Stand-alone Patents (Class 726/16)
-
Patent number: 8788616Abstract: Distinctions between resources explicitly selected by a user and resources indirectly selected may be enabled by identifying an explicitly selected web page or other resource as such in the request for the web page or other resource, which may allow the web page or resource to be differentiated from web pages or other resources that are requested as a consequence of their indirect selection. Moreover, a log of web pages or other resources explicitly selected by a user may be maintained at the client and later reference by a local processor or communicated to a host process seeking to differentiate directly and indirectly selected web pages or other resources. These techniques also may allow a proxy or other server to perform processing related to parentally controlled accounts or related to accurately tracking frequently requested resources such as web pages.Type: GrantFiled: September 23, 2011Date of Patent: July 22, 2014Assignee: AOL Inc.Inventors: Eric O'Laughlen, W. Karl Renner, Kevin E. Greene
-
Patent number: 8782777Abstract: A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to define a synthetic context-based object. The synthetic context-based object is associated with at least one specific data store in a data structure, where the specific data store contains data that is associated with data contained in the non-contextual data object and the context object. An ambiguous request is received from a user for data related to an ambiguous subject-matter. The context of the ambiguous request from the user is determined and associated with the synthetic context-based object that is associated with said a specific data store, where that specific data store contains data related to the context of a now contextual request from the user. The user is then provided access to the specific data store while blocking access to other data stores in the data structure.Type: GrantFiled: September 27, 2012Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Robert R. Friedlander, James R. Kraemer
-
Patent number: 8782407Abstract: An information processing device includes: a memory having a protected area which is a data recording area in which access restriction is set; and a data processing unit that determines accessibility in response to a request for accessing the protected area from an access requesting device, wherein the data processing unit verifies a device certificate received from the access requesting device and determines accessibility to the protected area based on access control information recorded in the device certificate.Type: GrantFiled: May 26, 2011Date of Patent: July 15, 2014Assignee: Sony CorporationInventors: Hiroshi Kuno, Kenjiro Ueda, Takamichi Hayashi, Munetake Ebihara, Koji Yoshimura
-
Patent number: 8782775Abstract: This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).Type: GrantFiled: September 9, 2008Date of Patent: July 15, 2014Assignee: Apple Inc.Inventors: Anthony Fadell, Andrew Hodge, Stephan Schell, Ruben Caballero, Jesse Lee Dorogusker, Stephen Zadesky, Emery Sanford
-
Patent number: 8782776Abstract: A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device.Type: GrantFiled: January 4, 2012Date of Patent: July 15, 2014Assignee: Dell Products L.P.Inventor: Roy Stedman
-
Patent number: 8782404Abstract: A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and consumers that rely on information technology products and/or services. Such products provide various capabilities such as protecting the corporate infrastructure from attack, protecting the client from attack, designing a customizable operating schema, advanced validation of client authentication, establishing a clean environment within a dirty environment, etcetera. Moreover, by ensuring that operating environment security is achieved, a product can provide guarantees that modern state-of-the-art systems cannot. Finally, diversification of hardware, software, firmware, and features creates robust products.Type: GrantFiled: September 7, 2010Date of Patent: July 15, 2014Inventor: Nicholas L. Lamb
-
Publication number: 20140196142Abstract: Authentication techniques for electronic devices can provide more seamless communication between two devices. A first device (e.g., a host device) can maintain a list of known-good devices (e.g., accessory devices) with which it can interoperate. Information identifying a second device can be added to the known-good list when the second device successfully connects to the first device and completes an authentication process. After the second device disconnects, the first device can retain the identifying information on the known-good list for a predetermined period of time, after which the information can expire. If the second device reconnects to the host before its information expires, the authentication process can be bypassed.Type: ApplicationFiled: January 7, 2013Publication date: July 10, 2014Applicant: Apple Inc.Inventors: Sylvain Louboutin, Lawrence G. Bolton
-
Patent number: 8776212Abstract: A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes a list of authorized devices that are permitted to send data to the protected computer, against which requests to send data are checked. The router also communicates with a remote authentication service to authenticate devices requesting such permission. The authentication service may be a cloud-based identity service.Type: GrantFiled: December 13, 2011Date of Patent: July 8, 2014Assignee: SurIDx, Inc.Inventor: Norman Schibuk
-
