faster data IO rate, the allocation instruction is modified to also allocate the metadata specified in the data dependency to the second storage medium. In another aspect, the allocation instruction is modified to also allocate the metadata identified in the data dependencies to one or more storage mediums with data IO rates that are at least as fast as the second storage medium. | 11-26-2015 |
20150339493 | PRIVACY PROTECTION AGAINST CURIOUS RECOMMENDERS - A method and apparatus for protecting user privacy in a recommender system are described including determining what information to release to a user for a movie, transmitting the information to the user, accepting obfuscated input from the user and estimating the user's non-private feature vector. Also described are a method and apparatus for protecting user privacy in a recommender system including receiving movie information, accepting a user's movie feedback, accepting user's private information, calculating an obfuscation value and transmitting the obfuscation value. | 11-26-2015 |
20150339494 | SYSTEM AND METHOD FOR DYNAMICALLY CONTROLLED RANKINGS AND SOCIAL NETWORK PRIVACY SETTINGS - A system, method, and media for dynamically controlling rankings and privacy settings for a social network is presented. Upon receipt of an electronic communication from a second user of the social network directed to a first user of the social network, determining whether the first and second users of the social network are connected and determining whether the second user has been blocked from electronically communicating with the first user. in response to determining that the second user is not blocked, executing a ranking process on the second user, based on privacy level settings criteria pre-specified by the first user. The privacy level settings criteria includes preferred attributes of communicating users and a threshold ranking score and the ranking process compares the attributes of the second user to the privacy level settings criteria. Upon satisfying the threshold ranking score, the social network allows the electronic communication from the second user to be conveyed to the first user of the social network. | 11-26-2015 |
20150347595 | PERSONAL INTELLIGENCE PLATFORM - A personal intelligence platform uses a personal intelligence profile. A user can configure his or her mobile device to generate a signal containing portions of his or her personal information profile to obtain responses based upon the signal generated. | 12-03-2015 |
20150347719 | DIGITAL RIGHTS MANAGEMENT SYSTEM IMPLEMENTED ON A SCANNER - In a digital rights management system where a scanner is connected to a rights management server, the process of applying digital rights protection is performed by the scanner, rather than the server, so that scanning and document protection can be done even when the server is not available. Upon scanning a document, the operator selects a rights management policy to be applied to the digital document. The scanner generates a document ID, embeds the document ID as metadata in the document, encrypts the document, and stores the document ID, policy ID of the selected policy, and encryption key as an entry in a local document-policy association table on the scanner. The scanner uploads the above information of the digital document to the server, which stores the information in a document-policy association table on server and uses it to perform document access control. | 12-03-2015 |
20150347747 | SANDBOXING THIRD PARTY COMPONENTS - A method and apparatus of a device for security management by sandboxing third-party components is described. The device can determine whether a third-party component supports network access. If the third-party component supports network access, the device can request a user input regarding whether to restrict the network access of the component. The device can receive a user input to restrict network access of the third-party component. Upon receiving the user input to restrict network access, the device can construct a sandbox for the third-party component to restrict network access of the component and prevent the component from performing data exfiltration. Other embodiments are also described and claimed. | 12-03-2015 |
20150347764 | METHODS AND SYSTEMS FOR MODIFYING PARENTAL CONTROL PREFERENCES BASED ON BIOMETRIC STATES OF A PARENT - Methods and systems are described herein for a media guidance application that modifies parental control preferences based on the biometric state of a first user (e.g., a parent) and whether or not a change of the biometric state of the first user is caused by a second user (e.g., a child) that is subject to the parental control preferences. | 12-03-2015 |
20150347769 | PERMISSION REQUEST - To perform a restricted action, such as access a restricted content item, a subordinate user account can transmit a permission request to an authorizing user account. The permission request can request authorization from the authorizing user account to perform the restricted action. The permission request can be transmitted to one or more client devices of the authorizing user account, and enable to the authorizing user account to remotely select to approve or deny the permission request, thereby either granting or denying the subordinate user account from performing the restricted action. In addition to approving or denying a permission request, an authorizing user account can also be enabled to ignore a permission request, thereby allowing the authorizing user account to respond to the permission request at a later time. Further, in some embodiments, an authorizing user account can select to deny all further permission requests to perform the restricted action. | 12-03-2015 |
20150347784 | MANAGING USER INFORMATION - AUTHORIZATION MASKING - Systems, methods, and computer-readable medium are provided for managing user information. For example, data of the user may be stored in a memory. A request for a user to authorize access of at least a portion of the data may be provided. The authorization may be for an application to access the portion of the data. In some examples, a response to the request may be received, and an indication that the request was provided to the user may be provided without indicating whether the user denied the request. | 12-03-2015 |
20150347785 | SOCIAL NETWORK ROUTING - An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services. | 12-03-2015 |
20150350166 | METHODS AND SYSTEMS OF COMMUNICATING ANONYMOUSLY FOR ENHANCED NETWORKING BY USING SPECIFIC LOCATIONS WITHIN A SPECIFIC RANGE OF DISTANCE - A method and system for robust social networking enabling a subscriber to anonymously communicate with other anonymous subscribers when the subscriber is located within a specific geographical area with other subscribers. The method and system also restrict the subscriber to only view the data transmitted by other subscribers if the subscriber is not located within the specific geographical area with these other subscribers. That is, if the subscriber is not located within the specific geographical area with other subscribers who transmit the data, the method and system will not permit the subscriber to post the subscriber's own messages in response to the data posted by other subscribers. However, the subscriber can rate the data posted by other subscribers even if the subscriber is outside the specific geographical area. | 12-03-2015 |
20150350220 | CONTROL SETTINGS - One or more user accounts can be linked together to form a group of linked user accounts. A designated primary user account in the group of linked user accounts can be enabled to modify control settings for the subordinate user accounts in the group of linked user account. The control settings can dictate restrictions on the subordinate user accounts. For example, the control settings can define restrictions on the type of content that can be accessed, purchases that can be made, storage space allocated to the subordinate user account, etc. In some embodiments, the primary user account can be enabled to establish a set of control settings for a client device associated with the group of linked user accounts. The set of control settings can dictate restriction on content accessed by the client device and usage of the client device such as restrictions on phone calls, messages, data usage, etc. | 12-03-2015 |
20150356277 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 12-10-2015 |
20150356278 | Physical Confirmation for Network-Provided Content - A computer-implemented method includes receiving, from a remote communication device and at a server system, information that indicates a unique identifier for a physical item that corresponds to media content, the identifier differing from identifiers for other physical items that correspond to the same content; associating the received information with an account of a first user of a hosted internet service; and subsequently providing, by the hosted internet service, content that matches the content that corresponds to the physical item, based on a determination that the received information authorizes the first user to obtain the content provided by the hosted internet service. | 12-10-2015 |
20150356279 | METHODS AND SYSTEMS FOR MANAGING LICENSE DISTRIBUTION FOR SOFTWARE - Methods, computing systems, and computer-readable media include software license management. The method includes receiving, from a user, a request to use one or more software applications for a period of time. The one or more software applications are protected by access controls unlocked by one or more hardware dongles. The method also includes configuring, by one or more processors, a virtual machine that executes the one or more software applications for the period of time. The virtual machine is configured to request authorization to unlock the access controls for the one or more software application from a license server coupled to the one or more hardware dongles. The method includes providing, to the user, connection information for communicating with the virtual machine. | 12-10-2015 |
20150356287 | Methods, Apparatus and Computer Programs for Entity Authentication - An identity of an entity ( | 12-10-2015 |
20150356303 | DISSOLVABLE PROTECTION OF CANDIDATE SENSITIVE DATA ITEMS - Reducing risk of data loss by automatically background scanning a data set to detect a plurality of candidate sensitive data items. For at least some of those candidate sensitive data items that are deemed not to concretely classified as sensitive, a dissolvable encryption is applied to the data item to at least temporarily protect the data item. When the user requests access to the data item, the system determines that the data item has been dissolvably encrypted and that the user is authorized to define the sensitivity of the data item. In response, the user is allowed to direct the system as to whether the data item is to be concretely encrypted (such as if the user was to confirm the data item as sensitive), or whether the dissolvable encryption of the data item is to be dissolved (such as if the user was to confirm the data item as not sensitive). | 12-10-2015 |
20150356309 | Electronic Device and Method for Protecting Applications Thereof - Disclosed is a method for protecting application programs of an electronic apparatus. The electronic apparatus is provided with a touch screen, and stores a screen sharing program, other application programs, a prohibited list, a first touch track and a second touch track. The electronic apparatus runs the screen sharing program to share the screen, and senses a touch track of a user on the touch screen, when the first touch track is sensed, adds an application program corresponding to it into the list; when the second touch track is sensed, deletes an application program corresponding to it from the list; and when a point touch is sensed, searches for whether an application program corresponding to it is in the list, if yes, the screen sharing program stops screen sharing and then runs the application program; otherwise, the application program is run, and the screen sharing program performs normal screen sharing. | 12-10-2015 |
20150356312 | INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING APPARATUS - An information processing system configurable with one or more information processing apparatuses includes a minutes manager to manage a minutes, a communication controller to control a reception of loading data receivable from an information terminal, the loading data attachable with attached information, a display controller to control displaying of the loading data received by the communication controller on a display, an agenda switching detector to detect an agenda switching for marking an agenda boundary between agendas based on the attached information attachable to the loading data received by the communication controller, and an agenda information generator to generate agenda information for the agenda marked with the agenda boundary by the agenda switching detector. The generated agenda information of the agenda-boundary-marked agenda is associable with the minutes managed by the minutes manager. | 12-10-2015 |
20150356313 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Orgranization - A system which comprises a series of native applications, suited to run on mobile devices, and a series of web-based applications for which functionality and processing are optimized. The native applications and the web-based applications are coordinated to optimize processes of acquiring, storing and disseminating data for speed, integrity and security. | 12-10-2015 |
20150356315 | Unified ID - A unified ID system implementing a “single point” account in the Internet to allow a user to enter, aggregate, manage and control personal data is disclosed. | 12-10-2015 |
