Patent application number | Description | Published |
20090320103 | EXTENSIBLE MECHANISM FOR SECURING OBJECTS USING CLAIMS - An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued. | 12-24-2009 |
20100154041 | TRANSFORMING CLAIM BASED IDENTITIES TO CREDENTIAL BASED IDENTITIES - Claim based identities are transformed to a set of credentials and securely stored in a secure data store using a number of encryption schemes. The credentials are then used to authenticate applications requiring specific credential types. For each call to the secure store system, a client application may provide a claims token issued by a trusted source, which is used to search for corresponding credentials in the secure data store if the credentials have been created previously for the user. | 06-17-2010 |
20120117609 | Pluggable Claim Providers - A server system receives and installs multiple claim provider plug-ins. Each of the claim provider plug-ins implements the same software interface. However, each of the claim provider plug-ins can provide claims that assert different things. Claims provided by the claim provider plug-ins can be used to control access of users to a resource. | 05-10-2012 |
20120131660 | USING CACHED SECURITY TOKENS IN AN ONLINE SERVICE - A security token service generates a security token for a user that is associated with a client and stores the full security token within a memory. The security token includes an identity claim that represents the identity of the generated security token. Instead of passing the entire security token back to the client, the identity claim is returned to the client. For each request the client makes to the service, the client passes the identity claim in the request instead of the full security token having all of the claims. The identity claim is much smaller then the full security token. When a computing device receives the identity claim within the request from the user, the identity claim is used to access the full security token that is stored in memory. | 05-24-2012 |
20120159601 | Transition from WS-Federation Passive Profile to Active Profile - A server system sends a first credential request to a passive requestor at a client device. After sending the first credential request, the server system receives a credential for a user of the client device. If the credential is valid, the server system can provide the passive requestor with access to a resource provided by the server system. After providing the passive requestor with access to the resource, the server system provides an active requestor at the client device with access to the resource without sending a second credential request to the active requestor. Consequently, it may not be necessary for a user of the client device to provide credentials twice in order for the passive requestor and the active requestor to access the resource. | 06-21-2012 |
Patent application number | Description | Published |
20080227302 | FIBROUS LAMINATE INTERFACE FOR SECURITY COATINGS - an integrated circuit (IC) package with a fibrous interface is provided. The package includes a substrate, a bond coat and a top coat. The substrate is configured to contain IC components and connections. The bond coat layer is configured to encapsulate the IC components. The top coat layer has at least a portion embedded in the bond coat layer. Moreover, the top coat layer includes a fibrous interface configured to provide security and strengthen the bond coat layer. | 09-18-2008 |
20110004938 | Method and Apparatus for Erasure of Data from a Data Storage Device Located on a Vehicle - A method and system for destroying information stored on a data storage device located onboard a vehicle in order to prevent unfriendly forces from obtaining the information is described. The method and system are initiated when the operator of the vehicle activates a triggering mechanism. The information may be destroyed by physically damaging the data storage device on which the information is stored or by releasing a software virus into the device on which the sensitive information is stored. A software virus may also be transmitted to a computer of an unfriendly force attempting to access the sensitive information. | 01-06-2011 |
20120068846 | TAMPER EVENT DETECTION - A tamper-indicating assembly includes a container formed by a plurality of walls and a door mechanically coupled to at least one of the walls via a hinge. At least one cable extends at least partially through the hinge between the door and the at least one wall. The cable transmits a signal, and the assembly can identify potential tamper events related to opening and closing of the door based on changes in properties of the transmitted signal. Techniques for forming the assembly are also described. | 03-22-2012 |
20120198242 | DATA PROTECTION WHEN A MONITOR DEVICE FAILS OR IS ATTACKED - In some examples, a system includes a data storage device that stores data and a monitor device that monitors a physical domain in which the data storage device is located and conditions access to data stored by the data storage device based on communication between the monitor device and the data storage device. In some examples, the system is configured to impede access to the data when at least one of operation the monitor device fails or the monitor device is attacked. Additionally, in some examples, the monitor device is configured to restrict access to the data when the monitor device is engaged and an attacker attempts to access the data storage device directly. | 08-02-2012 |
20130207783 | PROTECTING PACKAGES FROM TAMPERING - A package includes a chassis, a plurality of components arranged within the chassis, a plurality of RFID devices, and at least one processing device. The RFID devices are arranged at a plurality of locations to form an array configured to authenticate compliance of the actual configuration of the package with a model configuration. The processing device is configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration. | 08-15-2013 |
20140145353 | TAMPER-RESISTANT COATING FOR AN INTEGRATED CIRCUIT - A system may include an integrated circuit and a coating at least partially encapsulating the integrated circuit. The coating may include an electrically insulating material at least partially encapsulating an analog circuit. The integrated circuit may be electrically connected to the analog circuit. Additionally, the integrated circuit may be configured to generate an analog electrical signal, transmit the analog electrical signal through the analog circuit to generate a modified analog electrical signal, receive the modified analog electrical signal, and in response to determining that the modified analog electrical signal is sufficiently similar to an expected analog electrical signal, use the modified analog electrical signal as an input to an algorithm performed by the integrated circuit. | 05-29-2014 |
20140293562 | FIBROUS LAMINATE INTERFACE FOR SECURITY COATINGS - An integrated circuit (IC) package with a fibrous interface is provided. The package includes a substrate, a bond coat and a top coat. The substrate is configured to contain IC components and connections. The bond coat layer is configured to encapsulate the IC components. The top coat layer has at least a portion embedded in the bond coat layer. Moreover, the top coat layer includes a fibrous interface configured to provide security and strengthen the bond coat layer. | 10-02-2014 |