Patent number: 8775797Abstract: Systems, methods, and apparatus for validating product keys. In some embodiments, a product key includes security information and identification information identifying at least one copy of a software product. The security information may include a first portion to be processed by a first validation authority using first validation information and a second portion to be processed by a second validation authority using second validation information. The second validation information may be stored separately from the first validation information and may not be accessible to the first validation authority. In some embodiments, the first validation authority randomly determines whether a product key is to be audited by the second validation authority. Alternatively, the first validation authority may determine whether to audit based on a type of the software product associated with the product key and/or a perceived level of security risk.Type: GrantFiled: November 19, 2010Date of Patent: July 8, 2014Assignee: Microsoft CorporationInventors: Thomas J. Layson, Caglar Gunyakti, Tarik Soulami, Kalin Georgiev Toshev, Jeffrey Paul Harker, Josh D. Benaloh
-
Patent number: 8775819Abstract: A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorization methods each requiring data only from available user information entry devices. The user then selects one of the determined authorization methods for use in user authorization. Optionally, each authorization method is associated with a security level relating to user access to resources. Once the authorization method is selected, the user provides user authorization information in accordance with a determined user authorization method and registration proceeds.Type: GrantFiled: August 31, 2012Date of Patent: July 8, 2014Assignee: Activcard Ireland LimitedInventors: Laurence Hamid, Robert D. Hillhouse
-
Patent number: 8776215Abstract: In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to the computing device, inputs received by the device are restricted from being used by the computing device for uses other than authenticating the user.Type: GrantFiled: November 6, 2009Date of Patent: July 8, 2014Assignee: Microsoft CorporationInventors: Zachary W. Little, Alain Luc Michaud
-
Publication number: 20140189849Abstract: Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application.Type: ApplicationFiled: August 8, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
-
Publication number: 20140189857Abstract: The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved.Type: ApplicationFiled: December 30, 2013Publication date: July 3, 2014Applicant: EMC CorporationInventors: Feng Guo, Qiyan Chen, Tianqing Wang, Lintao Wan, Ziye Yang
-
Publication number: 20140189848Abstract: Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application.Type: ApplicationFiled: December 28, 2012Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: GARY D. CUDAK, LYDIA M. DO, CHRISTOPHER J. HARDEE, ADAM ROBERTS
-
Patent number: 8769618Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: GrantFiled: May 24, 2012Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Dirk Husemann, Michael Elton Nidd
-
Patent number: 8769703Abstract: A computing system using a persistent, unique identifier may be used to authenticate the system that ensures software and configurations of systems are properly licensed while permitting hardware components to be replaced. The persistent, unique system identifier may be coupled to serial numbers or similar hardware identifiers of components within the computing system while permitting some of the hardware components to be deleted and changed. When components that are coupled to the persistent, unique identifier are removed or disabled, a predefined time period is provided to update the coupling of the persistent, unique identifier to alternate hardware component in the system.Type: GrantFiled: December 29, 2006Date of Patent: July 1, 2014Assignee: Unisys CorporationInventors: Phillip M. Hoffman, Jeffery A. Stell, Jessica A. Paragas, Tatyana Martsun, Steven D. Schatz, Robert K. Liermann, Robert J. Sliwa
-
Patent number: 8769301Abstract: Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.Type: GrantFiled: July 28, 2011Date of Patent: July 1, 2014Assignee: QUALCOMM IncorporatedInventor: Ning Shang
-
Patent number: 8763110Abstract: A memory device is provided. The memory device includes a memory configured to store information. The memory device also includes a memory controller in communication with the memory. The memory controller is configured to encrypt the information to define a parameter and access an account on a second memory device based on the parameter to gain access to content. The content is stored in the second memory device and the memory device and the second memory device are configured to be removably coupled to a computing device.Type: GrantFiled: November 14, 2006Date of Patent: June 24, 2014Assignee: SanDisk Technologies Inc.Inventors: Fabrice Jogand-Coulomb, Farshid Sabet Sharghi, Bahman Qawami
-
Publication number: 20140173715Abstract: An information processing system includes a function unit having a plurality of functions; an execution command unit that prompts the function unit to execute one of the plurality of functions; an authentication information obtaining unit that obtains authentication information of a user; and a user authentication and function determination unit that authenticates the user based on the authentication information of the user and determines one function from the plurality of functions. The execution command unit prompts the function unit to execute the one function determined by the user authentication and function determination unit.Type: ApplicationFiled: December 9, 2013Publication date: June 19, 2014Applicant: RICOH COMPANY, LTD.Inventor: Shunsuke YANO
