Patents by Inventor Tobias Kohlenberg

Tobias Kohlenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160180719
    Abstract: A method may include receiving, using at least one processor, location information that includes a location of an unmanned aerial vehicle (UAV); querying, using the at least one processor, a policy database to retrieve a notification condition for a first property with respect to UAVs; calculating, using the at least one processor, a distance between the UAV and the first property using the received location information determining, using the at least one processor, if the distance of the UAV with respect to the first property is within a range defined in the notification condition for the first property; and transmitting, using the at least one processor, a notification to a party associated with the first property when the distance of the UAV with respect to the first property is within the range defined in the notification condition for the first property.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Rita H. Wouhaybi, Hong Li, Tobias Kohlenberg, Igor Tatourian
  • Publication number: 20160163220
    Abstract: A mechanism is described to facilitate dynamic selection of avatars according to one embodiment. A method of embodiments, as described herein, includes acquiring sensory data, processing the sensory data to detect and identify one or more surrounding objects of which a user should be made aware, determining a relevance of the one or more objects and to prioritize relevant objects as events and providing feedback based on the events.
    Type: Application
    Filed: December 5, 2014
    Publication date: June 9, 2016
    Inventors: Tobias Kohlenberg, Michael Moran, Charles Baron, Stephen Chadwick
  • Patent number: 9298911
    Abstract: Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 29, 2016
    Assignee: INTEL CORPORATION
    Inventors: Gal Chanoch, Eran Birk, Baiju Patel, Steven Grobman, Tobias Kohlenberg, Rajeev Gopalakrisha
  • Publication number: 20160080393
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Application
    Filed: November 25, 2015
    Publication date: March 17, 2016
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Publication number: 20160057110
    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
    Type: Application
    Filed: November 5, 2015
    Publication date: February 25, 2016
    Inventors: Hong Li, Rita H. Wouhaybi, Tobias Kohlenberg
  • Patent number: 9223952
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: December 29, 2015
    Assignee: Intel Corporation
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Patent number: 9223950
    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: December 29, 2015
    Assignee: Intel Corporation
    Inventors: Hong Li, Rita H Wouhaybi, Tobias Kohlenberg
  • Publication number: 20150371079
    Abstract: Various systems and methods for authenticating users via image manipulation are described herein. In various embodiments, an initial image associated with a stored profile of the user is presented on a display device. Input including a manipulation of the initial image to transform the initial image to a manipulated initial image is received on an input device. The user is authenticated in response to the manipulated initial image sufficiently matching a target manipulated image associated with the stored profile of the user. In various embodiments, prior to presenting the initial image, a facial image of the user is captured. The user is identified by applying a facial recognition technique to the captured facial image of the user. The display device is arranged to present the initial image in response to identifying the user as having a stored profile.
    Type: Application
    Filed: March 13, 2013
    Publication date: December 24, 2015
    Inventors: Tobias Kohlenberg, Dave Paul Singh, Michael Solomon Richmond, James Jin-koo Kim
  • Publication number: 20150109099
    Abstract: Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy.
    Type: Application
    Filed: December 26, 2014
    Publication date: April 23, 2015
    Applicant: Intel Corporation
    Inventors: Steven Birkel, Rita Wouhaybi, Tobias Kohlenberg, Stanley Mo, Joni D. Stutman
  • Publication number: 20150106870
    Abstract: Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed on the web client, with the web browser arranged to render a web page, the web page including content originating from a plurality of origins. A request from the web page to store data on the web client is intercepted, with the request originating from a particular origin of the plurality of origins. The request is analyzed and approved or denied based on the particular origin.
