Patent application number | Description | Published |
20140096178 | ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS - Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access. | 04-03-2014 |
20140181909 | SYSTEM AND METHOD FOR SECURED ACCESS MANAGEMENT - A system and method for managing secure access to one or more applications and data provided via the application based on trustworthiness of a client device. The system is configured to establish a level of trustworthiness of the client device based, at least in part, on attributes of the client device and the user of the client device. In the event that the level of trustworthiness meets or exceeds a predefined trust level for a corresponding application, the system is configured to authorize and allow the client device to execute the application and access data provided via the application. Alternatively, in the event that the level of trustworthiness falls below a predefined trust level, the system is configured to restrict execution of the application and/or access to data provided via the application. | 06-26-2014 |
20140189777 | POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS - Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed. | 07-03-2014 |
20140258231 | DEVICE SYNCHRONIZATION POLICY MANAGEMENT - Generally, this disclosure provides devices, methods and computer readable media for device synchronization policy management. The device may include a context determination module configured to determine a usage context associated with the device; a content determination module configured to determine a data content classification associated with data to be synchronized between the device and a cloud; a synchronization policy database configured to store synchronization policies, the policies based on the device usage context, the data content classification and a classification of the cloud type; and a synchronization policy management module configured to select a synchronization policy from the synchronization policy database and further configured to synchronize the data with the cloud based on the selected synchronization policy. | 09-11-2014 |
20140259116 | SECURE USER AUTHENTICATION WITH IMPROVED ONE-TIME-PASSCODE VERIFICATION - Generally, this disclosure provides systems, devices, methods and computer readable media for secure user authentication with improved OTP verification. The device may include an attribute collection module configured to collect attributes associated with the device; a client trust module configured to identify a user of the device, associate a user ID with the user and transmit the user ID and the collected attributes to a trust broker system; the client trust module further configured to receive a device ID from the trust broker system, the device ID associated with a pairing of the user ID and the attributes; and a client OTP generation module configured to generate an OTP and further configured to transmit the OTP and the device ID to an authentication server. | 09-11-2014 |
20140282832 | METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY - Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred. | 09-18-2014 |
20140331315 | EYE MOVEMENT BASED KNOWLEDGE DEMONSTRATION - Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to authentication, are disclosed. In embodiments, a computing device may determine whether a received input of a pattern of eye movements is consistent with an expected pattern of eye movements of a user when the user attempts to visually locate a piece of information embedded in a display. In embodiments, the expected pattern of eye movements may include patterns related to fixations and/or other statistical patterns, however, may not be limited to such patterns. In applications, determining consistency or correlation with the expected pattern of eye movements may identify the user by simultaneously verifying at least factors of authentication—that of biometric criteria related to a user's pattern of eye movements and a password or other information known to the user. | 11-06-2014 |
20150179033 | METHODS AND APPARATUS FOR PAIRING ITEMS FOR SECURITY - An item of value comprises an assembly of parts. The parts comprise a component that has value independent of the item, and an assembly security system that is operable to communicate with a central security system via a wide area network. The component comprises a component security system that is operable to communicate with the assembly security system. The assembly security system is operable to perform operations comprising (a) saving component data that identifies the component as part of the item; (b) after saving the component data, monitoring the component, via the component security system, to automatically determine whether the component has left a predetermined zone of proximity, relative to the item; and (c) in response to determining that the component has left the predetermined zone of proximity, automatically notifying the central security system that the component has left the predetermined zone of proximity. Other embodiments are described and claimed. | 06-25-2015 |