-
Publication number: 20140173713Abstract: The present invention discloses a verification code generation and verification method, including: displaying a verification code display region on a touch display module, where the verification code display region includes at least one user-recognizable verification code element; sensing a touch action of a user on the touch display module, and determining a position of the touch action on the touch display module; and comparing whether the position of the touch action of the user on the touch display module is the same as a position of the verification code element to determine whether a verification code is correctly input. The verification code generation and verification method in the embodiments of the present invention is convenient for the user to input a verification code for verification, and brings a good verification effect while facilitating operations. Further, the present invention discloses a verification code generation and verification apparatus.Type: ApplicationFiled: November 14, 2013Publication date: June 19, 2014Applicant: Huawei Technologies Co., Ltd.Inventors: Jiangzhen Zheng, Li Qian
-
Publication number: 20140173714Abstract: A lock execution method for information processing apparatus, includes performing a first authentication based on input information from a user after an application of a power source, preparing authentication information for a second authentication to be corresponded to the input information after the first authentication succeeds, performing the second authentication using the prepared authentication information, issuing a command to execute a lock operation for the information processing apparatus after the second authentication by the authentication succeeds, and invalidating at least some of content of manipulation input during a period time until the lock operation is completed after the command is issued at the issuing.Type: ApplicationFiled: December 2, 2013Publication date: June 19, 2014Applicant: FUJITSU LIMITEDInventor: Makiko NAKAO
-
Patent number: 8756677Abstract: An authentication scheme for unlocking a computing system may require a shortened password in some cases. For example, the computing system may be configured to determine a time that a user has been locked out of a computing device and to determine which of a plurality of time spans that the time falls within. The computing system may also prompt the user for a required password including a full password or a subset of the full password depending on the determined time span. The computing system may be further configured to display a visual indicator corresponding to the determined time span or a required password length on a visual display. A length of the required password for login may be progressively longer for each of the plurality of time spans as a time period that a respective time span covers increases.Type: GrantFiled: May 30, 2012Date of Patent: June 17, 2014Assignee: Google Inc.Inventor: Ullas Gargi
-
Patent number: 8755770Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.Type: GrantFiled: August 10, 2009Date of Patent: June 17, 2014Assignee: L-3 Communications CorporationInventor: James D Haverty
-
Patent number: 8756689Abstract: In an input/output virtualization-enabled computing environment, a device, method, and system for securely handling virtual function driver communications with a physical function driver of a computing device includes maintaining communication profiles for virtual function drivers and applying the communication profiles to communications from the virtual function drivers to the physical function driver, to determine whether the communications present a security and/or performance condition. The device, method and system may disable a virtual function driver if a security and/or performance condition is detected.Type: GrantFiled: June 29, 2012Date of Patent: June 17, 2014Assignee: Intel CorporationInventors: Nrupal R. Jani, Shannon L. Nelson, Gregory D. Cummings
-
Patent number: 8752137Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.Type: GrantFiled: May 28, 2010Date of Patent: June 10, 2014Assignee: Bladelogic, Inc.Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Allen Solin, Carl Adams
-
Patent number: 8752163Abstract: A method for authorizing a program sequence provides, despite centralization and the associated high latency and optionally faulty communication, an undisturbed program sequence accompanied by protection of base functionalities. Data of the program sequence may be maintained in various provided states, and at least one instruction of the program sequence which accesses the data is maintained in different, functionally equivalent implementations. The set of the state indices of the provided states and the multiset form a directed acyclic (multi)graph, wherein the provided states form the nodes, and the implementations of the instruction form the edges and/or multiple edges, of the graph.Type: GrantFiled: April 13, 2012Date of Patent: June 10, 2014Assignee: Steinberg Media Technologies GmbHInventors: Almar Kaid, Bernd Peeters, Thomas Rogowski
-
Publication number: 20140157399Abstract: One embodiment provides an information processing apparatus equipped with a housing having a first surface and a second surface opposite thereto and with a touch screen provided on the first surface of the housing. The information processing apparatus has a first operation receiver and an authentication processor. The first operation receiver is provided on the second surface of the housing. And, the authentication processor performs an authentication process based on operation of the first operation receiver.Type: ApplicationFiled: September 19, 2013Publication date: June 5, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Koji Yamamoto