    Type: Application
    Filed: October 10, 2013
    Publication date: April 16, 2015
    Inventors: Hong Li, Tobias Kohlenberg, Jim S. Baca
  • Publication number: 20150091713
    Abstract: Various systems and methods for vehicle theft detection are described herein. In an embodiment, a driver of the vehicle is identified with an onboard system. The onboard system then determines whether the driver is an authorized operator of the vehicle, where the determination based on sensor data collected from a sensor installed in the vehicle. When the driver is not an authorized operator of the vehicle, a security recovery process is performed.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 2, 2015
    Inventors: Tobias Kohlenberg, Dave Paul Singh, Dominic Fulginiti, Mahendra Tadi Tadikonda
  • Publication number: 20150058017
    Abstract: Disclosed in some examples are systems, methods, devices, and machine readable mediums which may produce an audio recording with included verification from the individuals in the recording that the recording is accurate. In some examples, the system may also provide rights management control to those individuals. This may ensure that individuals participating in audio events that are to be recorded are assured that their words are not changed, taken out of context, or otherwise altered and that they retain control over the use of their words even after the physical file has left their control.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 26, 2015
    Inventors: Dave Paul Singh, Dominic Fulginti, Mahendra Tadi Tadikonda, Tobias Kohlenberg
  • Patent number: 8955045
    Abstract: Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment. Additionally, the composite false match rate can be mapped to a score, wherein an attestation message is generated based on the score. In one example, the score is associated with one or more of a standardized range and a standardized level.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: February 10, 2015
    Assignee: Intel Corporation
    Inventors: Ned Smith, Keith Shippy, Tobias Kohlenberg, Manish Dave, Omer Ben-Shalom, Mubashir Mian
  • Patent number: 8933778
    Abstract: Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: January 13, 2015
    Assignee: Intel Corporation
    Inventors: Steven Birkel, Rita Wouhaybi, Tobias Kohlenberg, Stanley Mo, Joni D. Stutman
  • Publication number: 20150003693
    Abstract: Various embodiments are generally directed to an apparatus, method and other techniques for detecting one or more inputs on a back side of a housing an determining a pattern based on the detected one or more inputs on the back side of the housing. Once a pattern is determined, a pattern characteristic based on the pattern may be determined and a user may be authenticated based on a comparison of the pattern characteristic and stored data. Other embodiments are described and claimed.
    Type: Application
    Filed: June 13, 2013
    Publication date: January 1, 2015
    Inventors: Jim S. Baca, David Stanasolovich, Mark H. Price, Joshua Boelter, Tobias Kohlenberg
  • Publication number: 20140337279
    Abstract: Systems and methods for dynamically creating collaborative teams and managing collaborative work of a team are generally disclosed herein. One example embodiment includes the dynamic creation of a collaborative team by creating an association between team members via a managing module. The managing module may be capable of managing, among other things, team members on a team, tasks and goals of each member of the team, as well as documentation associated with the team. In some embodiments, the managing module may use a chat or messaging protocol to manage collaborative modifications to documents of the team.
    Type: Application
    Filed: December 29, 2011
    Publication date: November 13, 2014
    Inventors: Stanley Mo, Robert Staudinger, Rita H. Wouhaybi, Mubashir Mian, Tobias Kohlenberg
  • Publication number: 20140282832
    Abstract: Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Intel Corporation
    Inventors: Gal Chanoch, Eran Birk, Baiju Patel, Steven Grobman, Tobias Kohlenberg, Rajeev Gopalakrisha
  • Publication number: 20140259130
    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
    Type: Application
    Filed: March 5, 2013
    Publication date: September 11, 2014
    Inventors: Hong Li, Rita H. Wouhaybi, Tobias Kohlenberg
  • Publication number: 20140189356
    Abstract: A method of enforcing a virtual corporate boundary may include a client device requesting sensitive content from a network site on a server device responsive to a user's interaction with the client device. The server device can determine whether the user and/or client device are permitted to access the sensitive content. A secure element on the client device can establish a session key between the server device and the client device. The server device can render the sensitive content and send it to the client device, which can display the content to the user.
    Type: Application
    Filed: December 29, 2011
    Publication date: July 3, 2014
    Applicant: Intel Corporation
    Inventors: Vinay Phegade, Jason Martin, Reshma Lal, Micah Sheller, Tobias Kohlenberg
  • Publication number: 20140091903
    Abstract: Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Steven Birkel, Rita Wouhaybi, Tobias Kohlenberg, Stanley Mo, Joni D. Stutman