Patent application number | Description | Published |
20080250406 | Virtual Machine Support for Metered Computer Usage - A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring | 10-09-2008 |
20080319779 | Activation system architecture - Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound. | 12-25-2008 |
20100037325 | Enhanced Packaging for PC Security - A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers. | 02-11-2010 |
20120005721 | PROCESSING UNIT ENCLOSED OPERATING SYSTEM - A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data, and subsystem functions such as a secure clock, policy management, and policy enforcement. Data in functions within the secure memory are not accessible from outside the processing unit. | 01-05-2012 |
20140095394 | ACTIVATION SYSTEM ARCHITECTURE - Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound. | 04-03-2014 |
20150067768 | ZONE POLICY ADMINISTRATION FOR ENTITY TRACKING AND PRIVACY ASSURANCE - The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected. | 03-05-2015 |
20150215245 | USER INTERFACE FOR GRAPHICAL REPRESENTATION OF AND INTERACTION WITH ELECTRONIC MESSAGES - A method and a device are disclosed including a user interface configured to display and manage grouped graphical representations of electronic data and messages, such as files and emails, that can be zoomed in to access different types of information and details about one or a group of messages. The user interface further allows searching for, dispositioning, and taking various actions on one or a group of messages. In various embodiments, the graphical representation includes grids of grids or tiles, and in other embodiments, it includes fractal representations such as quadratic fractals. At least four types of zoom operations are disclosed including digital zoom to enlarge images, context-zoom to show different information types about messages like folders, categories, collections, etc. depending on context; semantic-zoom to show different data depending on level of detail; and metadata-zoom to show metadata about a message such as timestamp, existence of attachments, and the like. | 07-30-2015 |
20150264024 | SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING - A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks. | 09-17-2015 |