Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Omer Ben-Shalom, Rishon Le-Tzion IL

Omer Ben-Shalom, Rishon Le-Tzion IL

Patent application numberDescriptionPublished
20130339740MULTI-FACTOR CERTIFICATE AUTHORITY - Disclosed herein is a certificate authority server configured to provide multi-factor digital certificates. A processor readable medium may include a plurality of instructions configured to enable a certificate authority server of a certificate authority, in response to execution of the instructions by a processor, to receive a request to provide a multi-factor digital security certificate by digitally signing a certificate request having a plurality of factors and a cryptographic key, wherein a first of the plurality of factors is an identifier of a device and a second of the plurality of factors is an identifier of a user of the device. The instructions are also configured to enable the certificate authority server to associate the cryptographic key with the plurality of factors and issue the digital security certificate based on the certificate request. Also disclosed is a method of using a multi-factor digital certificate as part of the authorization process to implicitly bind the plurality of factors. Other embodiments may be described and claimed.12-19-2013
20140094121INTEGRATING WIRELESS INPUT FUNCTIONALITY INTO SECURE ELEMENTS - Systems and methods may provide for establishing an out-of-band (OOB) channel between a local wireless interface and a remote backend receiver, and receiving information from a peripheral device via the local wireless interface. Additionally, the information may be sent to the backend receiver via the OOB channel, wherein the OOB channel bypasses a local operating system. In one example, a secure Bluetooth stack is used to receive the information from the peripheral device.04-03-2014
20140095852MULTI-PERSONA COMPUTING BASED ON REAL TIME USER RECOGNITION - A computing device may configure one or more applications on the computing device for a specific user in response to identifying that the specific user is operating the device and may make relevant content available to such applications. The identification of the specific user may be performed using a signal from one or more user identification sensors.04-03-2014
20140095887METHOD AND APPARATUS FOR MAINTAINING TRUSTED TIME AT A CLIENT COMPUTING DEVICE - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for maintaining trusted time at a client computing device including, for example, executing a computer program within a client device; initiating a call from the computer program to a secure time service of the client device requesting a trusted time stamp; retrieving, via the secure time service of the client device, a protected time from protected clock hardware of the client device; generating, at the secure time service of the client device, the trusted time stamp by signing the protected time retrieved from the protected clock hardware of the client device; and returning the trusted time stamp to the computer program. Other related embodiments are disclosed.04-03-2014
20140096177FACILITATING VARIED ACCESS BASED ON AUTHENTICATION SCORING - Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment. Additionally, the composite false match rate can be mapped to a score, wherein an attestation message is generated based on the score. In one example, the score is associated with one or more of a standardized range and a standardized level.04-03-2014
20140096178ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS - Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.04-03-2014
20140096179SYSTEM AND METHOD FOR PERFORMING SECURE COMMUNICATIONS - A system establishes secure communications between first and second electronic devices. The first device stores secured content to be accessed by second device based on identification information of the first device. The identification information of the first device may be manually input into the second device, and the second device may perform an initial pairing operation with the first device based on this manually entered information. The identification information stored from initial pairing may allow secure automatic pairing.04-03-2014
20140241187SYSTEMS AND METHODS FOR AVOIDING INTERFERENCE FOR A PEER-TO-PEER NETWORK CONNECTION - Systems and methods are described herein for avoiding interfering with 5 GHZ frequency band signals with a peer-to-peer wireless local area network connection. A peer-to-peer client is notified of radar signals in proximity to the client over a master-to-client wireless local area connection with an enterprise access point. If the notification includes a non-interfering radar channel, the peer-to-peer client resets the peer-to-peer channel to the non-interfering radar channel. If the notification does not provide a non-interfering radar channel, the peer-to-peer client resets the peer-to-peer network connection to a non-dynamic frequency selection channel and may disconnect the Wi-Fi connection with the enterprise access point.08-28-2014
20140281477Secure Cloud Storage and Encryption Management System - An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to the storage system. The devices have secure out-of-band cryptoprocessors that conceal a private key. The private key corresponds to a public key that is used to encrypt a session key and information, both of which are passed to and through cloud based storage, all while remaining encrypted. The encrypted material is communicated from the cloud to another of the user's devices where the encrypted material is decrypted within a secure out-of-band cryptoprocessor (using the private key that corresponds to the aforementioned public key) located within the device. The embodiment allows for secure provisioning of the private key to the devices. The private key is only decrypted within the cryptoprocessor so the private key is not “in the open”. Other embodiments are described herein.09-18-2014
20140281486COMMUNITY-BASED DE-DUPLICATION FOR ENCRYPTED DATA - Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.09-18-2014
20140331315EYE MOVEMENT BASED KNOWLEDGE DEMONSTRATION - Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to authentication, are disclosed. In embodiments, a computing device may determine whether a received input of a pattern of eye movements is consistent with an expected pattern of eye movements of a user when the user attempts to visually locate a piece of information embedded in a display. In embodiments, the expected pattern of eye movements may include patterns related to fixations and/or other statistical patterns, however, may not be limited to such patterns. In applications, determining consistency or correlation with the expected pattern of eye movements may identify the user by simultaneously verifying at least factors of authentication—that of biometric criteria related to a user's pattern of eye movements and a password or other information known to the user.11-06-2014
Website © 2015 Advameg, Inc.