Patent application number | Description | Published |
20090240814 | Unified pairing for wireless devices - A framework for users to connect to wireless devices, regardless of the underlying wireless technology. The framework has a modular structure, including discovery handlers, pairing handlers, and pairing ceremony modules. Discovery and pairing handlers are specific to each wireless technology, enabling discovery of wireless devices, and connection to the device. Pairing ceremony modules are technology independent, and may be invoked by any pairing handler, regardless of the wireless technology employed by a device. The framework provides an aggregation of wireless technologies into a common user interface, improving the user's experience and expanding possibilities for use of wireless technologies. | 09-24-2009 |
20100115146 | Pairing Service Technologies - Pairing service technologies is described. In embodiment(s), peripheral devices can be discovered, such as by a computer device, and a peripheral device can be configured with multiple services that each correspond to one or more data communication protocols. The multiple services of the peripheral device can be determined, and a pairing sequence can be prioritized for the multiple services. The data communication protocol(s) can then be paired according to the pairing sequence to configure the multiple services of the peripheral device. | 05-06-2010 |
20140007073 | Firmware Update Discovery and Distribution | 01-02-2014 |
20140359593 | MAINTAINING KNOWN DEPENDENCIES FOR UPDATES - A computer-implemented method for maintaining update dependencies includes receiving, at a computing device, an update set from an update service. The update set may include a dependent set including a first update having a dependency on a second update in the update set. The first and second updates are separated from the update set and installed. Upon installation, an activation condition may be applied to the first and second updates. | 12-04-2014 |
20140380340 | Dependency Based Configuration Package Activation - An update platform is described that collectively handles driver and firmware updates for hardware resources of a computing device based on dependencies associated with the updates. The update platform may instantiate representations of each individual hardware resource as abstractions through which detection, analysis, acquisition, deployment, installation, and tracking of updates is managed. Using the representations, the update platform discovers available updates, matches configuration packages for the updates to appropriate resources, and initiates installation of the configuration packages. The update platform is further configured to recognize dependencies associated with the configuration packages. When dependencies are detected, corresponding configuration packages are marked to reflect the dependencies and activation is suspended until the dependencies are satisfied. Upon satisfaction of the dependencies, the dependencies are cleared and the configuration packages are activated. Configuration packages that are not associated with dependencies may be installed and activated “normally” at any time. | 12-25-2014 |
Patent application number | Description | Published |
20130081101 | POLICY COMPLIANCE-BASED SECURE DATA ACCESS - Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates verification codes using an authentication seed. Prior to granting the client the authentication seed necessary to generate a verification code, a server may perform a policy check on the client. Some embodiments ensure that the client complies with security policies imposed by an authenticating party by retrieving a number of parameter values from the client and then determining whether those parameter values comply with the security policies. Upon determining that the client complies, the authentication seed is issued to the client. In some embodiments, the authentication seed is provided such that a policy check is performed upon the generation of a verification code. The client is given access to secure information when the client is determined to comply with the security policies. | 03-28-2013 |
20130085880 | IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM - A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be transparent to the guest system such that guest system may send and receive messages that are encrypted or decrypted by the support system, such as a hypervisor. As the support system is in between the guest system and a destination, the support system may act as a local endpoint to the secure connection. Messages may be altered by the support system to indicate to a guest system which communications were secured. The credentials may be managed by the support system such that the guest system does not require access to the credentials. | 04-04-2013 |
20130086661 | TECHNIQUES FOR CLIENT CONTRUCTED SESSIONS - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key's use. | 04-04-2013 |
20130086662 | PARAMETER BASED KEY DERIVATION - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key's use. | 04-04-2013 |
