Patent application number | Description | Published |
20140068094 | FEDERATED TIMEOUT - Techniques for workload federated timeout are presented, A federated service manages communications between service components of a system. Each component queries the federated service to determine a last activity time by the other components of the system before timing out during a session. Each component can update its last activity time based on the discovered last activity time of one of the components to prevent a premature time out from the session. | 03-06-2014 |
20140122730 | TECHNIQUES FOR DEVICE INDEPENDENT SESSION MIGRATION - Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated communication session from an original device with minimal user interaction while automated security is enforced during session migration. In an embodiment, the target device is a mobile device and the original device is a desktop; the target device captures a data glyph that is visually presented on a display of the original device and the data glyph is then seamlessly communicated to a server manager for authentication and session migration. | 05-01-2014 |
20140122731 | TECHNIQUES FOR DESKTOP MIGRATION - Techniques for desktop migration are presented. A user authenticates to an original device and a token is generated for remoting to that device's desktop. A target device acquires the token while in proximity to the original device and uses the token to authenticate to a third-party service that provides a second token back to the target device. The second token permits the target device to authenticate and to directly connect via remoting software to the original device's desktop. | 05-01-2014 |
20140189775 | TECHNIQUES FOR SECURE DEBUGGING AND MONITORING - Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token. | 07-03-2014 |
20140215587 | REMOTE KEYCHAIN FOR MOBILE DEVICES - An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset. | 07-31-2014 |
20140242949 | MOBILE TOUCH AUTHENTICATION REFRESH - Techniques for resetting authentication for touch-enabled devices are presented. When a user authenticates to a mobile device a touch profile (TP) is recorded. Each subsequent time the user unlocks a locked mobile device via touch, a new TP is noted. The new TP is compared to the recorded TP and if the deviation is within an acceptable tolerance, the user is permitted access to the mobile device without re-authentication. When the new TP is not within the acceptable tolerance of the recorded TP, the user is forced to re-authenticate before access is granted to the mobile device. | 08-28-2014 |
20150121448 | MOBILE AND DESKTOP COMMON VIEW OBJECT - In a computing system environment for viewing, accessing, and executing computing resources on one or more computing devices of a user, methods and apparatus include creating an object configured to provide at least one navigational aid for display on at least one of the computing devices. The object allows a user to view, navigate to, and access the computing resource. The object further includes one or more computing policies defining access rights for the computing resource and a listing of one or more other computing resources required for loading and/or executing the computing resource. Other computing resources necessary for loading and/or executing the computing resource are held separate from the object, thus providing information needed to execute the computing resource to the user while abstracting methods and resources required to build and use the computing resource. | 04-30-2015 |
20150121498 | REMOTE KEYCHAIN FOR MOBILE DEVICES - An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset. | 04-30-2015 |
20150215299 | PROXIMITY-BASED AUTHENTICATION - A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request. The second device provides an audio message back to the first device, which plays the audio message over a speaker. A third device captures the audio message as audio and uses the audio message to request a second authentication from the second device. The second device provides an authenticated session handle back to the first device for accessing the protected resource when both the first and second authentications are successful. | 07-30-2015 |
20150215775 | AUDIO PROXIMITY-BASED MOBILE DEVICE DATA SHARING - At least two mobile devices introduce one another and select data for transfer to and receipt by at least one receiving mobile device using audio communications. Each of the devices uses its speaker(s) and its microphone to introduce and select the data. Once secure audio communications are confirmed between the devices, the selected data is acquired by the at least one receiving mobile device using audio communications or a different out-of-band communication wired or wireless network. | 07-30-2015 |
20150278500 | PERSONAL AUTHENTICATION AND ACCESS - A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources. | 10-01-2015 |
20160063000 | AUTOMATIC DETECTION OF RELATEDNESS IN POOLS OF ENCRYPTED DATA - A pool of files are analyzed for relationships between the files. At least some of the files in the pool are encrypted files. The relationships are represented by distances between the files plotted on a graph in two or more dimensions. A point on the graph representing a particular file. The graph includes an interactive interface, such that points or clusters of points can be selected for re-analyzing and re-plotting on a refreshed graph for just those selected points or clusters. | 03-03-2016 |
20160103989 | DEVICE AUTHENTICATION - Multi-touch groupings of characters are detected for device authentication and access. In an embodiment, one or more non-character based factors are used in combination with an inputted authentication code (character based) for device authentication and access. | 04-14-2016 |
20160105422 | LATE BINDING AUTHENTICATION - A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the presentation is bound to the LBT and authenticated for access to a service and provided valid credentials for accessing that service. | 04-14-2016 |
Patent application number | Description | Published |
20090302663 | Chair and Method for Assembling the Chair - A method of assembling a chair includes providing a first chair component composed of a first polymeric material and a second chair component composed of a second polymeric material. An adhesive is positioned on or in the first chair component. The adhesive is composed of a third polymeric material and at least one ferromagnetic susceptor. The second chair component is positioned in engagement with the adhesive and adjacent to the first chair component. A magnetic field or electromagnetic waves are applied to the adhesive to activate the adhesive. A force is also applied to at least one of the first chair component and the second chair component to press the first chair component and the second chair component. A chair is also provided that includes the first and second chair components and the adhesive. | 12-10-2009 |
20090302666 | Laser Welding of Chair Components - A method of laser welding chair components together is provided. The method includes selecting at least one first chair component comprised of a first polymeric material that is at least substantially translucent to a laser and selecting at least one second chair component comprised of a second polymeric material that is opaque to the laser such that the one or more second chair components will absorb at least a portion of the heat or energy provided by the laser. The one or more first chair components are laser welded to the one or more second chair components. A chair is also provided that includes a first component composed of polymeric material laser welded to a second component composed of polymeric material. | 12-10-2009 |
20100213749 | Furniture and Method of Furniture Component Attachment - A method of attaching furniture components includes providing a first furniture component that may be comprised of polymeric material, positioning a second furniture component adjacent to the first furniture component, positioning stakes attached to the second component through holes formed in the first component, and heating the stakes to bond portions of the second component to portions of the first component. The second component may also be comprised of polymeric material and the stakes may be integral with the second component or formed on the second component. Chairs or other furniture such as office furniture may include components attached together by embodiments of the disclosed method. In some embodiments of the method, a second component may also have projections that are positioned through holes in a third furniture component that may subsequently be heated to bond the third component to the second component. | 08-26-2010 |
20150238015 | CHAIR BACK SWIVEL MECHANISM - A chair includes a backrest swivel mechanism that is configured to permit the backrest to swivel about a vertical axis about a preselected range of motion. The backrest may be configured to swivel, or rotate, about a vertical axis that is defined by an element located adjacent a rearward central location that is below the seat of the chair and adjacent a rear of the chair. A lock mechanism can be selectively engaged to lock and unlock the swiveling mechanism so that when in the locked state, the backrest cannot swivel and when in the unlocked state, the backrest can swivel. In some embodiments, the range of swiveling motion may be with a predefined range, such as +/−10° or +/−20° of rotation relative to a central position of the backrest. | 08-27-2015 |
20150289653 | Armrest Mechanism for a Chair - An armrest for a chair includes a first slideable member moveably positioned within a support post and a second slideable member moveably positioned within the support post. The first slideable member is moveably positioned within a channel of the second slideable member such that the first slideable member is moveable relative to the second slideable member. An actuator is connected to the first and second slideable members. The actuator can optionally be included that is actuatable from a locked position to an unlocked position. The first and second slideable members are immovable within the post when the actuator is in the locked position and the first and second slideable members are moveable within the post when the actuator is in the unlocked position. | 10-15-2015 |