Patent application number | Description | Published |
20080301470 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 12-04-2008 |
20090064292 | TRUSTED PLATFORM MODULE (TPM) ASSISTED DATA CENTER MANAGEMENT - Techniques for trusted platform module (TPM) assisted data center management are provided. A data center registers TPM remote attestations for physical processing environments of physical devices within a data center. Each time a physical processing environment is established; a new TPM remote attestation is generated and validated against the registered TPM remote attestation. Additionally, during registration other identifying information is supplied to the physical processing environments that permit each physical processing environment to be authenticated, validated, and controlled via unique identities. Inter-data center communication is established for sharing virtual processing environments and administrative operations are authenticated within each of the data centers perform any administrative operation is permitted to process within a particular data center. | 03-05-2009 |
20090199282 | TECHNIQUES FOR NON-UNIQUE IDENTITY ESTABLISHMENT - Techniques for non-unique identity establishment are presented. A plurality of biometric data associated with a user is acquired from a plurality of biometric devices. The intersection of the biometric data is registered or a vector for the biometric data is registered. This information is also registered along with answers to questions provided by the user. When a user attempts to subsequently access a secure resource of a network, the retained information is compared against user-supplied biometric data and in some cases where appropriate user-supplied answers to establish an identity of the user and to authenticate the user for access to the secure resource. | 08-06-2009 |
20090293101 | INTEROPERABLE RIGHTS MANAGEMENT - Techniques for interoperable rights management are provided. Content is packaged with declarations defining access rights. The packaged content is delivered to a target resource in accordance with a distribution policy. When the content is accessed the access rights are enforced against the target resource within the target environment in accordance with a local access policy. | 11-26-2009 |
20100071031 | MULTIPLE BIOMETRIC SMART CARD AUTHENTICATION - Techniques for multiple biometric smart card authentication are provided. At least two biometric readings are obtained from a requesting user. Both biometric readings are verified before access to resources of a smart card are made available to the requesting user. | 03-18-2010 |
20100106542 | TECHNIQUES FOR HELP DESK MANAGEMENT - Techniques for help desk management are provided. A user's experience with a resource is captured via a rating. The rating is recorded along with other metrics associated with a processing environment of the user and proactive action taken in response to configuration or performance problems with the user. | 04-29-2010 |
20100106834 | SPONTANEOUS RESOURCE MANAGEMENT - Techniques for spontaneous resource management are provided. Information about resources is indexed and housed in a repository. The information is dynamically updated. Search queries are performed against the indexed information in the repository for purposes of forming dynamic groupings of the resources that are then managed as custom-defined and dynamic groups. | 04-29-2010 |
20100114940 | SELF-ORGANIZING MANAGED RESOURCES - Techniques for self-organizing managed resources are provided. A search that defines characteristics of a source resource is automatically constructed. The search is processed to obtain one or more target resources that are similar to the source resource. The source resource and the one or more target resources form a dynamic managed group that is used to monitor and manage the target resources and the source resource as a logical group. | 05-06-2010 |
20110093707 | TECHNIQUES FOR SECURING CONTENT IN AN UNTRUSTED ENVIRONMENT - Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. The first key is used to decrypt the encrypted version of the content encryption/decryption key. The content delivery service is unaware of the content encryption/decryption key and the first key; and the content held by the content delivery service is encrypted with the content encryption/decryption key. Principals securely share, create, manage, and retrieve the encrypted versions of the content encryption/decryption key and the first key from the content delivery service using secure communications. The encrypted content is obtainable via insecure communications from the content delivery service. | 04-21-2011 |
20140156357 | TECHNIQUES FOR HELP DESK MANAGEMENT - Techniques for help desk management are provided. A user's experience with a resource is captured via a rating. The rating is recorded along with other metrics associated with a processing environment of the user and proactive action taken in response to configuration or performance problems with the user. | 06-05-2014 |