20130086663 | KEY DERIVATION TECHNIQUES - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key's use. | 04-04-2013 |
20140258732 | SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content. | 09-11-2014 |
20140310769 | TECHNIQUES FOR DELEGATION OF ACCESS PRIVILEGES - Systems and methods for controlling access to one or more computing resources relate to generating session credentials that can be used to access the one or more computing resources. Access to the computing resources may be governed by a set of policies and requests for access made using the session credentials may be fulfilled depending on whether they are allowed by the set of policies. The session credentials themselves may include metadata that may be used in determining whether to fulfill requests to access the one or more computing resources. The metadata may include permissions for a user of the session credential, claims related to one or more users, and other information. | 10-16-2014 |
20150304294 | ENTITY TO AUTHORIZE DELEGATION OF PERMISSIONS - Systems and methods are described for delegating permissions to enable account access. The systems utilize a delegation profile that can be created within a secured account of at least one user. The delegation profile includes a name, a validation policy that specifies principals which may be external to the account and which are permitted to assume the delegation profile, and an authorization policy that indicates the permitted actions within the account for those principals which are acting within the delegation profile. Once the delegation profile is created, it can be provided to external principals or services. These external principals or services can use the delegation profile to obtain credentials for performing various actions in the account using the credentials of the delegation profile. | 10-22-2015 |
20150312356 | ACCOUNT STATE SIMULATION SERVICE FOR CLOUD COMPUTING ENVIRONMENTS - Methods and apparatus for an account state simulation service for cloud computing environments are disclosed. A system includes a plurality of service managers coordinating respective distributed network-accessible services, and a metadata manager. The metadata manager receives an account state change simulation request, indicating (a) an initial account state of a client account and (b) a collection of operations to be simulated. The metadata manager generates a response to the account change state simulation request, comprising at least one of (a) a representation of an expected end state of the client account reachable as a result of performing the collection of operations (b) an indication of an expected failure of a particular operation of the collection of operations or (c) an estimate of an expected billing amount associated with an implementation of the collection of operations. | 10-29-2015 |
Patent application number | Description | Published |
20140208123 | PRIVILEGED CRYPTOGRAPHIC SERVICES IN A VIRTUALIZED ENVIRONMENT - A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other security resources in a multitenant remote program execution environment. The privileged service can receive requests to use the cryptographic keys and issue responses to these requests. In addition, the privileged service can measure the hypervisor at runtime (e.g., either periodically or in response to the requests) in an attempt to detect evidence of tampering with the hypervisor. Because the privileged service is operating in system management mode that is more privileged than the hypervisor, the privileged service can be robust against virtual machine escape and other hypervisor attacks. | 07-24-2014 |
20140236864 | ALLOCATING FINANCIAL RISK AND REWARD IN A MULTI-TENANT ENVIRONMENT - Multi-tenant resources can be funded using payment submitted with requests for those resources, such that the resources do not need to be associated with a specific user account. A resource can be allocated and available as long as payment has been provided. If a user wants the resource to be available for additional processing, for example, the user can submit another request with additional funding. The funding can come in the form of donations from any user, or in the form of investments where the investor expects some return on the investment in the form of revenue, visibility, or other such compensation. One or more management components can track funding for various resources, can accept and select bids for period of sponsorship, and can manage various donation models. | 08-21-2014 |
20140282950 | AUTOMATED SECRET RENEGOTIATION - Secret information, such as seeds, codes, and keys, can be automatically renegotiated between at least one sender and at least one recipient. Various mechanisms, such as counters, events, or challenges, can be used to trigger automatic renegotiations through various requests or communications. These changes can cause the current secret information to diverge from older copies of the secret information that might have been obtained by unintended third parties. In some embodiments, a secret can be configured to “decay” over time, or have small changes periodically introduced that can be determined to be valid by an authorized party, but can reduce the effectiveness of prior versions of the secret information. | 09-18-2014 |