20150356316 | SYSTEM, METHOD AND PROGRAM FOR MANAGING A REPOSITORY OF AUTHENTICATED PERSONAL DATA - The present invention relates to a method, system and computer program for managing a repository of personal data and, more particularly, a repository of authenticated personal data. Among its many advantages, the present invention allows a user to control access to their personal data by third parties. In particular, the present invention may allow a user to control the parties with whom their personal data is shared and customise which elements of their personal data may be shared with each such third party. Furthermore, the present invention allows a user to specify a fee for sharing particular aspects of their personal data, thereby allowing the user to monetise their personal data assets and be remunerated for their contribution. | 12-10-2015 |
20150356317 | SYSTEM AND METHOD FOR PROVIDING SENSITIVE INFORMATION ACCESS CONTROL - A system and method enabling information access control of the sensitive information, based on a trust computing platform is provided. The trustworthiness of the information seekers is computed and accordingly the information owner is capacitated to decide upon sharing the information completely or sharing with some perturbation. The objective is to provide the information owner with the ability to decide on sharing its private data with respect to a parameter so that the decision is less subjective. This invention allows minimum leakage of sensitive data and makes information owner aware of the risk of privacy breach when private data is shared. | 12-10-2015 |
20150363579 | Life Cycle Management Of User-Selected Applications On Wireless Communications Devices - Tools and techniques for performing life cycle management of user-selected applications on wireless communications devices are described herein. In part, the tools provide machine-readable media for presenting to the subscriber a list of available applications for installation on the device, and for receiving selections from the subscriber of one or more of the applications. Additionally, the tools provide methods for selling advertising space on the devices. | 12-17-2015 |
20150363584 | Security Mode Prompt Method and Apparatus - Embodiments of the present disclosure disclose a security mode prompt method and apparatus. The method includes when it is determined that a terminal is currently in a first security mode, acquiring prestored first security information; receiving first verification information entered by a user, and establishing a first correspondence between the first security information and the first verification information; displaying confusion information, the first security information, and the first verification information on a screen for the user to select; receiving a selection result of the user, and determining, according to the first correspondence, whether the selection result of the user meets a preset rule; and when the selection result of the user meets the preset rule, prompting the user that the terminal is in a second security mode. By using the present disclosure, security of a terminal can be improved. | 12-17-2015 |
20150363605 | RECOGNIZABLY PROTECTING ELECTRONIC FILES - Systems, methods, and computer-readable storage media are provided for recognizably protecting electronic files, e.g., images. Electronic files are protected through association with permissions that permit or constrain authorized users from performing specifically delineated actions with respect thereto. Upon receiving a request to view a protected file, a low-fidelity artifact of the requested file is provided that is obfuscated to a degree sufficient to jog the memory of a user that has viewed the requested file previously but yet remains sufficiently unrecognizable to a user that has not previously viewed the file. Upon determining that at least one permission associated with the file is satisfied, a high-fidelity artifact of the file is provided that is void of obfuscation. Depending on the nature of the permissions associated with the file, the authorized user may take additional actions (e.g., copying, forwarding, saving, etc.) with respect to the electronic file as well. | 12-17-2015 |
20150365422 | AUTHORIZING CONTENT VIEWING BASED ON CONTENT RATINGS - Apparatuses, methods, and computer program products are included that receive a content rating for content presented to an individual, determine a content authorization parameter for the individual, and trigger a precautionary action associated with the content in response to determining that the content authorization parameter for the individual is not compliant with the content rating for the content. | 12-17-2015 |
20150370769 | SYSTEMS AND METHODS FOR MANAGING SUGGESTED EDITS IN A COLLABORATIVE DOCUMENT EDITING ENVIRONMENT - A document editor may manage suggested edits in a collaborative document. The document editor may instantiate a document model associated with the collaborative document. When a first editing suggestion is received for the collaborative document, a first suggestion command is associated with the first editing suggestion based on a type of the first editing suggestion and a type of the document model. The document editor may apply the first suggestion command on the document model to present the first editing suggestion within the collaborative document. When an acceptance indication for the first editing suggestion is received, the document model can be updated with the first suggestion command in response to the received acceptance indication. | 12-24-2015 |
20150371011 | TERMINAL DEVICE AND INFORMATION PROCESSING SYSTEM - A terminal device for sharing a display of a content with another terminal device, includes a unit configured to determine a role of an own-device, from between a first or second role, the first role for applying an operation performed on the content to the content of the other terminal device, and the second role for performing a part of the operation of the first role; a unit configured to receive a part of the operation of first role, and apply the operation to the content included in the other terminal device, when the own-device has the second role; and a unit configured to display the content included in the own-device upon applying the operation performed at the terminal device having the first role, based on information from the first role, when the own-device does not have the first role. | 12-24-2015 |
20150371054 | SHUTTER GLASSES, DISPLAY DEVICE, DISPLAY SYSTEM AND DISPLAY METHOD - The present invention provides shutter glasses comprising lenses and a shutter configured to control on-state or off-state of the lenses, wherein, the shutter is capable of turning on the lenses of the shutter glasses according to a predetermined first timing. The present invention further provides a display device, a display system and a display method. The shutter glasses provided by the present invention and the display device provided by the present invention are operated cooperatively, only a wearer wearing the shutter glasses can view coherent target images, while a person who does not wear the shutter glasses cannot identify contents of the target images, and cannot obtain contents of target images even when the display screen of the display device is photographed. With the shutter glasses and the display device provided by the present invention, security can be improved when operating confidential files. | 12-24-2015 |
20150371057 | FILE SHARING SYSTEM AND METHOD - A file sharing system and method for sharing media files facilitates sharing of media without permitting the media to be downloaded, or stored on web servers. The file sharing system may further enable lists of files to be shared and responses to be delivered to the media owner during playback by a user. A communication function exists within the system to enable users to communicate with other users within the system. Sharing of digital content may be accepted or rejected by users of the system, and a local device may be utilized to enable the storing and sharing of media that is hosted off the cloud. Streaming from the file sharing system or the local device is facilitated through the system. | 12-24-2015 |
20150379243 | AUTOMATED DEVICE AUTHORIZATON AND DEAUTHORIZATION - A process verifies, with a processor, a user account for content delivery with a rolling slot configuration. The rolling slot configuration has a maximum quantity of available slots for devices authorized to receive content. The rolling slot configuration has a plurality of ordered slots that are ordered based upon priority. The process receives a request for content from the user account at a device. The process automatically registers the device in an available slot of the rolling slot configuration based upon a determination of slot availability. The process authorizes the device to play content associated with a user entitlement. The process automatically deauthorizes the device to play the content based upon a deauthorization parameter being met. The process removes a registration of the device from the available slot. The process moves a registration of an additional device with a higher priority than the device to the available slot. | 12-31-2015 |
20150379244 | DYNAMIC DOCUMENT DISPLAY PERSONALIZATION IMPLEMENTED IN A DIGITAL RIGHTS MANAGEMENT SYSTEM - A method for displaying a digital document to a user where the display sequence of the pages of the document is personalized based on the user's past interactions with the document, such as viewing, annotating, editing, sharing, etc. on each pages. As user interacts with the document, the viewer application on the client computer reports the user interactions to a server. Through analytics, the server can decide the importance of individual pages and rank the pages accordingly, and sends page ranking information back to the client. The viewer application on the client can then render the document where pages are ordered based on the ranking, which reflects the user's interest in these pages. Different modes of reorganizing a document based on user interaction history are provided, so that the pages can be displayed in sequences based on the frequency of certain types of user interactions | 12-31-2015 |
20150379289 | DEVICE-INSTALLATION-INFORMATION DISTRIBUTION APPARATUS AND SYSTEM - A device-installation-information distribution apparatus for distributing device installation information including a function of installing program on an information processing apparatus to enable the information processing apparatus to use a device over a network and a function of configuring operation settings of the program includes a distribution request obtaining unit configured to obtain a distribution request, which is transmitted from the information processing apparatus, requesting to distribute the device installation information, a device-installation-information update unit configured to obtain login information for use in logging into the information processing apparatus at a privilege authorized to install software based on the obtained distribution request and device installation information for the target device and update the device installation information by adding the login information to the device installation information, and a device-installation-information distribution unit configured to transmit the updated device installation information to the information processing apparatus. | 12-31-2015 |
20150379290 | CODE PROCESSING APPARATUS AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a code processing apparatus includes a determining unit, a concealing unit, an instructing unit, and an unconcealing unit. The determining unit is configured to determine, based on relocation information included in first code data that includes a code body and relocation information representing a portion of the code body to be relocated by a linker, a first portion including at least a part of the code body that is other than the portion. The concealing unit is configured to conceal the first portion. The instructing unit is configured to instruct the linker to process the first code data having the first portion concealed. The unconcealing unit is configured to unconceal the concealed portion of second code data that is generated from the first code data by the linker. | 12-31-2015 |
20150379294 | JOINT OWNERSHIP OF PROTECTED INFORMATION - Disclosed herein is a system and method for managing a collaborative document that is owned by two different users who belong to different organizations. The users first create a document that will be owned by both users. Both users are also granted full ownership rights in the document. The users then contribute to the document by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with full ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the document to the other user. As a result of the revocation all users are no longer able to see or access the entire document. In this way the confidential information of all parties is protected. | 12-31-2015 |
20150379300 | BUSINESS CARD MANAGEMENT SERVER, BUSINESS CARD IMAGE ACQUIRING APPARATUS, BUSINESS CARD MANAGEMENT METHOD, BUSINESS CARD IMAGE ACQUIRING METHOD, AND STORAGE MEDIUM - Provided is a business card management server that makes it possible to efficiently input information on business cards while protecting personal security, including: a business card information storage unit | 12-31-2015 |
20150379301 | METHOD AND SYSTEM FOR ELECTRONIC CONTENT STORAGE AND RETRIEVAL USING GALOIS FIELDS AND GEOMETRIC SHAPES ON CLOUD COMPUTING NETWORKS - A method and system for electronic content storage and retrieval using Galois Fields and geometric shapes on cloud computing networks. Plaintext electronic content is divided into plural portions and stored in plural cloud storage objects based on a created X | 12-31-2015 |
20150379303 | Systems And Methods For Contextualized Data Protection - Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. This concept is also referred to herein as Just-In-Time-Identity, or “JITI.” Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security—thereby facilitating the availability of more qualified information—via the use of temporally unique, dynamically changing de-identifiers (“DDIDs”). In some embodiments, specialized JITI keys may be used to “unlock” different views of the same DDID (or its underlying value), thereby providing granular control over the level of detail or obfuscation visible to each user based on the context of said user's authorized use of data, e.g., authorized purpose(s), place(s), time(s), or other attributes of the use. | 12-31-2015 |
