Patent application number | Description | Published |
20080320135 | METHOD AND SYSTEM FOR ESTABLISHING NETWORK CONNECTIONS - A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network. | 12-25-2008 |
20090089590 | MERGING EXTERNAL NVRAM WITH FULL DISK ENCRYPTION - Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any time when it would be vulnerable. Accordingly, in a first implementation, the data may preferably be encrypted as it first goes into a flash drive and decrypted when it comes out of the flash drive. In another implementation, the flash drive may be logically bound to the hard disk, so that they would both use the same encryption key. In yet another implementation, if a hard disk is moved to another system, then the flash drive may also preferably be simultaneously moved. | 04-02-2009 |
20090089875 | LOCAL VERIFICATION OF TRUSTED DISPLAY BASED ON REMOTE SERVER VERIFICATION - In a system with a main memory, a network adapter, and a display, a transaction security module in communication with the network adapter. The transaction security module acts to: establish a secure identification item with an entity which positively identifies the entity; accept an application OS of the entity; and initiate a guest OS with the entity; the network adapter acting to connect with the entity subsequent to initiation of a guest OS; and the display acting to display the secure identification item subsequent to connection with the entity. | 04-02-2009 |
20090222651 | S3 BIOS OPERATING SYSTEM SWITCH - Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function. | 09-03-2009 |
20090222889 | REMOTE DISABLEMENT OF A COMPUTER SYSTEM - Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable. | 09-03-2009 |
20090222909 | Password Management Outside of a Bios - In accordance with at least one presently preferred embodiment of the present invention, there is broadly contemplated herein the managing of a POP not solely in the BIOS but at least partly in a more secure location. In accordance with a particularly preferred embodiment of the present invention, this location could be in a NVRAM (non-volatile random access memory) inside a TPM (trusted platform module). Most preferably, this location will contain code that the BIOS preferably will need to access and employ in order to complete the booting of the system. | 09-03-2009 |
20090249485 | Techniques for Capturing Identifying Information on a Device User - A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger. | 10-01-2009 |
20090327687 | ARRANGEMENTS FOR ESTABLISHING MANAGEMENT ENGINE DEFAULT SETTINGS - The employment of a process of applying user-defined defaults to a management engine or analogous arrangement, wherein a system BIOS calls or recalls such defaults, as needed, from NVRAM responsive to the need for a reset of defaults. | 12-31-2009 |
20100082746 | SYSTEM AND METHOD FOR WEB SITE DRIVEN COLLABORATIVE WEB BROWSING - The invention provides a system comprising: a CPU; a memory in communication with the CPU; instructions stored in the memory and executable by the CPU to establish a collaborative web browsing session, the instructions further comprising: instructions enabling at least one peer device to join the collaborative web browsing session at a web site hosted by an automated peer. | 04-01-2010 |
20100083132 | PREVENTING REDIRECTION LOOPS DURING COLLABORATIVE WEB BROWSING - A system for preventing redirection loops during collaborative web browsing is provided comprising: a CPU; a memory in communication with the CPU; instructions stored in the memory and executable by the CPU to prevent redirects encountered during a collaborative web browsing session, the instructions further comprising: instructions enabling a device to join a collaborative web browsing session; instructions enabling detection of a redirection loop; and instructions enabling termination of the redirect loop. | 04-01-2010 |
20100083135 | COLLABORATIVE WEB NAVIGATION USING DOCUMENT OBJECT MODEL (DOM) BASED DOCUMENT REFERENCES - A system for collaborative web browsing is provided comprising: a CPU; a system memory in communication with said CPU; a display medium; and instructions stored in the system memory and executable by the CPU, the instructions comprising: enabling a device to join a collaborative web browsing session; enabling a data navigation module to provide, upon an object appearing upon the display medium being selected by a user, outgoing navigation data that enables a rendering of the object to be distinguished from other objects rendered upon at least one other display medium of at least one other device. | 04-01-2010 |
20100083357 | REMOTE REGISTRATION OF BIOMETRIC DATA INTO A COMPUTER - Systems and arrangements for permitting the transmission of fingerprint authentication data to a system remotely, while also permitting the system to employ such data as well as passwords in order to operate a computer system, while ensuring a reliable level of security for any group or organization using such systems and arrangements. | 04-01-2010 |
20100090983 | Techniques for Creating A Virtual Touchscreen - A technique for creating a virtual touchscreen includes capturing, with a first infrared camera, a first reflection from an object that is at a known position adjacent a surface associated with a device. A second reflection from the object (at the known position) is captured with a second infrared camera. The first and second reflections are correlated with the known position to provide a two-dimensional position for the object that is calibrated with respect to the surface. | 04-15-2010 |
20100103141 | Techniques for Controlling Operation of a Device with a Virtual Touchscreen - A technique for controlling operation of a device with a virtual touchscreen includes defining an area of a surface, associated with the device, as the virtual touchscreen. An operation within the device is then initiated based on activity within the virtual touchscreen. An overlay may be provided, on a display screen of the device, to indicate a location of the virtual touchscreen with respect to, for example, a keyboard of the device. | 04-29-2010 |
20100134409 | THREE-DIMENSIONAL USER INTERFACE - The instant invention provides an apparatus, method and program storage device enabling a three-dimensional user interface for the movement of objects rendered upon a display device in a more realistic and intuitive manner. A Z distance is set whereupon a user crossing the Z distance is enabled to select an object, i.e. pick it up. As the user breaks the Z distance again, the object selected will move with the user's hand. As the user breaks the Z distance once more, the object will be released, i.e. dropped into a new position. | 06-03-2010 |