20140380054 | MULTIPLE AUTHORITY DATA SECURITY AND ACCESS - Data is encrypted such that multiple keys are needed to decrypt the data. The keys are accessible to different entities so that no single entity has access to all the keys. At least one key is managed by a service provider. A customer computer system of the service provider may be configured with executable instructions directing the orchestration of communications between the various entities having access to the keys. As a result, security compromise in connection with a key does not, by itself, render the data decryptable. | 12-25-2014 |
20140380402 | POLICY ENFORCEMENT DELAYS - Policies are used to control access to resources. Requests to change a set of policies may be fulfillable, at least in some circumstances, only if the requests are submitted such that the requested changes would become effective at a time in the future that is in compliance with a requirement for delayed enforcement. The requirement for delayed enforcement may be encoded in a policy in the set of policies. | 12-25-2014 |
20150019858 | DATA LOSS PREVENTION TECHNIQUES - Data received through a proxy for a service is analyzed for compliance with one or more data policies, such as one or more data loss prevention policies. When data satisfies the criteria of one or more data policies, the data is manipulated at the proxy prior to transmission of the data to the service. In some examples, the manipulation of the data includes encryption. | 01-15-2015 |
20150089233 | RESOURCE LOCATORS WITH KEYS - Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request. | 03-26-2015 |
20150089244 | DATA SECURITY USING REQUEST-SUPPLIED KEYS - Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request processing entity, upon receipt of the request, extracts the key from the request and uses the key to perform one or more cryptographic operations to fulfill the request. The one or more cryptographic operations may include encryption/decryption of data that to be/is stored, in encrypted form, by a subsystem of the request processing entity. Upon fulfillment of the request, the request processing entity may perform one or more operations to lose access to the key in the request, thereby losing the ability to use the key. | 03-26-2015 |
20150304310 | REVOCABLE SHREDDING OF SECURITY CREDENTIALS - Customers accessing resources and/or data in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests associated with the customer. A multi-tenant cryptographic service can be used to manage cryptographic key material and/or other security resources in the multi-tenant environment. The cryptographic service can provide a mechanism in which the service can receive requests to use the cryptographic key material to access encrypted customer data, export key material out of the cryptographic service, destroy key material managed by the cryptographic service, among others. Such an approach can enable a customer to manage key material without exposing the key material outside a secure environment. | 10-22-2015 |
Patent application number | Description | Published |
20080226750 | Methods, Compositions and Articles of Manufacture for Treating Shock and Other Adverse Conditions - The present invention concerns the use of active compounds for inducing apnea and treating shock, in addition to enhancing the survivability of a subject. It includes compositions, methods, articles of manufacture and apparatuses for enhancing survivability and for achieving these effects. | 09-18-2008 |
20080318864 | METHODS AND COMPOSITIONS REGARDING POLYCHALCOGENIDE COMPOSITIONS - The present invention concerns the use of polychalcogenide compositions on cells, tissue, organs, and organisms to enhance their survivability. It includes compositions, compounds, methods, articles of manufacture and apparatuses for enhancing survivability and for protecting them from or treating them for injury or damage. In specific embodiments, there are also therapeutic methods and apparatuses for hypoxic/ischemic injury, organ transplantation, hyperthermia, wound healing, hemorrhagic shock, cardioplegia for bypass surgery, neurodegeneration, hypothermia, and cancer using the polychalcogenide compositions described. | 12-25-2008 |
20090011051 | Methods, Compositions and Articles of Manufacture for HIF Modulating Compounds - The present invention generally relates to the modulation of hypoxia-inducible factor (HIF) using the compounds and methods disclosed herein. These compounds and methods can be applied to the prevention, pretreatment, and/or treatment of conditions or states associated with HIF, such as hypoxia- and ischemia-related conditions and the induction of stasis. | 01-08-2009 |