-
Publication number: 20140157400Abstract: A security channel interface providing device is provided. The device includes a sensor unit that comprises at least two sensors configured to sense a motion of a user, and a control unit that determines whether or not at least two sensing values sensed by the sensors satisfy a security channel interface activation condition, and activates or inactivates a security channel interface according to a result of the determination. When the security channel interface is activated, the control unit provides a security channel to the user.Type: ApplicationFiled: November 18, 2013Publication date: June 5, 2014Applicants: Industry-Academia Cooperation Group of Sejong University, University-Industry Foundation, Yonsei UniversityInventors: Taekyoung Kwon, Sarang Na
-
Patent number: 8745725Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting an item has been transferred from a first user to a second user; and presenting, via the computing device, one or more highlighted portions of the item, the one or more highlighted portions being highlighted in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: December 28, 2011Date of Patent: June 3, 2014Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8745724Abstract: Systems and methods for partitioning memory into multiple secure and open regions are provided. The systems enable the security level of a given region to be determined without an increase in the time needed to determine the security level. Also, systems and methods for identifying secure access violations are disclosed. A secure trap module is provided for master devices in a system-on-chip. The secure trap module generates an interrupt when an access request for a transaction generates a security error.Type: GrantFiled: December 30, 2011Date of Patent: June 3, 2014Assignee: Broadcom CorporationInventor: Love Kothari
-
Publication number: 20140150084Abstract: A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing the plurality of execution environments based on a virtualization solution, and prevents private information from being illegally leaked by hacking by not directly exposing a PIN number or a password a user inputs using a virtual keyboard and a keyboard coordinate when authenticating the user.Type: ApplicationFiled: November 13, 2013Publication date: May 29, 2014Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Yun-Kyung LEE, Jae Deok LIM, Young Ho KIM, Jeong Nyeo KIM
-
Patent number: 8738932Abstract: A system and method for processor-based security is provided, for on-chip security and trusted computing services for software applications. A processor is provided having a processor core, a cache memory, a plurality of registers for storing at least one hash value and at least one encryption key, a memory interface, and at least one on-chip instruction for creating a secure memory area in a memory external to the processor, and a hypervisor program executed by the processor. The hypervisor program instructs the processor to execute the at least one on-chip instruction to create a secure memory area for a software area for a software module, and the processor encrypts data written to, and decrypts data read from, the external memory using the at least one encryption key and the verifying data read from the external memory using the at least one hash value. Secure module interactions are provided, as well as the generation of a power-on key which can be used to protect memory in the event of a re-boot event.Type: GrantFiled: January 19, 2010Date of Patent: May 27, 2014Assignee: Teleputers, LLCInventors: Ruby B. Lee, Champagne David
-
Patent number: 8738771Abstract: The invention provides a method and system for presenting information in a web document using a program applet to restrict further copying or redistribution. The web document includes a first region in which a graphical element or other information is displayed, and a second region covering the first region in which a program applet is invoked by a server for the web document. The program applet is dynamically created upon access, and assigned a serial number. The program applet contacts the server for permission to display the graphical element or other information; thus, the server can control, by granting or denying permission, when and if the program applet displays the graphical or other information.Type: GrantFiled: August 31, 2006Date of Patent: May 27, 2014Inventor: Julien T. Nguyen
-
Patent number: 8739275Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting one or more portions of one or more items and that was in possession of a first user has been transferred from the first user to a second user; and marking, in response to said determining, the one or more portions of the one or more items to facilitate the computing device in returning to the one or more portions upon the computing device being at least transferred back to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: December 8, 2011Date of Patent: May 27, 2014Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Publication number: 20140143856Abstract: Systems, devices, and techniques for providing shortcuts to applications of a computing device are described. In one example, a method includes outputting, for display at a screen, a plurality of input nodes while the computing device is in a locked state and receiving an indication of a selection of a set of the plurality of input nodes in a defined order. The method may also include determining that the selection matches a predetermined selection order of the input nodes, the predetermined selection order being associated with the computing device. The method may also include, responsive to the determining, outputting, for display in place of at least one of the plurality of input nodes at the screen, an icon representative of an operation executable by the computing device, receiving an indication of a selection of the icon, and responsive to receiving the indication, executing the operation.Type: ApplicationFiled: January 25, 2013Publication date: May 22, 2014Applicant: Google Inc.Inventors: Ronghua Wu, Qunshan Gu