20160004845 | ACCESS ALLOCATION FOR A SHARED MEDIA OUTPUT DEVICE - Systems and methods for operating a control device are disclosed. In accordance with an aspect of the disclosure, a method for operating a control device may include determining that a first user equipment is in local proximity to a shared media output device, allocating, to the first user equipment, access to the shared media output device, and facilitating playback, on the shared media output device, of media content associated with the first user equipment, so long as the first user equipment is determined to be in local proximity to the shared media output device. | 01-07-2016 |
20160004880 | Method and System for Personal Identity Verification - A personal identification system for using a personal identification number (PIN) to provide personalized information on a user to a non-user is provided. In one embodiment of the present invention, a host computer is configured to communicate with at least a user computer, a non-user computer, and a verification computer, and to allow a user to create a user account, verify the user's identity, request background information on the user, request at least one PIN, and link a PIN with a verification type. The host computer may further be configured to communicate with the verification computer to acquire personalized data on the user, and to communicate with the non-user computer to provide personalized information on the user in response to entry of a PIN, where the type of personalized information provided is based on the verification type linked to the PIN. | 01-07-2016 |
20160004883 | SYSTEM AND METHOD FOR SECURE USE OF MESSAGING SYSTEMS - A system and method for secure use of messaging systems. A mediator may receive an original message, process the original message to produce a processed message, and may forward the processed message to a server or a messaging system. A mediator may receive a processed message from a server or a messaging system, process the received processed message to produce an unprocessed message that may be substantially identical to the original message and may forward the unprocessed message to a destination. | 01-07-2016 |
20160006737 | REMOTE ACCESS TO SHARED MEDIA - Remote media access is facilitated. According to an example embodiment, remote-user media access is facilitated using media provided by a subscriber media source, over a packet-based network. This access is facilitated in an environment involving subscriber users that provide media for transfer over a packet-based network to a remote device. A host server receives a request for access to media content provided by a subscriber. The request is authorized as a function of authorization criteria. In response to the request being authorized, a media source associated with the subscriber is controlled to provide requested media for access at a remote device. A media player is displayed at the remote device, and the media is provided for access via the media player. | 01-07-2016 |
20160006745 | PROPAGATING AUTHENTICATION BETWEEN TERMINALS - Propagating authentication between terminals connected to a server having identification information and user information for the terminals. The terminal receives identification information, user information, location information and a login status from a first terminal and a second terminal in response to a predetermined impact between the terminals, or the terminals coming within a predetermined distance of each other, the login status of the terminals being either authenticated or unauthenticated. The server then authenticates the second terminal in response to the users of the first terminal matching some or all of the users of the second terminal based on the identification and user information, in response to the terminals being located within a predetermined distance of each other, and in response to the first terminal being authenticated and the second terminal being unauthenticated on the basis of the login status. | 01-07-2016 |
20160012210 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF ADMINISTRATING LICENSE, AND PROGRAM | 01-14-2016 |
20160012211 | TOKEN BASED DIGITAL CONTENT LICENSING METHOD | 01-14-2016 |
20160012249 | METHOD FOR COLLECTING AND SECURING PHYSIOLOGICAL, BIOMETRIC AND OTHER DATA IN A PERSONAL DATABASE | 01-14-2016 |
20160012250 | SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION | 01-14-2016 |
20160014141 | CLOUD-BASED DEVICE INFORMATION STORAGE | 01-14-2016 |
20160019397 | Managing Access Rights To Content Using Social Media - Provided are methods and systems related to communications between a social media service or provider (e.g., Twitter®, Facebook®) or other resource (e.g., web page) and one or more content providers. In an aspect, provided are methods comprising receiving a request for content, wherein the request comprises a user agnostic identifier, determining user information associated with the request, determining time information associated with the request, determining media content associated with the user agnostic identifier based on the time information, determining one or more access rights to the media content based on the user information, and providing access to the media content based on the one or more access rights. | 01-21-2016 |
20160019399 | BROKERING DATA ACCESS REQUESTS AND RESPONSES - The present invention extends to methods, systems, and computer program products for brokering data access requests and responses. Aspects of the invention include a brokering pipeline that sequentially processes data access requests and data access responses. The brokering pipeline manages access authentications, request brokering, response rewrite, cache, and hosting multiple (e.g., business) entities. | 01-21-2016 |
20160019400 | RECOMMENDATION SYSTEM FOR PROTECTING USER PRIVACY - One embodiment of the present invention sets forth a technique for providing application command recommendations to a privacy-sensitive client device. The technique includes receiving a command log from each general client device included in a plurality of general client devices and analyzing the command logs to generate a command recommendation file. The command recommendation file may indicate a relationship between one or more application commands executed by at least one of the general client devices and one or more application commands that are available for execution by the privacy-sensitive client device. The technique further includes transmitting the command recommendation file to the privacy-sensitive client device. | 01-21-2016 |
20160026814 | ACCESS CONTROL OF EXTERNAL MEMORY - Technologies are generally described for an access control scheme for an external device. In some examples, an electronic device may detect the external memory connected to the electronic device; set a security code to enable access to the external memory; receive a request to access the external memory; access the external memory in response to entry of the security code; receive a request to disconnect the external memory; and remove a requirement for entry of the security code to enable access to the external memory. | 01-28-2016 |
20160026822 | SYSTEMS AND METHODS FOR REDUCING ACCURACY OF WEB BUGS - Systems and methods for reducing accuracy of web bugs are disclosed. In some implementations, a method includes, at a computing device, identifying an incoming electronic message addressed to an intended recipient. The incoming electronic message includes a plurality of content items provided by a content provider. The method also includes, before the intended recipient reviews the incoming electronic message, reducing accuracy of user activity tracking by the content provider, by: requesting on a modeled temporal basis, a download of a first media content item in the plurality of media content items. In some implementations, the first media content item is invisible to the intended recipient. | 01-28-2016 |
20160028734 | GRANTING COLLABORATION PERMISSIONS IN A COMPUTERIZED SYSTEM - A computerized method for obtaining collaboration with an object of a computerized system, comprising receiving at an owner party that owns the object a request from a requesting party employing a requesting mechanism of the computerized system to collaborate the object with a recipient party, providing by the owner party a decision to the recipient party whether to grant the recipient party to collaborate with the object, and registering, in a data construct of the computerized system, data comprising a status indicative of the decision, thereby providing for the computerized system to determine whether to allow the recipient party to collaborate with the object, wherein the method is performed on an at least one computer of the computerized system configured to perform the method, and an apparatus for performing the same. | 01-28-2016 |
20160034695 | Displaying Different Levels of Personal Information on a Screen - Various embodiments provide notifications with respect to various communications that are received by a computing device. Privacy concerns associated with the notifications can be addressed by ascertaining the user of a particular device and, based on the user, surfacing notifications that have been filtered accordingly. In this manner, various different levels of personal information can be presented, through notifications, based on the current device user. | 02-04-2016 |
20160034697 | INFORMATION PRIVACY SYSTEM AND METHOD - The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information. | 02-04-2016 |
20160034698 | Static Redirection for Objective C - Particular embodiments establish static redirection of a function that is a member of a class to an alternate implementation of the function. A software tool executing on a computer server receives an executable file for an application and a location for an alternate implementation of the function. The function may be written in Objective C. The software tool can be used to locate a structure for the function by traversing serialized metadata in the executable file. The software tool can then be used to modify the metadata in the executable file by updating the value of a selector indicating the location of a current implementation of the function to indicate a location of the alternate implementation. The selector may be included in a element of the structure for the class method. Finally, the application may provide the modified executable file for installation on client devices. | 02-04-2016 |
20160034701 | MONETIZING PRODUCT FEATURES AS PART OF ENFORCING LICENSE TERMS - Control access features include the use of a number of validation rules and capabilities of a target as part of proving license control and revenue generating functionalities, but the embodiments are not so limited. An exemplary role-based computing architecture includes the use of feature to command mappings and one or more validation rules to determine if a target of a command has a proper set of capabilities as part of allowing the command to execute. A computing method of one embodiment operates to provide a validation mechanism that performs a validation evaluation as part of a scope check to ensure that a target command is within the command issuer's scope along with a validation rule check for a particular service feature. | 02-04-2016 |
20160034706 | DEVICE AND METHOD OF ANALYZING MASKED TASK LOG - A method of analyzing a masked task log obtained by masking part of a task log, which is a record of a task performed in a workflow system, the method includes: acquiring a plurality of pieces of disclosed information that are viewable to a plurality of users based on unmasked information in the masked task log; specifying relevance between the plurality of pieces of disclosed information and a plurality of tasks performed in the workflow system, the plurality of tasks including the task; and calculating an index based on the relevance by a processor, the index indicating a possibility that content of the masked task log is determined from the plurality of pieces of disclosed information. | 02-04-2016 |
20160034709 | METHODS AND APPARATUS FOR MULTIGENERATIONAL FAMILY STORAGE VAULT - The present invention relates to apparatus and methods for receiving one or both of documents and artifacts that may include mages, medical records and other information (Family Docs) from Family Members and storing the information and heirlooms in an organized and secure manner according to Family Member Profiles. | 02-04-2016 |
20160034710 | MESSAGING SYSTEMS AND METHODS - A messaging system for providing messaging service between or among user accounts includes a message database server. The message database server includes an account module to maintain user accounts and an upload module to receive message data from a user communication device associated with a user account. The message data may include a message and a share list that authorizes identified user accounts in which the message is to be shared. A single instance storage module may store the message as a single instance. A share module may share the message with the identified user accounts and delete the message at a predetermined time as specified in the share list. | 02-04-2016 |
20160034712 | SYSTEM AND METHOD FOR EVENT-RELATED CONTENT DISCOVERY, CURATION, AND PRESENTATION - A method for event detection and content surfacing, including: receiving a plurality of posts from a plurality of social networking systems; indexing each post; detecting an event within a geofence based on the post parameter values; identifying an event of interest based on the event parameter values; notifying a user account of the detected event when the detected event is determined to be of interest to the user account; aggregating event posts into a content stream for the user account; and facilitating user account interaction with and use of the event posts. | 02-04-2016 |
