Patent application number | Description | Published |
20090089568 | Securely Launching Encrypted Operating Systems - Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors. | 04-02-2009 |
20090100516 | Secure Bait and Switch Resume - Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file. | 04-16-2009 |
20090164236 | SMARTER SCHEDULING FOR MEDICAL FACILITIES AND PHYSICIANS - The claimed subject matter provides a system and/or a method that facilitates scheduling an incoming patient appointment for a medical facility. A medical facility can provide healthcare to a patient, wherein the medical facility can utilize a schedule with an available time slot to assign an appointment to a patient. A match component can evaluate a portion of transportation data to select a patient to which an appointment on the schedule is allotted. A dynamic schedule component can automatically adjust the schedule based upon the evaluation. | 06-25-2009 |
20090198733 | HEALTHCARE RESOURCE LOCATOR - The claimed subject matter provides a system and/or a method that facilitates identifying a medical facility for an emergency medical situation. An interface can receive a portion of data related to an emergency medical incident and a corresponding location. A match component can evaluate the portion of data to select a medical facility in which to transport a patient involved in the emergency medical incident, wherein the medical facility can be ascertained based on a distance between the location of the emergency medical incident and a location for the selected medical facility and traffic related to a route there between. | 08-06-2009 |
20090260054 | Automatic Application of Information Protection Policies - The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content. | 10-15-2009 |
20090270755 | PEDOMETER FOR THE BRAIN - The claimed subject mater provides systems and/or techniques that provide biometric feedback monitoring of brain activity. The system includes mechanisms that obtain indication of brain activity associated with an individual which can be utilized to ensure that the individual is maximizing his or her brain activity. Where it is determined that the individual is not optimally utilizing his or her brain, feedback can be directed to the individual in order to stimulate brain activity in a specified response center of the brain. | 10-29-2009 |
20090300706 | CENTRALLY ACCESSIBLE POLICY REPOSITORY - The present invention extends to methods, systems, and computer program products for a centrally accessible policy repository. Protection policies for protecting resources within an organization are stored at a central policy repository. Thus, an administrator can centrally create, maintain, and manage resource protection polices for all of the organizational units within an organization. Accordingly, resources consumed when performing these protection policy related operations is significantly reduced. Additionally, since protection policies are centrally located, there is increased likelihood of being able to consistently apply an organization's protection policies within different organizational units, even when protection policies change. | 12-03-2009 |
20090309891 | AVATAR INDIVIDUALIZED BY PHYSICAL CHARACTERISTIC - An avatar generator for a virtual environment reflects a physiological characteristic of the user, injecting a degree of reality into the capabilities or appearance. Thereby, many of the incentives of the real world are replicated in a virtual environment. Physiological data that reflect a degree of health of the real person can be linked to rewards of capabilities of a gaming avatar, an amount of time budgeted to play, or a visible indication. Thereby, people are encouraged to exercise. Physiological data that reflect the health and perhaps also mood also improve social interaction in virtual environments. People seeking to meet and become acquainted with particular types of people are not thwarted by the artificiality of avatars. The physiological data can be gleaned from a third party health data collection repository, a healthcare smart card, a real-time physiological sensor (e.g., blood pressure, heart rate, blood glucose, peak flow, pedometer, etc.) | 12-17-2009 |
20090313235 | SOCIAL NETWORKS SERVICE - A social network service provides trusted, timely and managed communications between a querying individual and an informed individual by optimizing distribution of queries to reflect a requisite amount of expertise necessary (i.e., interest, background, education, demographic attribute, etc.). Those candidate recipients with a rare level of expertise or specialization can specify a desired level of participation, which is respected. In order not to exhaust their availability, those who are less qualified or part of a larger demographic category appropriate for the query are selected to handle queries of lesser difficulty or less specialization. Anonymity if desired by the recipient party can be supported by increasing the pool of candidate recipients so that the querying party cannot reasonably ascertain who is responding. Timeliness of response, as well as satisfaction in the response, is tracked in order to affect redirection of a query. | 12-17-2009 |
20090313397 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 12-17-2009 |