-
Patent number: 8732475Abstract: Systems and methods are described that relate to authentication and/or binding of multiple devices with varying security profiles. In one aspect, a first device with a higher security profile may vouch for the authenticity of a second device with a lower security profile when the second device requests access for content from a content provider. The vouching process may be implemented by allowing the first device to overlay its digital signature on a registration request that has been signed and transmitted by the second device. The second device with the lower security profile may access content from the content provider or source for a predetermined time period, even when the second device does not access content through the first device.Type: GrantFiled: August 17, 2011Date of Patent: May 20, 2014Assignee: Comcast Cable Communication, LLCInventors: James W. Fahrny, Kyong Park
-
Patent number: 8732818Abstract: End-to-end authentication capability based on public-key certificates is combined with the Session Initiation Protocol (SIP) to allow a SIP node that receives a SIP request message to authenticate the sender of request. The SIP request message is sent with a digital signature generated with a private key of the sender and may include a certificate of the sender. The SIP request message my also be encrypted with a public key of the recipient. After receiving the SIP request, the receiving SIP node obtains a certificate of the sender and authenticates the sender based on the digital signature. The digital signature may be included in an Authorization header of the SIP request, or in a multipart message body constructed according to the S/MIME standard.Type: GrantFiled: September 28, 2012Date of Patent: May 20, 2014Assignee: Microsoft CorporationInventors: Jeremy T. Buch, David J. Simons
-
Patent number: 8732820Abstract: A method for imputing different usernames and passwords using an input device with a display to use different protected assets that requires the inputting of a preselected username into a username enter box and the inputting of a preselected password into a password entry box immediately prior to use. The method includes the steps of designating two or more username keys on said input device, each said username key being assigned with a unique letter or number located on said input device and to a unique username made of a plurality of alpha-number characters, designating two or more password keys on the input device each being assigned with a letter or number located on said input device and to a unique password made of a plurality of alpha-number characters. Next the protected asset is then accessed and the username key and keyword key assigned to the asset is imputed.Type: GrantFiled: April 16, 2012Date of Patent: May 20, 2014Inventor: Dean A. Craine
-
Publication number: 20140137231Abstract: In one embodiment, the present invention includes a system on a chip (SoC) that has a first agent with an intellectual property (IP) logic, an interface to a fabric including a target interface, a master interface and a sideband interface, and an access control plug-in unit to handle access control policy for the first agent with respect to incoming and outgoing transactions. This access control plug-in unit can be incorporated into the SoC at integration time and without any modification to the IP logic. Other embodiments are described and claimed.Type: ApplicationFiled: December 21, 2011Publication date: May 15, 2014Inventors: Manoj R. Sastry, Ioannis T. Schoinas, Robert J. Toepfer, Alpa T. Narendra Trivedi, Men Long
-
Patent number: 8726407Abstract: A method for authenticating a computing device or hardware component includes computer-implemented process steps for assigning a unique identifier to the hardware component, generating a baseline fingerprint for the hardware component using algorithm-processing characteristic configuration data determined from the hardware component as input, wherein the baseline fingerprint is capable of being regenerated from the hardware component so long as configuration of the hardware component is not changed, transmitting the identifier in association with the baseline fingerprint for storage in a computer-readable data structure, and generating a data signal, in response to a query comprising the assigned identifier, indicating whether the stored baseline fingerprint for the assigned identifier matches a second fingerprint regenerated from the hardware component at a time after the baseline fingerprint is generated.Type: GrantFiled: October 13, 2010Date of Patent: May 13, 2014Assignee: DeviceAuthority, Inc.Inventor: Craig S. Etchegoyen
-