20100021387 | Methods for Inducing Reversible Stasis - The present invention concerns compositions and methods involving incubating biological materials under hypoxic or anoxic conditions to induce stasis or suspended animation. Methods of screening for compounds that induce stasis or compounds that increase the ability to undergo stasis are included. Such methods have ramifications for preserving biological materials as well as reducing or preventing trauma to biological materials. Also contemplated are methods for screening compounds that are active or more active under hypoxic conditions than normoxic conditions. Such methods can be used to identify antitumor compounds that would operate under hypoxic conditions in which tumor cells survive. | 01-28-2010 |
20120040024 | METHODS AND COMPOSITIONS FOR ENHANCING SURVIVABILITY OF CELLS, TISSUES, ORGANS AND ORGANISMS - The present invention concerns the use of oxygen antagonists and other active compounds for inducing stasis or pre-stasis in cells, tissues, and/or organs in vivo or in an organism overall, in addition to enhancing their survivability. It includes compositions, methods, articles of manufacture and apparatuses for enhancing survivability and for achieving stasis or pre-stasis in any of these biological materials, so as to preserve and/or protect them. In specific embodiments, there are also therapeutic methods and apparatuses for organ transplantation, hyperthermia, wound healing, hemorrhagic shock, cardioplegia for bypass surgery, neurodegeneration, hypothermia, and cancer using the active compounds described. | 02-16-2012 |
20120135091 | METHODS AND COMPOSITIONS FOR ENHANCING LIFESPAN INVOLVING SIRTUIN-MODULATING COMPOUNDS AND CHALCOGENIDES - The present invention concerns the use of active compounds, including chalcogenides and sirtuin-modulating compounds, either alone or in combination for increasing or enhancing survivability and/or longevity in biological matter. In general aspects, the chalcogenides and other active compounds may modulate one or more sirtuin proteins. It includes compositions, methods, articles of manufacture and apparatuses for enhancing survivability in any of these biological materials, so as to preserve and/or protect them. In specific embodiments, there are also therapeutic methods and apparatuses for aging or stress, diabetes, obesity, neurodegenerative diseases, cardiovascular disease, blood clotting disorders, inflammation, cancer, organ transplantation, hyperthermia, wound healing, hemorrhagic shock, cardioplegia for bypass surgery, neurodegeneration, hypothermia, and cancer using the active compounds described. | 05-31-2012 |
20120244067 | METHODS FOR INDUCING REVERSIBLE STASIS - The present invention concerns compositions and methods involving incubating biological materials under hypoxic or anoxic conditions to induce stasis or suspended animation. Methods of screening for compounds that induce stasis or compounds that increase the ability to undergo stasis are included. Such methods have ramifications for preserving biological materials as well as reducing or preventing trauma to biological materials. Also contemplated are methods for screening compounds that are active or more active under hypoxic conditions than normoxic conditions. Such methods can be used to identify antitumor compounds that would operate under hypoxic conditions in which tumor cells survive. | 09-27-2012 |
20120282353 | METHODS, COMPOSITIONS AND ARTICLES OF MANUFACTURE FOR HIF MODULATING COMPOUNDS - The present invention generally relates to the modulation of hypoxia-inducible factor (HIF) using the compounds and methods disclosed herein. These compounds and methods can be applied to the prevention, pretreatment, and/or treatment of conditions or states associated with HIF, such as hypoxia- and ischemia-related conditions and the induction of stasis. | 11-08-2012 |
20130252897 | Methods and Compositions Regarding Polychalcogenide Compositions - The present invention concerns the use of polychalcogenide compositions on cells, tissue, organs, and organisms to enhance their survivability. It includes compositions, compounds, methods, articles of manufacture and apparatuses for enhancing survivability and for protecting them from or treating them for injury or damage. In specific embodiments, there are also therapeutic methods and apparatuses for hypoxic/ischemic injury, organ transplantation, hyperthermia, wound healing, hemorrhagic shock, cardioplegia for bypass surgery, neurodegeneration, hypothermia, and cancer using the polychalcogenide compositions described. | 09-26-2013 |
20150290240 | COMPOSITIONS COMPRISING CHALCOGENIDES AND RELATED MATTERS - This invention relates to compositions comprising chalcogenides in a reduced form, related methods of producing compositions comprising chalcogenides in a reduced form, devices for delivering a reduced form of a compound to a subject, as well as to methods for treating or preventing injuries or disease using a composition comprising a chalcogenide in a reduced form. | 10-15-2015 |
Patent application number | Description | Published |
20120166953 | TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed. | 06-28-2012 |
20120166954 | TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed. | 06-28-2012 |