20160034716 | USER SEARCH BASED ON PRIVATE INFORMATION - In one embodiment, a method includes receiving, from a first user, a query specifying one or more criteria; accessing a data store comprising information associated with one or more users of a social-networking system; identifying a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and sending, to the first user, substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user. | 02-04-2016 |
20160034718 | METHOD AND APPARATUS FOR COMMUNICATING PRIVATE MESSAGES WITH PARTIALLY OBSCURED CONTENT TO LIMIT OR PREVENT UNAUTHORIZED USE OF DATA TO IMPEDE PRIVACY VIOLATIONS - Some embodiments described herein relate to receiving a content portion of a message during a first time period. The content portion of the message can be presented during the first time period without a sender identifier. During a second time period after the first time period, a user can request the sender identifier. The sender identifier can be presented during the second time period without presenting the content portion of the message. In this way, the sender identifier and the content portion of the message may not be presented simultaneously. | 02-04-2016 |
20160036782 | CONTENT-BASED ASSOCIATION OF DEVICE TO USER - Example methods and systems for content-based association of a device to a user are presented. In an example method, data corresponding to each of a plurality of items of content stored within a user device are accessed. A device identifier for the user device is generated based on the data. The device identifier is transmitted from the user device to a service device to associate the user device with a user. | 02-04-2016 |
20160042190 | PROVIDING ACCESS CONTROL OF APPLICATIONS ON COMPUTING DEVICE BY ESTABLISHING SCREEN PASSCODES THAT ALLOW ACCESS TO DESIGNATED SCREENS WITH DESIGNATED APPLICATIONS - A method, computing device and computer program product for providing access control of applications on the computing device. The computing device receives a selection of a set of one or more screens from the owner of the mobile device. The computing device further receives a selection of application(s) to be placed in the selected set of screens. The computing device additionally receives a screen passcode to be assigned to the selected set of screens. The computing device then assigns the received screen passcode to the selected set of screens which enables access to the application(s) on the selected set of screens. In this manner, the owner of the computing device can limit other users' access to certain applications on the computing device by segregating the applications on different sets of screens, where each set of screens is assigned a screen passcode which grants access to that set of screens. | 02-11-2016 |
20160042192 | Electronic Meeting Management For Mobile Wireless Devices With Post Meeting Processing - A device management system includes a meeting support system that is configured to generate and transmit a plurality of electronic meeting invitations to a plurality of mobile wireless devices that correspond to a plurality of meeting participants and receive responses indicating whether the plurality of participants will attend the electronic meeting. The device management system receives identification data that identifies one or more documents or information that will be made available to the plurality of participants. The meeting support system determines whether the plurality of participants is authorized to access the one or more electronic documents or information. If any of the participants are not authorized to access any of the electronic documents or information, the meeting support system notifies the meeting organizer. The device management system may also include a meeting session management system that is configured to share information among the plurality of mobile wireless devices. | 02-11-2016 |
20160044501 | PROXIMITY BASED MEDIA CONTENT BLOCKER - An add-on electronic control device for controlling input display screen data, comprising: a switch that is connected via an input display data connector to an image rendering source, receives a display signal from the image rendering source and conducts the display signal to a display device via an output display data connector which is adapted to be electrically and mechanically connected to a video data socket of the display device; a receiver that identifies a presence or an absence of a wireless signal originated from a target device carried by an authorized user; and a controller that controls the switch to interrupt or to maintain a conduction of the display signal to the display device according to the identified presence or the identified absence. | 02-11-2016 |
20160048666 | Triggering Actions on a User Device Based on Biometrics of Nearby Individuals - Methods, systems, and computer program products for automatically triggering actions on a user device based on biometrics of nearby individuals are provided herein. A method includes capturing, via one or more sensors resident on a first computing device, one or more items of biometric information from one or more individuals located within a given proximity of the first computing device; determining a degree of proximity of the one or more individuals to the first computing device; transmitting, to a second computing device, (i) the one or more captured items of biometric information from the one or more individuals and (ii) the determined degree of proximity of the one or more individuals to the first computing device; and automatically executing one or more actions on the first computing device based on an instruction provided by the second computing device in response to said transmitting. | 02-18-2016 |
20160048696 | ATTESTATION FOR ELECTRONIC SIGNATURES - Techniques for generating a document according to attestation requirements are provided. A method determines attestation requirements for electronically signing an electronic document. The method modifies the document based in part on the requirements, and then provides the modified document to users requested to electronically sign the document, wherein the users are only permitted to electronically sign the document in circumstances satisfying the requirements. An electronic signature service can generate a document whose signing needs to be witnessed and/or recorded according to attestation requirements. The document may be associated with number of signers. The electronic signature service may determine one or more witnesses of the signers and may determine applicable attestation requirements based on the witnesses, the signers, and the document. Further, the electronic signature service may record proceedings associated with collecting signatures for the document and record and/or pause a workflow associated with the document to meet the applicable requirements. | 02-18-2016 |
20160048701 | Enveloping for remote Digital Camera - Remote video data files with digital multimedia envelops may be used for many new cloud computing applications. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported via cloud. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file in a digital video or multi-media format, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. The output file is a file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is an application in a different dimension for most of conventional WF muxing applications as far as redundancy is concerned. Enveloped data are intended only for limited receivers who has access to associated digital envelope data files with enhanced privacy but with no or minimized redundancy. | 02-18-2016 |
20160048702 | INFORMATION RECEIVING DEVICE, INFORMATION RECEIVING METHOD, AND MEDIUM - An information receiving device according to the present invention includes: a request information generation unit which generates request information including actual behavior information which is behavior information representing an actual behavior of a user, and pseudo behavior information not representing an actual behavior of the user; a distribution information request unit which transmits the request information to an information distribution device, and receives distribution information distributed from the information distribution device on a basis of the transmission of the request information; and a distribution information selection unit which selects distribution information associated with the actual behavior information, out of the distribution information received by the distribution information request unit. | 02-18-2016 |
20160050212 | METHOD AND APPARATUS FOR ASSIGNING DEVICES TO A MEDIA SERVICE - A user interface is used to assign different devices and device types to media services where the number of different devices and device types that are capable of being assigned is determined by access privilege information corresponding to such media services. When a number of devices of a specific type are assigned where such a number exceeds a limit specified in the access privilege information, the assignment of additional devices of that specific type is halted. | 02-18-2016 |
20160055344 | DATA LOSS PREVENTION DURING APP EXECUTION USING E-MAIL ENFORCEMENT ON A MOBILE DEVICE - Data loss from the use of email from enterprise apps on mobile devices is prevented or contained. Users of enterprise apps on a personal device are either blocked from sending emails from such apps on the device, forced to use a secure browser if sending an email, or warned about sending data from the app and asked to confirm that the user wants to send the email. An app receives input indicating that a user is attempting to send data out from the app. The intent of a start activity function is checked by the app when this input is received. The app determines whether the intent is email. If it is, the app examines email enforcement policy settings. The email is processed within the mobile device based on one of the settings noted above. The app is first secured or wrapped with an email enforcement policy. | 02-25-2016 |
20160057148 | Computer Implemented Methods And Apparatus For Providing Access To An Online Social Network - Disclosed are systems, apparatus, methods, and computer-readable storage media for providing access to an online social network. The online social network can be specific to an organization having one or more internal users. In some implementations, a request message is received from a requesting user to access social network data of the online social network. The requesting user is identified as an external user of the organization, and it is determined that the requesting user has an authorized status. Access to only a portion of the social network data is provided to the authorized requesting user. | 02-25-2016 |
20160063230 | FINGERPRINT GESTURES - User authentication for a user device can leverage one or more fingerprint sensor regions installed in the device capable of detecting and/or recognizing a user's fingerprints. The user can define a fingerprint gesture or sequence of fingerprint gestures as a passcode, with access to a protected function being conditional on the user performing the defined fingerprint gesture or sequence of fingerprint gestures. In some instances, different fingerprint gestures or fingerprint gesture sequences can invoke or authorize different functions of the device. In some instances, fingerprint gestures from two or more users in the same location or in different locations can be used to unlock a protected function of a device. | 03-03-2016 |
20160063267 | TRI-MODULE DATA PROTECTION SYSTEM SPECIFICATION - The present invention provides a system, method and apparatus for protecting data:
| 03-03-2016 |
20160063268 | SYSTEMS, METHODS, AND DEVICES FOR GATHERING DISPLAY DEVICE USAGE DATA - A display device includes one or more sensors to sense activity in a physical region near the display, as well as a permission component, account component, and a data gathering component. The permission component is configured to determine a permission level corresponding to the display device. The account component is configured to determine an account status that is based on the permission level. The data gathering component is configured to gather usage data for the display device based on the permission level. The usage data includes data from the one or more sensors regarding activity in the physical region near the display device. The transmission component is configured to transmit the usage data to a remote server. | 03-03-2016 |
20160063270 | PERMISSION COMPARATOR - A permission management system enables a system administrator to more effectively manage the large number of permissions associated with database systems. The permission management system accumulates groups of permissions associated with selected users, profiles, or permission sets. The permission management system then performs selectable comparisons on the different groups of permissions, such as identifying common permissions, unique permissions, and differing permissions. The permission management system also may identify permissions in a first permission group that do not exist in a second permission group and assign the identified permissions to the second permission group. | 03-03-2016 |
20160063271 | ACCESS CONTROL FOR UNPROTECTED DATA STORAGE SYSTEM ENDPOINTS - Various embodiments provide access control to unprotected data storage system endpoints. In one embodiment, an authenticated query request is received. The request includes a query associated with an unprotected data storage system endpoint configured to execute queries anonymously. The query is written in a Resource Description Framework (RDF) query language and requests one or more datasets stored in a relational data storage system. A user parameter within the query is identified. The user parameter uniquely identifies a user requesting the query. The query is automatically rewritten to include a set of access control list properties for one or more subject variables in the query. Each of the set of access control list properties configures the query to return data from the one or more datasets for which the user is authorized to access. | 03-03-2016 |