20100134421 | COMBINED TAP SEQUENCE AND CAMERA BASED USER INTERFACE - The invention includes a method, apparatus, and program storage device for providing a combined tap sequence and camera based user interface. The invention provides, among other features, an apparatus comprising: an accelerometer; a laser light generating module; wherein the laser light generating module provides a plane of laser light over a surface coupled to the accelerometer; at least one camera; at least one processor; and a memory; wherein the memory stores instructions, executable by the at least one processor, enabling the apparatus to ascertain an occurrence of an input event utilizing inputs from the accelerometer and a location of the input event utilizing inputs from the at least one camera. | 06-03-2010 |
20100162015 | ENERGY SAVING SUBSYSTEM FOR AN ELECTRONIC DEVICE - The instant invention broadly contemplates an energy saving subsystem comprising a secondary CPU that utilizes less power than a main CPU, thereby allowing an electronic device (e.g. a laptop PC) having the secondary CPU to use less power and run for longer periods of time on a limited power supply. Thus, the invention permits the electronic device to be utilized for extended periods and extends the battery life. | 06-24-2010 |
20100162373 | MANAGEMENT OF HARDWARE PASSWORDS - In the context of computer systems, the generation of preboot passwords at a server instead of at a client. Preferably, preboot passwords generated at the server are distributed to the client, and a process is offered whereby a user can establish his/her own proxy, not known to the server, that can be used to release the stored passwords to the client hardware. Since the passwords are generated at the server, management of the passwords is greatly facilitated since they are generated at the site where they are stored. This also makes it easy to implement management features such as a group policy, since the password generation software will be able to make logical connections between users and hardware. | 06-24-2010 |
20100250959 | SECURITY FOR STORAGE DEVICES - The invention broadly contemplates a security solution for storage devices that is inexpensive and robust. The invention allows a store of system specific data to be used to release the hard disk key of full-disk encryption (FDE) drives. This system specific data is passed to the FDE drives and used to calculate the actual encryption key. This allows for safe disposal of an FDE drive containing confidential data, as the lack of available system specific decryption data makes decryption virtually impossible. | 09-30-2010 |
20110050639 | APPARATUS, METHOD, AND SYSTEM FOR TOUCH AND GESTURE DETECTION - An apparatus, method and system are disclosed for touch and gesture detection. A light source array comprises a plurality of light sources. Each light source of the light source array transmits a light beam across a face of a display in response to being activated. A light sensor array comprises a plurality of light sensors. Each light sensor of the light sensor array detects an intensity of each light beam transmitted across the face of the display in response to being activated. A controller concurrently activates each light source of the light source array with each light sensor of the light sensor array as a source/sensor pair during a detection cycle while other light sources of the light source array and other light sensors of the light sensor array are inactive. The controller further determines a location of a pointer relative to the display from a pattern of light beam intensities for each source/sensor pair. | 03-03-2011 |
20110213953 | System and Method for Measuring Staleness of Attestation Measurements - A method is provided for determining with a first device, staleness of attestation measurements at a second device. The method includes booting up the second device at a first time, the second device having a communication portion, a security portion, a basic input/output system and a trusted protection module. Further, the method includes generating an initial counter based on the booting up of the second device at the first time. A current counter is then generated based on a second time after the first time. The method additionally includes providing a request to the second device from the first device, the request requesting booting information and current information, the booting information being based on the initial counter, the current information being based on the current counter. Still further, the method includes providing a response to the first device from the second device, the response including the booting information and the current information. Finally, the method includes determining, via the first device, the generated initial counter and the current counter based on the response. | 09-01-2011 |
20110238541 | AUDIT TRAILS FOR ELECTRONIC FINANCIAL TRANSACTIONS - An exemplary method includes transmitting, via a network interface, at least a currency amount in an attempt to confirm a financial transaction; responsive to the transmitting, receiving a confirmation indicator for the financial transaction; storing at least the currency amount in non-volatile memory; hashing at least the currency amount to generate a hash and storing the hash in a secure non-volatile memory; hashing at least the currency amount stored in the non-volatile memory to generate a verification hash; and in an attempt to verify at least the financial transaction, comparing the verification hash to the hash stored in the secure non-volatile memory. Various other apparatuses, systems, methods, etc., are also disclosed. | 09-29-2011 |
20110246784 | SYSTEMS AND METHODS FOR DISK ENCRYPTION WITH TWO KEYS - Embodiments provide for using two encryption keys to encrypt data instead of only one as is customarily used in the industry. According to various embodiments, a default encryption key is generated and is initially used to encrypt data, while a second encryption key is available for generation by an end user. Embodiments provide that data is encrypted with the default key until the user generates their own key, after this event, all data is encrypted with key generated by the user. | 10-06-2011 |