Patent application number | Description | Published |
20090292924 | MECHANISM FOR DETECTING HUMAN PRESENCE USING AUTHENTICATED INPUT ACTIVITY - When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature. | 11-26-2009 |
20110078799 | Computer system and method with anti-malware - In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service. | 03-31-2011 |
20130290322 | SEARCHING FOR SOFTWARE APPLICATIONS BASED ON APPLICATION ATTRIBUTES - An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application. | 10-31-2013 |
20130347058 | Providing Geographic Protection To A System - In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed. | 12-26-2013 |
20140089658 | METHOD AND SYSTEM TO SECURELY MIGRATE AND PROVISION VIRTUAL MACHINE IMAGES AND CONTENT - A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key. | 03-27-2014 |
20140115662 | Mechanism for Detecting Human Presence Using Authenticated Input Activity Timestamps - When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature. | 04-24-2014 |
20140181888 | SECURE LOCAL WEB APPLICATION DATA MANAGER - Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input. | 06-26-2014 |
20150082031 | Method and System to Securely Migrate and Provision Virtual Machine Images and Content - A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key. | 03-19-2015 |