20160063276 | Sharing Content - A method performed in relation to a private conversation conducted over a network between a selected group of two or more users, each of the group of users participating in the conversation from a respective instance of a communication client application run on a respective user device. The private conversation comprises one or more content items, each of these content items being shared by a respective source user of the group with one or more other users of the group internally within the private conversation. The method comprises associating a respective permissions model with each respective one of the content items, the permission model being configured to act on the client application to control permission for the one or more other users to use the respective content item outside of said conversation. | 03-03-2016 |
20160070888 | DIGITAL MEDIA CONTENT MANAGEMENT APPARATUS AND METHOD - A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the computer readable medium is disclosed. The content file comprises control information readable by a content player and payload information including content data. The content file is deconstructed into at least one control information portion and at least one payload information portion being undetectable to a content player of a user device. The control information portion and the payload information portion are separately stored, and at least one of the portions is associated with packing data, and the packing data associated with at least one of the portions comprises a reference to the location of the other portion. | 03-10-2016 |
20160070919 | ACCESS REVOCATION - Systems, methods and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings may be received from different business divisions or enterprises or business groups within an entity and may be compiled to form a standardized set of revocation settings that may be applied across the entity. Accordingly, upon receiving an item that may be associated with access and may include one or more applications to which access may be revoked and/or one or more users from which access may be revoked, the system may apply the standardized revocation settings to determine whether access should be revoked. If it is determined that access should be revoked, the system may revoke access to the one or more applications for the one or more users. | 03-10-2016 |
20160070920 | CONSTRAINED ENVIRONMENTAL MONITORING BASED ON DATA PRIVILEGES - A sensor mechanism in an environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. Then, a control mechanism in the environmental monitoring device generates subsets of the sensor data based on data privileges of different entities, where the data privileges of at least some of the entities are different from each other, and at least some of the corresponding subsets of the sensor data are different. For example, the data privileges may specify: different spatial extents in the external environment monitored by the sensor mechanism; and/or different types of information associated with the external environment. Next, an interface circuit in the environmental monitoring device provides the subsets of the sensor data to electronic devices associated with the entities. | 03-10-2016 |
20160070921 | ASSET PROTECTION BASED ON REDUNDANTLY ASSOCIATED TRUSTED ENTITLEMENT VERIFICATION - A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature. | 03-10-2016 |
20160070925 | METHOD AND APPARATUS FOR USER CREATION OF PRIVATE SOCIAL MEDIA NETWORKS - The system provides a method and apparatus for allowing the creation of customized private social networks through a dashboard interface. A user invokes the social network building interface and selects desired features for the network by selecting one of a plurality of possible features. When a feature is selected, the system guides the user through parameters and metrics to implement that feature as desired by the user. The system is implemented through a cloud based architecture that provides components that are used in the private social network, including services such as database, caching, load balancing, security, encryption, dynamic link control, and others. These services and components are accessed and invoked through a series of function calls through an API that allows the creation of a scalable number of private social networks. | 03-10-2016 |
20160078200 | MERCHANDISING MEDIA BASED ON OWNERSHIP AUDIT - A machine performs an ownership audit on source media files whose media tracks are used, or proposed for use, in a mash-up media file. The machine may access a first group of media identifiers from a user's media library and identify authorized media files that the user is authorized to play or use in a mash-up. The machine may access a second group of media identifiers that identify source media files selected by the user for inclusion in a mash-up. The machine may determine whether all source media files are authorized and then present a notification that indicates whether the mash-up media file can be generated, or has been generated, exclusively from authorized media files. If a source media file is not authorized, the notification may include a suggestion that the user purchase an authorization to play the media file, use it in a mash-up, or both. | 03-17-2016 |
20160078201 | Methods and Systems For Processing Content Rights - A system and method for processing content access rights and/or entitlement rights are disclosed. A method, in one aspect, provides for receiving a selection of a content option, requesting access information associated with the selected content option, receiving access information comprising location information relating to a compatible format, requesting access rights from a first service associated with the location information, wherein the first service requests an access decision relating to the selected content option from a second service based upon the access rights, and receiving the access rights. | 03-17-2016 |
20160078237 | PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION - A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The PINApp can be used to unify all of the digital content stored on multiple devices and cloud services for a single owner or user. | 03-17-2016 |
20160085945 | DIGITAL RIGHTS MANAGEMENT - A method of DRM protection for an image or a series of images or a succession of video frames, comprises: generating a reversible transform; applying the reversible transform to a source image; compressing the transformed image into a bitstream; and supplying the bitstream to a recipient for consumption. At the recipient the bitstream is decompressed and sent to the image display hardware with the transform still in place. A key is used to generate the inverse transform at the recipient and the inverse transform is then carried out in the image display hardware. An additional transform may be applied to the image following the inverse transform to offset pixels from an average value. Thus the source image itself is never exposed at the recipient although the image can be correctly viewed. | 03-24-2016 |
20160085950 | METHOD AND SYSTEM FOR CONTROLLING USAGE RIGHTS AND USER MODES BASED ON FACE RECOGNITION - A method and system for controlling usage rights and user modes based on face recognition are provided. The method herein includes the steps: recognizing face data of a current user of the mobile terminal by a face-recognition technology; and providing a usage right and/or a user mode suited to an identity of the current user for the current user according to the recognized face data. The chance of misuse is decreased by the present invention. | 03-24-2016 |
20160085953 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD - The present invention is a method of and a system for enabling an initiating party to capture, store, and retrieve a video image of at least one acknowledging party performing an acknowledgement requested by the initiating party where the acknowledging party(s) may be remotely located from the initiating party. | 03-24-2016 |
20160085978 | SYSTEM AND METHOD FOR MANAGING COLLABORATION IN A NETWORKED SECURE EXCHANGE ENVIRONMENT - In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, wherein a secure exchange server is controlled by an intermediate business entity, and access to retention restricted computer data content is granted to a user of a second business entity when the secure exchange server receives appropriate login authentication data, wherein the retention restricted computer data content is accessible to the at least one user of the second business entity as limited by the content retention restriction, which is provided by a user of a third business entity. | 03-24-2016 |
20160085980 | Information processing apparatus, imaging device, data management method and control program of photographed image - The present invention avoids execution of processing not intended by the user on the photographed image in a locked state. The image photographed by a camera which is in a lock released state is stored in a user area created in a storage area. On the other hand, an image photographed by a camera, which turned to a locked state as a result of being performed no operation for more than a fixed time, is stored in an area where stores the photographed image photographed in a locked state (second storage area). The image stored in the second storage area is determined after an input of a user's instruction with regard to the processing to be performed on the image. | 03-24-2016 |
20160085981 | SECURE MOBILE PHONE DOCUMENT STORAGE APPLICATION - A method for a smart phone app is provided wherein entry to a secure data storage area is facilitated on a file or object level, and not on an app level, wherein the secure data storage area is hidden from the normal application display or view. To obtain an interface which allows entry into the secure data storage area, a user may perform one or other input action, gesture or other step, wherein these are linked with a specific file or object. | 03-24-2016 |
20160085983 | MANAGING RESTRICTED TAGGED CONTENT ELEMENTS WITHIN A PUBLISHED MESSAGE - A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface. | 03-24-2016 |
20160085990 | Separate Privacy Setting Control of Multiple Communication Clients of a User - One or more terminals that are coupled to a packet-based network are installed with a first instance and/or a second instance of a communication client application of a first user. At times, the communication client application can be configured to enable the first user to communicate with other users using a first communication system implemented over the packet-based network. In some cases, a controller coupled to the packet-based network can be used to maintain separate privacy settings for each of the first and second instances, and thereby control the privacy of the first user in relation to the other users within the first communication system in dependence on which of the first and second instances is active. | 03-24-2016 |
20160092443 | ELECTRONIC PRESENTATION REPOSITORY AND INTERFACE - Embodiments of the invention include techniques for storing and managing repositories of electronic presentation documents. Presentation storage repositories may be implemented in various storage systems including individual computer servers, distributed storage networks, cloud-based storage systems, and the like. Presentation search interfaces may support various searching and customization capabilities. Search interface and search engine components may be implemented to receive search requests from client devices, retrieve electronic presentation data from one or more storage repositories, and generate customized search results based on the retrieved electronic presentation data. Search and presentation capabilities may include storing user-specific selections of presentation cover slides, and then retrieving and/or generating user-specific thumbnails for search results interfaces. Additionally, presentation access and usage statistics may be tracked and stored within the storage repository and may be incorporated into the customized searching and presentation capabilities. | 03-31-2016 |
20160092667 | SYSTEM AND METHOD FOR UTILIZING AND REPLACING ANONYMOUS RECOGNITION CARDS - A system and method for utilizing and replacing an anonymous recognition substrates, which can be anonymous recognition cards, codes, emitters, tags, or any combination. The invention permits replacing and utilizing of anonymous recognition substrates at anonymous web-based program and/or at an anonymous interactive display terminals. Whereby the anonymous substrate holder may create an anonymous account on a web-based program and/or at an interactive display terminal using the anonymous substrate's anonymous code. The user may securely request a new anonymous substrate from the web-based program and/or at the interactive display terminal. The web-based program provider and/or the interactive display terminal provider can anonymously message and track the anonymous account holder and/or anonymous substrate holder. | 03-31-2016 |
20160092689 | Indexing and Searching Documents with Restricted Portions - One or more computer devices may receive a document from private content that is accessible by a set of users, and may extract metadata from the document. The metadata may provide information relating to one or more aspects of the document. The one or more computer devices may determine, based on the metadata, whether a portion of the document includes information that is only to be accessible by a particular user from the set of users, and may append a restrict indicator to the metadata when the portion of the document includes information that is only to be accessible by the particular user. The restrict indicator may identify the particular user and the portion of the document. The one or more computer devices may store the metadata and the restrict indicator in a personal search index. | 03-31-2016 |
