Patents by Inventor Tobias Kohlenberg

Tobias Kohlenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140096177
    Abstract: Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment. Additionally, the composite false match rate can be mapped to a score, wherein an attestation message is generated based on the score. In one example, the score is associated with one or more of a standardized range and a standardized level.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Ned Smith, Keith Shippy, Tobias Kohlenberg, Manish Dave, Omer Ben-Shalom, Mubashir Mian
  • Publication number: 20140096178
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Publication number: 20140091900
    Abstract: Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Tobias Kohlenberg, Steven Birkel, Rita Wouhaybi, Stanley Mo
  • Publication number: 20140088856
    Abstract: Methods and systems for a location metadata system are disclosed. A data storage subsystem stores collected data associated with locations and users. A network interface is coupled to the data storage subsystem. The network interface manages communication with devices of users to collect data associated with the locations and users. A data analysis system includes a processor adapted for obtaining the collected data from the data storage subsystem and for analyzing the collected data to create a first location identity associated with interaction of users with a first location.
    Type: Application
    Filed: September 27, 2012
    Publication date: March 27, 2014
    Inventors: Rita H. Wouhaybi, Stanley Mo, Tobias Kohlenberg, Steven Birkel, Annabel Nickles
  • Publication number: 20140025601
    Abstract: A system and method includes obtaining reviews from an electronic commerce site, generating statistics via a specifically programmed machine regarding the reviews by reviewers, identifying reviewers via the machine having statistics indicative of a compensated reviewer, generating scores via the machine for the reviewers indicative of a probability that each reviewer is a compensated reviewer. The method may further or alternatively include monitoring user interactions via a specifically programmed machine with electronic commerce generated content with respect to reviews of products, and providing a reviewer score via the machine responsive to such user interactions, wherein the score is representative of the probability that a reviewer generating the score is compensated with respect to providing reviews.
    Type: Application
    Filed: December 28, 2011
    Publication date: January 23, 2014
    Inventors: Rita H. Wouhaybi, Stanley Mo, Tobias Kohlenberg, Mubashir Mian
  • Publication number: 20140012917
    Abstract: Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.
    Type: Application
    Filed: December 28, 2011
    Publication date: January 9, 2014
    Inventors: Jim Baca, Tobias Kohlenberg, Burges Karkaria, Dennis Morgan, David Stanasolovich, Selim Aissi, Mark Price, Alan Ross
  • Publication number: 20130324166
    Abstract: A method is provided to track geolocations of multiple mobile location tracking enabled devices, each such device associated with at least one member of a group of subjects; one of the devices sends a map image of a real-world location and indicia of geofence to each of the other devices; each of multiple devices sends its geolocation to at least one other device in the group; the at least one device in the group displays the respective geolocations of the other devices relative to the map image and relative to the geofence image; an alert is generated by the at least one other device in the group in response to a determination that at least one of the devices in the group is disposed outside the geofence or within a prescribed distance from the geofence.
    Type: Application
    Filed: December 30, 2011
    Publication date: December 5, 2013
    Inventors: Mubashir Mian, Rita H. Wouhaybi, Stanley Mo, Tobias Kohlenberg
  • Patent number: 8458802
    Abstract: A method, device, and system for managing digital usage rights of documents includes a mobile computing device having a digital rights management (DRM) enforcement engine included therein. The mobile computing device may communicate with a server, such as an enterprise digital rights management (EDRM) server, to retrieve a secured document and an associated document usage rights policy. The document and usage rights policy are stored in a secured storage of the mobile computing device. The DRM enforcement engine of the mobile computing device provides access to the requested document while locally enforcing the associated document usage rights policy. In some embodiments, the mobile computing device may act as a proxy for other computing devices communicatively coupled to the mobile computing device and/or act as a local EDRM to such computing devices.
    Type: Grant
    Filed: April 2, 2011
    Date of Patent: June 4, 2013
    Assignee: Intel Corporation
    Inventors: Jim Baca, Selim Aissi, Alan Ross, Tobias Kohlenberg, Dennis Morgan
  • Publication number: 20120255026
    Abstract: A method, device, and system for managing digital usage rights of documents includes a mobile computing device having a digital rights management (DRM) enforcement engine included therein. The mobile computing device may communicate with a server, such as an enterprise digital rights management (EDRM) server, to retrieve a secured document and an associated document usage rights policy. The document and usage rights policy are stored in a secured storage of the mobile computing device. The DRM enforcement engine of the mobile computing device provides access to the requested document while locally enforcing the associated document usage rights policy. In some embodiments, the mobile computing device may act as a proxy for other computing devices communicatively coupled to the mobile computing device and/or act as a local EDRM to such computing devices.
    Type: Application
    Filed: April 2, 2011
    Publication date: October 4, 2012
    Inventors: Jim Baca, Selim Aissi, Alan Ross, Tobias Kohlenberg, Dennis Morgan
  • Publication number: 20100023782
    Abstract: Key-to-policy association and hardware-based policy enforcement for file/folder encryption (FFE) and/or full-disk encryption (FDE) are provided. A CPU independent microprocessor (CIM) is coupled to a platform and provides a secure storage service, secure non-volatile storage, secure policy enforcement engine, and system interface for communication with platform components independent of the CPU. The CIM stores a key and its associated policies by generating a hardware-derived key to wrap the key prior to securely storing it in non-volatile storage on the CIM. Upon receiving a request for key-access by an application, policy status and credentials are verified before the key is returned.
    Type: Application
    Filed: December 21, 2007
    Publication date: January 28, 2010
    Inventors: Gyan Prakash, Selim Aissi, Jasmeet Chhabra, Tobias Kohlenberg
  • Publication number: 20080028180
    Abstract: Embodiments of the present invention provide an inappropriate access detector of system segmentation faults. Other embodiments may be described and claimed.
    Type: Application
    Filed: July 31, 2006
    Publication date: January 31, 2008
    Inventors: Alex P. Newman, Tobias Kohlenberg, John Mark Agosta
  • Publication number: 20070180238
    Abstract: A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the host. The partition may utilize Direct Memory Access (“DMA”) to access session key stored in a host OS. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application.
    Type: Application
    Filed: December 21, 2005
    Publication date: August 2, 2007
    Inventors: Tobias Kohlenberg, Ravi Sahita