20090327705 | ATTESTED CONTENT PROTECTION - The present invention extends to methods, systems, and computer program products for protecting content. Embodiments of the invention permit a local machine increased participation in authorizing access to protected content. An operating system attests to a computing environment at a corresponding computer system. If the computing environment is one permitted to access protected content, the operating system is permitted to regulate further (e.g., application) access to protected content in accordance with a procreation policy. As such, authorization decisions are partially distributed, easing the resource burden on a content protection server. Accordingly, embodiments of the invention can facilitate more robust and efficient authorization decisions when access to protected content is requested. | 12-31-2009 |
20090328134 | LICENSING PROTECTED CONTENT TO APPLICATION SETS - The present invention extends to methods, systems, and computer program products for licensing protected content to application sets. Embodiments of the invention permit a local machine to increase its participation in authorizing access to protected content. For example, an operating system within an appropriate computing environment is permitted to determine if an application is authorized to access protected content. Thus, the application is relieved from having to store a publishing license. Further, authorization decisions are partially distributed, easing the resource burden on a protection server. Accordingly, embodiments of the invention can facilitate more robust and efficient authorization decisions when access to protected content is requested. | 12-31-2009 |
20090328156 | WORKFLOW BASED AUTHORIZATION FOR CONTENT ACCESS - The present invention extends to methods, systems, and computer program products for workflow based authorization for content access. A workflow can be triggered when a protection policy does not fully express an intended recipient's rights in protected content. A workflow processes relevant inputs to more fully express the intended recipient's rights in protected content. Workflows can provide policy item updates and authorizations decisions with respect to protected content. Through the use of workflows to make an authorization decision, access to information can become more flexible, allowing it to follow the desired flow of information throughout its lifecycle. This flexibility allows organizations to protect their information without worrying about the protection stopping the natural flow of business. | 12-31-2009 |
20100169220 | WEARING HEALTH ON YOUR SLEEVE - The claimed subject matter provides systems and/or methods that effectuate accurate communication of health data. The system can include mechanisms that initiate data interchange with a records manager that controls personal health records, and that selectively causes a physicians portal to acquire and display the personal but circumscribed health records associated with the user of the system. | 07-01-2010 |
20100186095 | METHOD AND SYSTEM FOR GAP BASED ANTI-PIRACY - In order to achieve a more robust level of piracy protection, a gap protection scheme is utilized. This protection scheme may utilize the notion of a gap, which may comprise any entity or component that is withheld from a distribution that is required in order to run or execute a software title or is required in order to play and enjoy any other type of protected asset. | 07-22-2010 |
20100223656 | TRUSTED ENTITY BASED ANTI-CHEATING MECHANISM - An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior. | 09-02-2010 |
20110177792 | DEVELOPER PHONE REGISTRATION - A technique allows software developers to develop applications for a smart phone or other terminal by unlocking the terminal so that it can run unsigned applications. A developer registers with a web-based service, agrees to registration terms, and provides authentication credentials. Data which verifies the authentication credentials is provided back to the developer's computer. The terminal is connected to the developer's computer, and via a user interface, the developer requests registration of the terminal. In response, the terminal receives the data from the developer's computer, and provides the data and a unique terminal identifier to the service. If authorized, the service returns a persistent token or license which is stored at, and used to unlock, the terminal. The service can also provide a command which enforces an expiration date. The terminal checks in with the service to determine if the account is in good standing, and is re-locked if warranted. | 07-21-2011 |
20120124482 | METHODS AND SYSTEMS FOR MONITORING AND ENCOURAGING PERSONAL DREAM ACHIEVEMENT - Methods and systems are provided for use in monitoring and encouraging the attainment of personal dreams. Users can publish dreams and action steps to online social networks and receive comments related thereto. Third-party users can write suggestions in connection with the dreams or action steps to help the user achieve the dreams. Anonymous feeds regarding the dreams and related actions can be sent to target sites as a function of user identity. | 05-17-2012 |
20130282934 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 10-24-2013 |