20160092692 | CONTROLLING ACCESS TO DATA IN A DATABASE - A method and associated apparatus/system for controlling access to data in a database. A first login by a first user is accepted. A second login by the first user under the name of a second user is accepted. Third data is referred, based on first data of the database accessible from the first user and second data of the database accessible from the second user, upon request to refer to the database under the name of the first user or the second user after the first login and the second login are accepted. | 03-31-2016 |
20160092695 | SERVICE PERSONALIZATION WITH FAMILIARITY SENSITIVITY - Personalized services often utilize individual profiles, such as social network profiles, product purchase histories, or browsing histories. However, personalization may exhibit or imply a familiarity level between the service and the individual that is beyond the individual's comfort level. Presented herein are techniques for adapting personalized services to request supplemental individual information only within a current familiarity stage that has been established by the individual with the service, and only to provide a requested usage of a service. Such solicitation may inform the individual of the intended usage of the requested information. Usages that may involve more sensitive information may be predicated upon requesting and receiving individual consent from the individual to advance to a higher familiarity stage. The user may be permitted to provide individual consent to advancing to a higher familiarity stage only for a particular service, and/or only temporarily for a particular usage of the service. | 03-31-2016 |
20160094561 | IDENTIFYING ROLES WITH SIMILAR MEMBERSHIP AND ENTITLEMENT INFORMATION - Techniques are disclosed for identifying roles with similar membership and/or entitlement information in an identity management system of an enterprise. A role defined in an identity management system may be associated with membership information and entitlement information. The membership information may identify one or more members who has been assigned the role. The entitlement information may determine how members of the role can interact with a target system within the enterprise. The entitlement information may include a list of actions that members of the role can perform on the target system. Embodiments allow for identifying roles that have similar membership and/or entitlement information. If an existing role already gives similar entitlement(s) to similar member(s), the role may be prevented from being created. Thus, embodiments prevent creating and maintaining redundant roles. | 03-31-2016 |
20160094562 | METHOD AND SYSTEM FOR COMMUNICATION CONTROL - The present disclosure relates to a method for communication control, comprising: receiving, from a second user, a request for communicating with a first user, the request including a first identification specific to the first user, the first identification being different from an account used by the first user in the communication; determining, based on a communication mapping associated with the first user, whether the second user is allowed to communicate with the first user using the first identification, the communication mapping indicating authorized users allowed to communicate with the first user and respective identifications allowed to be used by the authorized users; and obtaining, in response to determining that the second user is allowed to communicate with the first user using the first identification, the account used by the first user in the communication to initiate the communication with the first user. | 03-31-2016 |
20160098546 | Digital Media Content Creation and Distribution Methods - A system and methods for digital content creation and upload through a managed website for providing network-based access to authorized users who pay for predetermined rights that allow for use of the content by the authorized user on a multiplicity of devices, without having to repurchase access to the same content. | 04-07-2016 |
20160098572 | Providing Integrated Role-based Access Control - An example method includes, identifying a request from a user associated with a user role. The request corresponds to: an application request to access a first module in an enterprise application; and a data request to access a first portion of a database through the first module. The method also includes: responsive to a first determination that, based on the user role, the application request by the user is permissible: granting the application request; and responsive to a second determination that, based on the user role, the data request by the user is permissible: granting the data request to access the first portion of the database through the first module. The user role is associated with a plurality of access permissions, each specifies: an exhaustive set of application requests permitted to the user role; and an exhaustive set of data requests permitted to the user role. | 04-07-2016 |
20160098575 | ELECTRONIC SYSTEMS OF ELECTRONIC TERMINALS AND SERVERS FOR SECURING INFORMATION INTEGRITY IN THE DISTRIBUTED TECHNOLOGICAL ENVIRONMENT AND METHODS OF USING THEREOF - In some embodiments, the present invention provides for a computer-implemented method, including: electronically receiving, first terminal data where the first terminal data includes at least one first alphanumerical data sequence; electronically generating at least one first computer-generated barcode; electronically storing the first terminal data and the at least one first computer-generated barcode in at least one database residing in a non-transient computer memory; automatically and electronically transmitting the at least one first computer-generated barcode to the at least one first terminal machine; electronically receiving second terminal data; automatically validating, in real-time, the user input as being representative of the user output. | 04-07-2016 |
20160098577 | Systems and Methods for Context-Based Permissioning of Personally Identifiable Information - A method is provided, including establishing a plurality of context profiles for a user, at least one context profile is associated with: (i) subject areas pertinent to the at least one context profile (ii) permissions identifying respective third parties with which personal information can be shared when the at least one context profile is active; (iii) permissions identifying what personal information can be shared with respective third parties when the at least one context profile is active; (iv) permissions identifying respective third parties that are permitted to contact the user when the at least one context profile is active; and (v) permissions identifying how respective third parties may contact the user when the at least one context profile is active; when the at least one context profile is active, operating in one of two or more modes (e.g., a regular mode or a discovery mode). | 04-07-2016 |
20160099947 | INFORMATION PROCESSING APPARATUS, COMMUNICATIONS METHOD, AND SYSTEM - An information processing apparatus includes a first communications connector configured to implement first data communications connection between a first transmission terminal specified by first identification information and a second transmission terminal specified by second identification information when authentication of the first transmission terminal is established, an identification information acquisition part configured to acquire third identification information and fourth identification information by referring to correspondence information registering the third identification information in association with the first identification information, and the fourth identification information in association with the second identification information when acquiring a second data communications connecting request including the first identification information and the second identification information from the first transmission terminal, and a connection request part configured to transmit the second data communications connecting request together with the third identification information and the fourth identification information acquired by the identification information acquisition part to another information processing apparatus. | 04-07-2016 |
20160099949 | Systems and Methods for Document-Level Access Control in a Contextual Collaboration Framework - Systems and methods are provided for managing contextual collaborations. User data corresponding to a plurality of users is stored. The plurality of users include at least a first and second user. A first computing device associated with the first user receives a first access-level designation for a first document included in a first contextual collaboration. The first access-level designation is stored in association with the first user and the first document. A request to access the first document included in the first contextual collaboration is received from a second computing device associated with a second user. Based on the stored first access-level designation, it is determined whether to provide access to the first document by the second computing device associated with the second user. A response is transmitted to the second computing device associated with the second user, the response granting or denying access to the first document. | 04-07-2016 |
20160103980 | VEHICLE MIDDLEWARE - The present disclosure describes a vehicle implementing one or more processing modules. These modules are configured to connect and interface with the various buses in the vehicle, where the various buses are connected with the various components of the vehicle to facilitate information transfer among the vehicle components. Each processing module is further modularized with the ability to add and replace other functional modules now or in the future. These functional modules can themselves act as distinct vehicle components. Each processing modules may hand-off processing to other modules depending on its health, processing load, or by third-party control. Thus, the plurality of processing modules helps to implement a middleware point of control to the vehicle with redundancy in processing and safety and security awareness in their applications. | 04-14-2016 |
20160104007 | DEVICE AND METHOD FOR DATA PRIVACY MANAGEMENT - A method for data privacy management is disclosed. The method includes: predefining, at an electronic device, an action for visualizing hidden data, wherein the hidden data is stored in the electronic device; selecting, at the electronic device, at least one data to be hidden; hiding, at the electronic device, the at least one selected data; detecting, at the electronic device, whether the action is being performed; and visualizing, at the electronic device, the hidden data if the action is detected. | 04-14-2016 |
20160104008 | Systems and Methods for Context-Based Permissioning of Personally Identifiable Information - A method is provided, including establishing a plurality of context profiles for a user, at least one context profile is associated with: (i) subject areas pertinent to the at least one context profile (ii) permissions identifying respective third parties with which personal information can be shared when the at least one context profile is active; (iii) permissions identifying what personal information can be shared with respective third parties when the at least one context profile is active; (iv) permissions identifying respective third parties that are permitted to contact the user when the at least one context profile is active; and (v) permissions identifying how respective third parties may contact the user when the at least one context profile is active; when the at least one context profile is active, operating in one of two or more modes (e.g., a regular mode or a discovery mode). | 04-14-2016 |
20160105442 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SHARING FILES BASED ON USER PROFILE VISIBILITY - In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for sharing files based on user profile visibility can enable community network systems to provide functionality restricting access to files based on the profile to which the file is posted. In particular, a file posted to a profile of one member of a community may be made accessible to other members of the community that are permitted to access that profile. | 04-14-2016 |
20160110298 | MEMORY PROTECTION KEY ARCHITECTURE WITH INDEPENDENT USER AND SUPERVISOR DOMAINS - A processing system includes a processing core to execute a task and a memory management unit, coupled to the core. The memory management unit includes a storage unit to store a page table entry including one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode, a first permission register including a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode, and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode. | 04-21-2016 |
20160110527 | Method and Apparatus for Digital Rights Management - A method and apparatus for digital rights management (DRM) with steps and means for receiving a registration request from one of a plurality of DRM agent devices requesting to register one of a plurality of user accounts and the one DRM agent device to one of a plurality of rights issuers, completing a registration process in the one rights issuer, including establishment of a relationship among the one user account, the one DRM agent device and the one rights issuer; and returning a registration completion response to the one DRM agent device. The invention provides support to the many-to-many relationships among DRM entities, such as DRM agent device, user account and rights issuer, so that the DRM system can be applied to more business modes. | 04-21-2016 |