20120254713 | TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed. | 10-04-2012 |
20130174001 | TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed. | 07-04-2013 |
20130318042 | TECHNIQUES TO AUTOMATICALLY MANAGE FILE DESCRIPTORS - Techniques to automatically manage file descriptors are described. An apparatus may comprise a processor circuit and a file descriptor application operative on the processor circuit to manage file descriptors for content files, the file descriptor application arranged to receive a file descriptor request from a client application, generate a file descriptor or file descriptor construct information for a content file, and send a file descriptor response with the file descriptor or file descriptor construct information to the client application. Other embodiments are described and claimed. | 11-28-2013 |
20140208212 | TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed. | 07-24-2014 |
20140379851 | AGGREGATING CONTENT FROM DIFFERENT CONTENT SOURCES AT A CLOUD SERVICE - A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include electronic messages, calendar information, contacts, social network content, feed data, search results, and the like. The cloud service aggregates content for each user based on the user's configuration settings. The cloud service may perform processing on the aggregated content before it is delivered and displayed to the user on the client device. For example, one or more views may be generated and stored by the cloud service before the view is requested from the client. Changes made to the aggregated content on the client may be synchronized with the content source. Searches may be made across all or a portion of the different content sources that are aggregated for a user. | 12-25-2014 |
20150207768 | DERIVING ATOMIC COMMUNICATION THREADS FROM INDEPENDENTLY ADDRESSABLE MESSAGES - When a message is received, the recipient set in the message, as well as ancestor message identifiers, are analyzed. The received message is either placed in an existing thread in an existing conversation, or in a new thread in the conversation, based upon the analysis of the recipient set and the ancestor identifiers. | 07-23-2015 |
20150263995 | IDENTIFYING RELATIONSHIPS BETWEEN MESSAGE THREADS - A message related to a first thread is received, and a fork in the conversation is identified. The received message is placed in a second thread and a display shows the fork and that the two threads are related. | 09-17-2015 |
20150269125 | NORMALIZING MESSAGE STYLE WHILE PRESERVING INTENT - Techniques are described herein for normalizing the recipient style of electronic messages while preserving the discernible intent of the sender. Given an electronic message or series of messages with varying visual styles applied to message text and other content, the electronic message may be transformed with a normalized and consistent formatting style that is more pleasing to the recipient, while preserving the sender's discernible intent in stylizing the message. | 09-24-2015 |
Patent application number | Description | Published |
20110316928 | WIPING DEVICE FOR INKJET PRINTERS - A wiping device for an inkjet printer includes a wiper mount moveable between a wiping position and a non-wiping position. A slider coupled to the wiper mount, translates between a retracted position and a deployed position. A first translation of the slider to the deployed position causes the wiper mount to move into the wiping position. A trigger, operable between a cocked position and an un-cocked position is coupled to the slider. In the cocked position, the trigger locks the wiper mount in the wiping position. When actuated, the trigger moves to the un-cocked position and the wiper mount moves to the non-wiping position. The wiping device includes logic to control the actuation and non-actuation of trigger. | 12-29-2011 |
20120013679 | APPARATUS FOR CLEARING AN INK DROP STALAGMITE IN AN INKJET PRINTER - An apparatus for use as part of an inkjet printer to clear an ink drop stalagmite in the printer. In one embodiment the apparatus includes a clearing device coupled to an access door of the inkjet printer, wherein upon operation of the access door the clearing device at least partially clears the ink drop stalagmite. | 01-19-2012 |
20130021409 | WIPER FOR AN INKJET PRINTER - In an inkjet printer having a small print head assembly and a large print head assembly, a wiper includes a first wiper section having a width approximately equal to a width of an orifice area of the small print head assembly, a decoupler adjacent to the first wiper section, a second wiper section adjacent to the decoupler, where the first and the second wiper sections and the decoupler combined have a width approximately equal to a width of an orifice area of the large print head assembly, and a squared tip at an extremity of the single, segmented wiper to impede wicking action. A tab holds the wiper oriented so as to wipe the print head assemblies in a direction of a printing operation. | 01-24-2013 |
20130106948 | CAPPING FOR INKJET PRINTERS | 05-02-2013 |