Patent number: 8726365Abstract: A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a mobile computing device through a launcher. The configuration includes mapping one or more applications with a guest access code. The configuration receives, through a display screen of a mobile computing device, an access code, and determines whether the received access code corresponds with the guest access code. The configuration identifies the mapped applications corresponding to the guest access code and provides for display, on a screen of the mobile computing device, the identified applications.Type: GrantFiled: December 5, 2011Date of Patent: May 13, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Steven C. Lemke
-
Patent number: 8726000Abstract: Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module issues a challenge to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device.Type: GrantFiled: July 8, 2013Date of Patent: May 13, 2014Assignee: Bally Gaming, Inc.Inventors: Anand Singh, Pravinkumar Patel, Anthony E. Green, Raymond C. Cammilleri, Peter R. Pitts
-
Patent number: 8726364Abstract: Methods and systems to authenticate and load a plurality of boot logic modules in corresponding access protected memory regions of memory, and to maintain the access protections in run-time environments. Access protection may be implemented with access control list (ACL) policies expressed in terms of page boundaries to distinguish between read, write, and execute access requests.Type: GrantFiled: June 30, 2008Date of Patent: May 13, 2014Assignee: Intel CorporationInventor: Ned Smith
-
Patent number: 8726366Abstract: A computationally implemented method includes, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device, the computing device designed for presenting one or more items; ascertaining one or more particular formats for formatting the one or more items based, at least in part, on said determining; and presenting, via the computing device, the one or more items in the one or more particular formats. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: November 29, 2011Date of Patent: May 13, 2014Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8726346Abstract: Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver.Type: GrantFiled: October 23, 2012Date of Patent: May 13, 2014Assignee: Intel CorporationInventors: Changliang Wang, Periyakaruppan Kumaran Kalaiyappan, Xiaoyu Ruan, Radhakrishnan Venkataraman, Scott Janus, Tze Sen Fung
-
Patent number: 8726367Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting an item has been transferred from a first user to a second user; and presenting, via the computing device, one or more highlighted portions of the item, the one or more highlighted portions being highlighted in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: December 22, 2011Date of Patent: May 13, 2014Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8726019Abstract: In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship is based on the determination of a shared secret which in turn is generated from contextual information. The contextual information can be derived from the circumstances surrounding the communication session. For example, the contextual information can include topological information, time-based information, and transactional information. The shared secret may be self-generated or received from a third party. In either event, the shared secret may be used as key material for any cryptographic protocol used between the communication entities.Type: GrantFiled: February 10, 2006Date of Patent: May 13, 2014Assignee: QUALCOMM IncorporatedInventors: Michael Paddon, Gregory Gordon Rose, James Semple, Philip Michael Hawkes
-
Publication number: 20140123273Abstract: Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.Type: ApplicationFiled: October 26, 2012Publication date: May 1, 2014Inventor: Jonathan Arie Matus
-
Publication number: 20140123271Abstract: An image processing apparatus includes a request determining unit receiving an operation event indicating a request to use an image processing function and determining whether the request is from a guest user based on the received operation event; a guest login processing unit generating guest login information including a guest user identifier and access right information of the guest user if the request is from the guest user and sending a login request to request a login process for the guest user based on the guest login information; an access control unit disabling access control on the image processing function in response to the login request based on the access right information in the guest login information; and a usage history recording unit recording a usage history of the image processing function in association with the guest user based on the guest user identifier in the guest login information.Type: ApplicationFiled: January 8, 2014Publication date: May 1, 2014Applicant: RICOH COMPANY, LTD.Inventor: Yuichi ISHII
-
Patent number: 8713696Abstract: Methods and systems for dynamically bundling portions into secured destination files are provided. Example embodiments provide a Dynamic Digital Rights Bundling System (“DDRBS”), which dynamically bundles a set of portions each variously containing digital rights management components, user interface controls, and content, into a secured destination file in response to a designated content request. In one embodiment, the DDRBS comprises a bundling engine, a translation engine, a merging engine, and an assortment of data repositories. These components cooperate to dynamically assemble and provide customized secured destination files comprising the requested content together with specialized user interface and digital rights management controls. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.Type: GrantFiled: January 13, 2006Date of Patent: April 29, 2014Assignee: Demand Media, Inc.Inventor: Neal Bozeman