20160110557 | BASE MODULE FOR ELECTRONIC DEVICE - A base module for an electronic device connects an application module in the electronic device to a network. The base module includes a memory unit which stores a program which defines a function of the electronic device. The base module also includes a modification device for modifying settings on the program in accordance with user input via a switch. A specified electric switch state for the base module is required in order to modify at least some of the settings. | 04-21-2016 |
20160112422 | INFORMATION PROCESSING SYSTEM AND DEVICE CONTROL METHOD - An information processing system includes a terminal device connected to a first network; and an information processing device connected to a second network that is different from the first network. The terminal device includes an information retrieval unit for retrieving, from an electronic device, identification information of the information processing device and first authentication information; an access data retrieval unit for retrieving access data from the information processing device; and a processing request unit for transmitting a request for processing to the electronic device. The information processing device includes an information providing unit for providing, to the electronic device, the identification information of the information processing device and the first authentication information; an access data providing unit for providing, to the terminal device, the access data; and a processing request transmission determining unit for transmitting the request for processing from the terminal device to the electronic device. | 04-21-2016 |
20160117516 | METHOD AND APPARATUS FOR ENCRYPTING AREA OF ELECTRONIC DOCUMENT - A method and apparatus for encrypting an area of an electronic document are provided. The method includes displaying the electronic document, receiving an input signal including information about a first point and a second point of the electronic document, shifting an area adjacent to the first point toward the second point in response to the input signal, displaying only an area of the electronic document other than an encrypted area determined according to a result of the shifting, and enabling a lock mode that maintains a state of displaying the area other than the encrypted area. | 04-28-2016 |
20160117522 | PROBABILISTIC SURFACING OF POTENTIALLY SENSITIVE IDENTIFIERS - Probabilistic surfacing of potentially sensitive identifiers is provided. In one embodiment of the present invention, a method of and computer program product for surfacing of potentially sensitive identifiers are provided. An input string is read. The input string has a length. The input string is divided into a plurality of tokens. Each of the tokens has a predetermined length. A score is determined for each of the plurality of tokens. A composite score is determined based on the scores of each of the plurality of tokens. Whether the input string comprises an identifier is determined by comparing the composite score to a predetermined threshold. | 04-28-2016 |
20160117523 | System and Method for Selectively Sharing Information - Disclosed is a system and method for selectively sharing information among users of a computer application. Specific utility in healthcare applications is disclosed, but the scope of the invention is not limited to healthcare applications. The method involves selecting specific users, with whom information will be shared, a method for selecting such users' restrictions on the information that can be accessed by such users. Also disclosed is a system and method through which certain users can transmit communications on behalf of other users. | 04-28-2016 |
20160119358 | TECHNIQUES FOR MANAGING ACCESS TO HARDWARE RESOURCES ON MULTIPLE-PERSONA MOBILE TECHNOLOGY PLATFORMS - Techniques for managing access to hardware resources on a multiple-persona mobile technology platform (MTP). The method comprises: detecting an access event between at least one persona and at least one hardware resource of the MTP; identifying at least one access control of the at least one persona; determining for each persona, based on the at least one access control, whether the persona has permission to access the at least one hardware resource; and upon determining that at least one permitted persona has permission to access the at least one hardware resource, granting the access to the at least one permitted persona. | 04-28-2016 |
20160119361 | Social Network Based Mobile Access - In one embodiment, a method includes retrieving and storing settings of a first user account of a plurality of accounts of a social network. The method also includes receiving a request from a first user to access a first application on the computing device, the first user being associated with the first user account of the social graph. The method further includes determining whether the first user is permitted to access the first application on the computing device based on the one or more settings of the first user account of the social network. | 04-28-2016 |
20160125175 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing device includes an identification part configured to, in response to a user's operation to start any given one of a plurality of first application programs, determine whether the start of the one of the first application programs is allowed; and a request part configured to request the one of the first application programs to display a first screen which indicates the start of the one of the first application programs is not allowed when the identification part determines that the start of the one of the first application programs is not allowed, and request a second application program to display a second screen including a message when the identification part determines that the start of the one of the first application programs is allowed and when the message needs to be given. | 05-05-2016 |
20160125192 | Data Access Sharing - Data access sharing may be provided. Requests may be received to display an data item associated with a list of data items. Upon determining whether a property of the data item is restricted by an access control policy, the property may be modified prior to rendering a display of the data item. | 05-05-2016 |
20160125193 | Secure Display Element - Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a puzzle, a plurality of images that collectively represent a keypad (for example) are generated and each image represents a different part of the characters. The generated images are to be displayed to a human user in a sequential fashion at at least a predetermined minimum frame rate, such that the plurality of images sequentially displayed are perceivable by the human user collectively as the keypad. In each of the plurality of images, at least a part of the characters of the keypad is disguised or concealed, and in some embodiments, to the extent that not a single character of the keypad is recognizable by a human or a machine. Not all of the plurality of images are displayed at any instant in time. | 05-05-2016 |
20160125196 | SECURED DATA STORAGE ON A HARD DRIVE - Secured electronic data storage on a hard drive is described. A computer system that incorporates the hard drive includes a shrink, shred, and data randomization algorithm built into the read/write function of the computer system for the purposes of securing any data that is stored on the hard drive. Data to be stored on the hard drive is processed using the algorithm which shrinks, shreds, and randomly distributes the data into multiple storage locations, for example multiple partitions of storage, different data storage drives of the hard drive, different folders of a storage device, and the like. An electronic log of where the data is distributed is kept in electronic data storage, on the computer system and/or separate from the computer system, that allows the data on the hard drive to be retrieved, reassembled, decompressed, and if necessary decrypted, upon receipt of a read/access request. | 05-05-2016 |
20160125199 | VERIFYING A USER'S IDENTITY BASED ON ADAPTIVE IDENTITY ASSURANCE LEVELS - The disclosed embodiments provide a system that manages access to a computer-based resource. During operation, the system obtains a request for the computer-based resource, wherein the request identifies a user seeking access to the computer-based resource. Next, the system obtains a set of security levels for a set of identity-proofing techniques, wherein the set of security levels is based on a first set of success rates of the identity-proofing techniques in preventing fraudulent access to computer-based resources. The system then calculates an identity assurance level for the user based on the set of security levels and a second set of success rates of the user in completing one or more of the identity-proofing techniques. Upon determining that the identity assurance level of the user meets a minimum identity assurance level for accessing the computer-based resource, the system enables access to the computer-based resource in a response to the request. | 05-05-2016 |
20160132553 | APPARATUS AND METHOD FOR PROCESSING QUERY - An electronic device is provided. The electronic device includes a memory configured to store information associated with a user, and a query managing module that is functionally connected with the memory wherein the query managing module is configured to execute acquiring a query, determining at least one word associated with the user, from the query, obtaining a result of a first search executed, based on the at least one word, from a set of protected data associated with the user, changing at least a part of the query, based on the result of the first search, and providing a result of a second search executed, based on the changed query, from a set of public data. | 05-12-2016 |
20160132665 | MECHANISM FOR FACILITATING MANAGEMENT OF DATA IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one embodiment and by way of example, a method for facilitating management of data in an on-demand services environment is provided. The method of embodiment includes detecting an attempt by a user to manipulate data via a collaboration application at a computing system, wherein the attempt includes attempted deletion of the data posted for viewing using the collaboration application. The method may further include determining whether the user is authorized to manipulate the data, and blocking the attempt if the user is not authorized to manipulate the data. | 05-12-2016 |
20160132686 | PERMISSION CONTROL - In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database. | 05-12-2016 |
20160132690 | Access Revocation - Systems and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings may be received from different business divisions or enterprises or business groups within an entity and may be compiled to form a standardized set of revocation settings that may be applied across the entity. Accordingly, upon receiving an item that may be associated with access and may include one or more applications to which access may be revoked and/or one or more users from which access may be revoked, the system may apply the standardized revocation settings to determine whether access should be revoked. If it is determined that access should be revoked, the system may revoke access to the one or more applications for the one or more users. | 05-12-2016 |
20160132693 | DOCUMENT DISTRIBUTION AND INTERACTION - An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document. | 05-12-2016 |
20160132696 | DATA PRIVACY MANAGEMENT - A system and a method for managing privacy of data are provided. The method includes causing generation of a trigger notification notifying an access to one or more fields of a user-profile in a first application. The trigger notification generated is by a second application integrated with the first application. The first application includes a plurality of fields comprising sensitive data associated with the user-profile. The method further includes enforcing one or more access preferences corresponding to the one or more fields by the second application on the generation of the trigger notification. The one or more access preferences are based at least on one of a plurality of preconfigured rules and contextual information associated with the trigger notification. Enforcing the one or more access preferences facilitates in managing data privacy. | 05-12-2016 |
20160134635 | SYSTEMS, COMMUNICATION ENDPOINTS, AND RELATED METHODS FOR DISTRIBUTING IMAGES CORRESPONDING TO COMMUNICATION ENDPOINTS - Systems and methods are disclosed for distributing images corresponding to communication endpoints. A system includes one or more servers configured to determine whether image privacy settings corresponding to images of communication endpoints permit the images to be transmitted to others of the communication endpoints for display with contacts lists of the others of the communication endpoints. A method includes transmitting the data corresponding to the images to the others of the communication endpoints as permitted by the image privacy settings. A communication endpoint is configured to present a contacts list displaying the images corresponding to communication endpoints listed in the contacts list to a user, if permitted by the corresponding image privacy settings. A method of transforming a computing device into a communication endpoint includes storing computer-readable instructions directed to performing actions the communication endpoint is configured to perform, and transmitting the computer-readable instructions to the computing device. | 05-12-2016 |
20160148011 | ELECTRONIC DEVICE FOR MANAGING USE OF DATA FROM OTHER ELECTRONIC DEVICE AND METHOD FOR CONTROLLING THE SAME - A method for controlling a first electronic device communicating with a second electronic device is provided. The method includes connecting to the second electronic device, receiving a request to use data stored in the second electronic device from a first application, determining whether to permit to use the data, and, if permitted to use the data, controlling the first application to use the data. | 05-26-2016 |
