Patent application number | Description | Published |
20090002162 | Computer theft deterrence technology - A system embodiment associated with making a computer a less desirable target for a thief is described. A system embodiment may include a security timer that is to be periodically refreshed. If the security timer is not periodically refreshed, then a computer in which the system embodiment is located may be disabled by a theft deterrence logic. The system embodiment may also include a communication logic to communicate with a TDSP to request a signal to update the security timer. While a system embodiment is described, it is to be appreciated that other system embodiments having different elements and that method embodiments may be described. | 01-01-2009 |
20090086965 | SECURE, TWO-STAGE STORAGE SYSTEM - A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a write operation, the address translator receives unencrypted data blocks, from an initiator, and associates the blocks with corresponding scrambled data storage addresses. The cryptographic engine encrypts the unencrypted data blocks to be stored on the platform storage component at the corresponding scrambled data storage addresses. The address translator applies a predetermined reversible translation function to reversibly remap addresses, and the cryptographic engine applies a predetermined cryptographic technique to encrypt and decrypt the data blocks. In a read operation, encrypted data blocks retrieved from the storage component are decrypted and restored to an original logical order. Decryption of storage component data is allowed when storage component is coupled to the corresponding platform. | 04-02-2009 |
20090086980 | ENABLING A SECURE OEM PLATFORM FEATURE IN A COMPUTING ENVIRONMENT - A platform feature licensing module (e.g., a USB Smart Card Token) securely stores and communicates a platform feature enabling license, corresponding to a selectable platform feature, to an authenticated platform. The module includes a secure microcontroller, a secure communication port, and secure non-volatile memory in which is stored the platform feature enabling license. The module is configured to securely communicate with, and to authenticate the identity of the platform, via an integrated embedded controller embedded into the platform. The integrated embedded controller enables the selectable platform feature in response to a platform feature enabling license received from the platform feature licensing module. The integrated embedded controller and platform feature licensing module communicate securely using a predetermined public-key cryptography technique, with each having a PKI-based key pair to provide authentication and cryptographic services. | 04-02-2009 |
20100164722 | THEFT DETERRENCE TECHNOLOGY USING ASYNCHRONOUS NOTIFICATION - For one disclosed embodiment, an enabled state of a mobile computing platform may be modified in response to an asynchronous notification from a server. Other embodiments are also disclosed. | 07-01-2010 |
20100332744 | DATA RECOVERY AND OVERWRITE INDEPENDENT OF OPERATING SYSTEM - Methods and systems to access data in a computer system independent of an operating environment of the computer system, including to recover data to a remote system, to overwrite data, and to copy data to a hidden partition. A management system may directly access a storage device of the computer system and communicate with the remote system over a data channel that is secure from an operating environment of the computer system. The management system may access the storage device on a block basis, using a device driver associated with a storage device controller, and may include a virtualization engine to access the storage device. The remote system may include logic to request meta-data, to identify disk blocks corresponding to files of interest from the meta-data, and to construct the files of interest from the disk blocks. | 12-30-2010 |
20110076986 | THEFT DETERRENT TECHNIQUES AND SECURE MOBILE PLATFORM SUBSCRITION FOR WIRELESSLY ENABLED MOBILE DEVICES - Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed. | 03-31-2011 |
20110131447 | Automated modular and secure boot firmware update - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 06-02-2011 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 06-23-2011 |
20110154502 | Data Protection - A method to manage data access in an electronic device comprising a housing having a lid comprises receiving, from a remote server, a data protection policy, storing the data protection policy in a memory location on the electronic device, detecting a transition from a lid open status to a lid closed status, and in response to the transition, implementing the data protection policy on the electronic device. Other embodiments may be described. | 06-23-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20140047428 | AUTOMATED MODULAR AND SECURE BOOT FIRMWARE UPDATE - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 02-13-2014 |
20140092004 | AUDIO INFORMATION AND/OR CONTROL VIA AN INTERMEDIARY DEVICE - The present disclosure is directed to systems and methods related audio information and/or control via intermediary device. For example, a system may comprise a monitor, a peripheral device and a mobile device. The monitor may be configured to present multimedia information based on remote control information received in the monitor over, for example, a wired or wireless HDMI connection. Remote control information may include commands for controlling operation of the monitor when presenting the multimedia information. The peripheral device may be configured to reproduce sound associated with the multimedia information based on audio information received via, for example, wireless communication such as Bluetooth or WLAN. The mobile device may be configured to provide the remote control information to the monitor (e.g., via the wired or wireless HDMI connection) and to provide the audio information to the peripheral device (e.g., via the Bluetooth or WLAN wireless communication). | 04-03-2014 |
20150277580 | ALTERNATE DYNAMIC KEYBOARD FOR CONVERTIBLE TABLET COMPUTERS - Systems and methods may provide for detecting an event on a computing device having an embedded keyboard with a default mapping of keys to functions and disabling a first subset of keys on the embedded keyboard in response to the event. Additionally, a second subset of keys on the embedded keyboard may be re-mapped to one or more different functions if an application running on the computing device supports keyboard re-mapping. In one example, re-mapping the second subset of keys includes grouping two or more keys in the second subset into a common function. | 10-01-2015 |
20150381740 | SYSTEM AND METHOD FOR AUTOMATIC SESSION DATA TRANSFER BETWEEN COMPUTING DEVICES BASED ON ZONE TRANSITION DETECTION - A system and method for automatic session data transfer between computing devices based on zone transition detection are disclosed. A particular embodiment is configured to: determine if a mobile or wearable computing device is located within a proximity zone around a location of a stationary computing device; establish an authorized wireless data connection with the mobile or wearable computing device via a wireless transceiver; determine if the mobile or wearable computing device is likely departing the proximity zone and if so, upload user session data to the mobile or wearable computing device; and determine if the mobile or wearable computing device is likely approaching the stationary computing device and if so, download user session data from the mobile or wearable computing device. | 12-31-2015 |
Patent application number | Description | Published |
20080256129 | Method and System of Creating Media Playlists and Sending to Mobile Devices - The field of invention is computer-implemented systems and methods for creating and transmitting media to mobile devices, and in particular, methods and systems for locating, selecting, grouping, and arranging media items in playlists, and transmitting playlists to mobile devices and/or other electronic devices. This invention enhances the usability of mobile devices, and in particular, the usability of any mobile phone by making a user's media or third party media accessible to that user via the mobile phone. An object of the invention is to make any mobile phone a personal media player such as a “MP3 player”, a “Podcast” player, a “slideslow” viewer, and so on. | 10-16-2008 |
20090011780 | Methods and Systems of Creating and Managing Addresses Corresponding to Disparate Communication Channels and Sending Messages to and Receiving Replies from Such Addresses - The invention includes systems and methods for creating and managing lists of addresses (mobile phone numbers, email addresses, and so on) corresponding to disparate communication channels and sending messages to addresses or groups of addresses that may correspond to disparate communication channels, and receiving replies via one or more of these communication channels. In particular, the invention relates to systems and methods for creating and managing lists of addresses where some of the addresses may be mobile phone numbers and other addresses may correspond to other communication channels including email and systems and methods of determining the gateway or domain if an incomplete address, determining the MIME type for the content of the message, determining the wrapper for the content of the message, sending the message to one or more addresses or a group of addresses, and receiving replies via one or more of these communication channels. | 01-08-2009 |