Patent application number | Description | Published |
20140075502 | RESOURCE MANAGEMENT OF EXECUTION ENVIRONMENTS - Techniques for managing resources on a computing device may include a resource management module that can identify an asset available for use by the computing device. The asset can be classified based on one or more properties of the asset, and the value of the asset is determined based on the classification. The resource management module may determine that the value of the asset has changed, and the asset is ranked based on the value of the asset. The appropriate execution environment for the asset can be determined based on the ranking, and the asset can be dynamically migrated from one execution environment to another execution environment based on the dynamic value of the asset. | 03-13-2014 |
20140089261 | System and Method for Maintaining Device State Coherency - Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message. | 03-27-2014 |
20140173686 | Device Communication Based On Device Trustworthiness - Techniques for assessing the trustworthiness of a target device that a user device is attempting to communicate with are described. A user device may request one or more trustworthiness attributes of a target device before exchanging data with the target device. The user device may receive the one or more trustworthiness attributes of the target device, and determine, based on the received one or more trustworthiness attributes of the target device, a set of one or more security policies to enforce on a communication channel used for exchanging data between the user device and the target device. A communication channel between the user device and the target device can then be established according to the set of one or more security policies. | 06-19-2014 |
20140316919 | AUTOMATED SECURE CHECK-OUT AND DROP-OFF RETURN OF PRODUCTS USING MOBILE DEVICE - Generally, this disclosure describes a method and system for automated check-out and drop-off return of products using a mobile device. A method may include purchasing at least one product of a plurality of products wherein each product is located at a respective associated product location in a store that sells the plurality of products and a point of sale of each purchased product corresponds to the respective associated product location. | 10-23-2014 |
20140331279 | SECURITY ENGINE FOR A SECURE OPERATING ENVIRONMENT - The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device. | 11-06-2014 |
20140372754 | IMAGE BASED KEY DERIVATION FUNCTION - Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data. | 12-18-2014 |
20140373104 | DATA SENSITIVITY BASED AUTHENTICATION AND AUTHORIZATION - Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item. | 12-18-2014 |
20150030153 | REPEATABLE APPLICATION-SPECIFIC ENCRYPTION KEY DERIVATION USING A HIDDEN ROOT KEY - Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption engine. The execution hardware is to execute instructions to deterministically generate an application-specific encryption key using the encryption algorithm. | 01-29-2015 |