20160148014 | OBSCURING AND DELETING INFORMATION FROM A MESSAGING ACCOUNT - In one aspect, a device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to access a messaging account and parse contents of the messaging account to identify personal information to at least obscure in the messaging account. | 05-26-2016 |
20160148015 | TECHNOLOGIES FOR PRESENTING PUBLIC AND PRIVATE IMAGES - Technologies for displaying public and private images includes a display device and one or more user viewing devices. The display device is configured to display or generate a personalized image or video that is viewable by an authorized user viewing device and not viewable by unauthorized viewing devices. To facilitate the display of the personalized images, the display device and the user viewing device(s) may negotiate a display protocol to be used by the display device to display the personalized image in a private manner. In some embodiment, the display device may also display a public image or video that is viewable by unauthorized viewing devices and/or individuals without viewing devices. | 05-26-2016 |
20160148018 | INFORMATION PROVIDING DEVICE, INFORMATION PROVIDING METHOD, AND PROGRAM - An information providing server ( | 05-26-2016 |
20160154968 | SECURE ENDPOINT FILE EXPORT IN A BUSINESS ENVIRONMENT | 06-02-2016 |
20160154969 | COMMUNITY-BASED PARENTAL CONTROLS | 06-02-2016 |
20160154974 | SOCIAL NETWORK PUBLICATION SYSTEM | 06-02-2016 |
20160154975 | Social Media and Data Sharing Controls | 06-02-2016 |
20160154980 | METHOD OF SECRET INFORMATION ENTERING INTO ELECTRONIC DIGITAL DEVICES | 06-02-2016 |
20160162668 | LICENSE MANAGEMENT METHOD AND APPARATUS - A client apparatus determines whether a license system of an application is a node-locked system or a floating system when the application is activated. The client apparatus further determines whether a node-locked license is acquired if it is determined that the license system of the application is the node-locked system. The client apparatus initializes a user interface to display a license-required function in an enabled state if the node-locked license of the node-locked system is acquired or the license system is the floating system. The client apparatus initializes a user interface to display the license-required function in a disabled state if the node-locked license of the node-locked system is not acquired. | 06-09-2016 |
20160162679 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR HIDING ACCESS TO INFORMATION IN AN IMAGE - Methods, apparatuses, and computer program products are herein provided for hiding access to information in an image. A method may include receiving user input indicating a desire of a user to magnify a region within an image to a level of magnification. The method may further include causing the region to be magnified to the level of magnification. The method may further include determining whether the region is associated with at least one of an application or information and determining whether the level of magnification satisfies a level of magnification threshold. The method may further include causing the at least one application to be launched or information to be opened in an instance in which the region is associated with the at least one of an application or information and the level of magnification satisfies the level of magnification threshold. Corresponding apparatuses and computer program products are also provided. | 06-09-2016 |
20160162697 | AUTOMATICALLY PREVENTING UNAUTHORIZED SIGNATORIES FROM EXECUTING ELECTRONIC DOCUMENTS FOR ORGANIZATIONS - In some embodiments, an electronic signature service automatically updates electronic documents to prevent execution by an unauthorized signatory. The electronic signature service can receive an electronic document to be electronically signed on behalf of an organization. The electronic signature service can retrieve organization data indicative of signatories that are authorized to electronically sign the electronic document. The organization data may be inaccessible to a first signatory that is associated with the document. The electronic signature service can determine from the organization data that the first signatory is not authorized to electronically sign the document. The electronic signature service can update the electronic document with a second signatory that is determined from the organization data as being authorized to execute the document. The electronic signature service can prevent the first signatory from executing the document and provide access to the electronic document by a computing device associated with the second signatory. | 06-09-2016 |
20160162700 | METHOD FOR SHARING MULTIPLE DATA ITEMS USING A SINGLE URL - A way of sharing a set of data where each data item is stored at a different file path. The data items may be files or folders that reside on different remote storage servers or within the same file system. One or more data items in the set of data do not share a common root folder. Data items in the set of data that share a common root folder are stored amongst other data items in the common root folder that do not belonging to the set of data items to be shared. A single URL or link is generated to provide immediate access to the set of data to recipients of the URL or link. | 06-09-2016 |
20160162703 | SYSTEM AND METHOD FOR PROCESSING DOCUMENTS - A system and method for processing documents includes a first component for receiving document data of at least one document, authenticating a user and storing the received document data of the at least one document in a database when the authenticated user corresponds with a pre-specified or entitled user; a second component for receiving document data of at least one document, generating at least one document in a portable document format based on the received document data, authenticating a user, digitally signing and/or encrypting the at least one generated document in the portable document format, and storing the at least one digitally signed and/or encrypted document in the portable document format in a database when the authenticated user corresponds with a pre-specified or entitled user; and a third component for deciding whether the at least one document shall be processed either in the first component or in the second component. | 06-09-2016 |
20160162705 | APPARATUS AND METHOD FOR MANAGING HEALTH DATA - An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the user terminal, and information of a medical instrument for measuring the health data to a management server interworked with the user terminal, receiving, by a receiver, a security type table mapped onto the user terminal number and comprising a security type code for instructing the health data which the medical instrument has measured to be stored in a first memory without security or in a second memory with security, from the management server, and storing the health data in the first memory or the second memory, which the security type code instructs, through determining the security type code of the security type table when the health data is received from the medical instrument. | 06-09-2016 |
20160162707 | AUTOMATIC APPLICATION DEPENDENT ANONYMIZATION - Disclosed are various embodiments for facilitating the anonymization of unique entity information. A service may send anonymized responses to requests for data from multiple requestors, the data being associated with entity identifiers. The anonymized responses may comprise the data requested in association with anonymous entity identifiers as opposed to the entity identifiers. | 06-09-2016 |
20160171188 | APPARATUS AND METHOD FOR PROTECTING MEDIA CONTENT RIGHTS | 06-16-2016 |
20160171244 | DIGITAL MEDIA PRIVACY PROTECTION | 06-16-2016 |
20160180062 | RIGHTS AND CAPABILITY-INCLUSIVE CONTENT SELECTION AND DELIVERY | 06-23-2016 |
20160180064 | METHOD FOR PROVIDING A LICENCE IN A SYSTEM FOR PROVIDING MULTIMEDIA CONTENTS | 06-23-2016 |
20160180107 | METHOD AND SYSTEM FOR POLICY BASED DATA ACCESS CONTROL | 06-23-2016 |
20160180108 | SYSTEMS AND METHODS FOR MANAGING ACCESS TO MEDIA ASSETS BASED ON A PROJECTED LOCATION OF A USER | 06-23-2016 |
20160180113 | USER-GENERATED CONTENT PERMISSIONS STATUS ANALYSIS SYSTEM AND METHOD | 06-23-2016 |
20160182486 | SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK ACCESS AND DATA PROTECTION SYSTEM | 06-23-2016 |
20160182526 | Social network privacy management systems and methods | 06-23-2016 |
20160188888 | PRIVACY SCREEN-BASED SECURITY - A system for privacy screen-based security comprises an input interface and a processor. The input interface is configured to receive authentication information. The processor is configured to, in the event authentication is determined to be successful, provide a privacy access screen, wherein the privacy access screen provides access to a set of applications or data, and determine whether to automatically transition to a new privacy screen, wherein the transition to the new privacy screen is automatic under a specific set of circumstances. | 06-30-2016 |
20160188897 | SECURE EVENT LOG MANAGEMENT - A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A write file of the host interface receives an entry from an untrusted host device connected to the trusted device. A processor of the isolated environment retrieves the entry and determines log data associated with the entry, such as the date and time of the entry. Using the log data, the processor records an event log entry in a secure storage of the isolated environment. Once recorded, the entry cannot be deleted or altered. An authorized user, however, can then access the event log entry from the secure storage, such as by providing a request for the event log entry via the secure interface of the trusted device and/or the host interface of the trusted device. | 06-30-2016 |
20160188902 | COMPUTING SYSTEM FOR PRIVACY-AWARE SHARING MANAGEMENT AND METHOD OF OPERATION THEREOF - A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context. | 06-30-2016 |
20160196413 | TRIAL USE OF A COLLECTION OF MEDIA FILES | 07-07-2016 |
20160196440 | SYSTEMS AND METHODS FOR SECURE DATA SHARING | 07-07-2016 |
20160196443 | ON-DEMAND DATABASE SERVICE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY ALLOWING AN APPLICATION OF AN ENTITY ACCESS TO DATA OF ANOTHER ENTITY | 07-07-2016 |
20160203299 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT ENFORCEMENT | 07-14-2016 |
20160203329 | WORKFLOW AND USER CREDENTIALS | 07-14-2016 |
20160203332 | PERSONAL INFORMATION PROTECTION FOR NAVIGATION SYSTEMS | 07-14-2016 |
20160203333 | METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING AGAINST INFERENCE ATTACKS | 07-14-2016 |
20160203335 | APPLICATION DATA STORAGE AREA GENERATION METHOD, APPLICATION DATA STORAGE AREA GENERATION APPARATUS, AND APPLICATION DATA STORAGE AREA GENERATION PROGRAM | 07-14-2016 |
20160205070 | METHOD AND APPARATUS FOR AUTOMATIC COMPLETION OF AN ENTRY INTO AN INPUT FIELD | 07-14-2016 |
20160205105 | PRIVACY LIST SNAPSHOT | 07-14-2016 |
20160205106 | SYSTEMS AND METHODS FOR PROVIDING IOT SERVICES | 07-14-2016 |
20160253504 | ELECTRONICALLY SHREDDING A DOCUMENT | 09-01-2016 |
20160253505 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO A MULTI-TENANT DATABASE SYSTEM USING A VIRTUAL PORTAL | 09-01-2016 |
20160379007 | Multi-Layered Metadata Management System - A metadata layer management system is presented. Layers of metadata objects can be constructed where each metadata layer object comprises a rights policy. As entities interaction with the metadata layer objects, possibly by navigating links among the objects, each entity's access rights to the objects are governed by the rights policy. Further, the disclosed techniques provide for resolving rights conflicts among the rights policies of the metadata layer objects. | 12-29-2016 |
20160379008 | Playback Device Queue Access Levels - Based on a credential, an access level of a playback queue for a first control interface and a first subset and second subset of media items in the playback queue may be determined. Media items in the playback queue that were added via a second control interface may be included in the first subset. Media items that were added via a control interface different from the second control interface may be included in a second subset. Information may be provided which identifies the first subset of the media items in the playback queue and the second subset of the media items in the playback queue. | 12-29-2016 |
20170235925 | SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION | 08-17-2017 |
20170235926 | METHODS AND DEVICES FOR DISTRIBUTING CONTENT TO AN ELECTRONIC DEVICE | 08-17-2017 |
20170235929 | Systems And Methods For Expedited Entitlement Checks | 08-17-2017 |
20170235975 | INFORMATION PROCESSING SYSTEM, STORAGE MEDIUM, AND CONTROL METHOD | 08-17-2017 |
20180025135 | SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND DELIVERING DATA | 01-25-2018 |
20180025164 | DISSOLVABLE PROTECTION OF CANDIDATE SENSITIVE DATA ITEMS | 01-25-2018 |
20180025178 | SYSTEMS AND METHODS FOR TRIGGER-BASED MODIFICATION OF PRIVACY SETTINGS ASSOCIATED WITH POSTS | 01-25-2018 |
20190147144 | SOFTWARE FEATURES LICENSING AND ACTIVATION PROCEDURE | 05-16-2019 |
20190147149 | DATA PROCESSING SYSTEMS FOR MONITORING USER SYSTEM INPUTS AND RELATED METHODS | 05-16-2019 |
20190147178 | SYSTEMS AND METHODS FOR GENERATING PREVIEWS OF CONTENT PROTECTED BY AUTHENTICATION PROTOCOLS | 05-16-2019 |
20190147182 | Data Access System | 05-16-2019 |
20190147186 | METHOD TO CONTROL THE DISPLAY OF AT LEAST ONE CONTENT ON A SCREEN | 05-16-2019 |
20220138343 | METHOD OF DETERMINING DATA SET MEMBERSHIP AND DELIVERY - One example method includes receiving a user request for a data set, and the user request includes information concerning user requirements for the data set, identifying data records that satisfy one or more of the user requirements, calculating a respective relative value for each of the data records, and the relative values are based in part on the user requirements, and providing access controls for each data record that enable tracing of accesses of the data record. | 05-05-2022 |