Optio Labs, Inc. Patent applications |
Patent application number | Title | Published |
20140283136 | SYSTEMS AND METHODS FOR SECURING AND LOCATING COMPUTING DEVICES - Methods and systems are provided for identifying a computing device and/or the user of such a device and granting or prohibit access to one or more devices based on the location of the computing device. User devices include receivers and emitters for localization signals, and behavior of user devices or user interaction devices are modified according to received localization signals. Example systems may provide tracking media streaming to local devices, automatic configuration of transmitters, or adaptation of multi-user interactions based on user location. | 09-18-2014 |
20140282992 | SYSTEMS AND METHODS FOR SECURING THE BOOT PROCESS OF A DEVICE USING CREDENTIALS STORED ON AN AUTHENTICATION TOKEN - Methods and systems are provided for securing devices in which a secure external authentication token is used to verify user credentials prior to enabling the operating system of the device by loading or decrypting the operating system. Suitable external authentication tokens can include smartcards such as a common access card and may be verified by cryptographic processes either at a local server or via a remote credentials processor. | 09-18-2014 |
20140282857 | SYSTEMS AND METHODS TO SYNCHRONIZE DATA TO A MOBILE DEVICE BASED ON A DEVICE USAGE CONTEXT - A method, system, and computer-readable medium for synchronizing policy data on a device based on device usage context. By synchronizing policy data on the device based on device usage context, security, bandwidth and energy efficiency concerns associated with the current data synchronization art by intelligently organizing and prioritizing the updating of policy data in compliance with policy data. | 09-18-2014 |
20140273857 | SYSTEMS AND METHODS TO SECURE SHORT-RANGE PROXIMITY SIGNALS - A system for short-range communications includes a device and a server. The mobile device receives information via short range wireless signals, processes that information, and transmits information to the server. The server uses the information to verify that the information from the device is consistent with a device currently located in the location. Such verification may be done using cryptographic or signal processing techniques. | 09-18-2014 |
20140201807 | SYSTEMS AND METHODS FOR ENFORCING SECURITY IN MOBILE COMPUTING - Methods and systems described herein relate to enhancing security on a device by configuring one or more software functions in a trusted zone of a processor using object firewalls, IPC mechanisms, and/or a policy engine. An inter-process communication mechanism and inter-process communication bus enable secure inter-process communication between inter-process communication applications within the trusted zone and inter-process communication applications external to the trusted zone. Adapting, filtering, blocking, redirecting, or otherwise modifying inter-process communications is enabled by the inter-process communications mechanism. Modifications may be controlled by a policy engine within the trusted zone. | 07-17-2014 |