Patent application number | Description | Published |
20090024993 | DYNAMICALLY REGULATING CONTENT DOWNLOADS - A regulation service can deliver software packages to client computer systems while minimizing the overall effect on network (internet or LAN) traffic and/or server loads. In one implementation, the regulation service assigns acceptance rates to different software packages based on any number of different factors. Upon request for a software package, the regulation service can provide the acceptance rate and a refresh rate that differs for each software package. A client computer system can then calculate an access value, and if the access value is within an acceptance rate, the client computer system can access (e.g., download) a corresponding software package. If the access value is outside of the acceptance rate, the client computer system can refresh its requests until it identifies that the acceptance rate has changed, and the calculated value is within the new acceptance rate. Additional implementations include delivering bandwidth management policies to client computer systems. | 01-22-2009 |
20090094527 | Environment-Interactive Context-Aware Devices and Methods - Location-aware methods and systems are described. In one embodiment, a portable computing device determines its location by accessing one or more hierarchical tree structures each of which comprising multiple nodes that represent physical or logical locations, and traversing at least one node on the one or more hierarchical tree structures to ascertain the location. The device then acquires digital data associated with the determined location and that can permit the device to interact with a location environment. The device then enables interaction with the location environment based, at least in part, on the acquired digital data. | 04-09-2009 |
20090207733 | TRANSFERRING DATA OVER A NETWORK - A method is provided for transferring a set of data over a network by monitoring the level of actual network bandwidth utilization. The method identifies a maximum monitored level of actual utilization and calculates a size for data blocks to be transferred as a function of the maximum monitored level of utilization. The data blocks represent a segment of a set of data, such as a software update that may be transferred or downloaded over the network without interfering with other network activity. | 08-20-2009 |
20090252325 | SECURE CONTENT PRE-DISTRIBUTION TO DESIGNATED SYSTEMS - Described is a technology by which encrypted content is pre-distributed to recipients during a pre-distribution timeframe, for example to distribute protected content to many clients in a controlled manner. At a release moment, a key for decrypting the encrypted content is released. For example, a software update may be pre-distributed in this manner, whereby many clients may receive the updates over time but the update cannot be analyzed for hacking purposes, e.g., to use the update to figure out a prior vulnerability. By rapidly and widely disseminating the key at the release moment, the update is installed on a large percentage of client systems before those systems can be exploited. The content may be allowed to expire before the key is released, or may be canceled or replaced. The content may include a complete file, and/or a delta file that changes another file into a resultant piece of content. | 10-08-2009 |
20100241739 | MITIGATIONS FOR POTENTIALLY COMPROMISED ELECTRONIC DEVICES - An electronic device may be reported as potentially compromised (e.g., by a user or by the electronic device itself). An instruction to initiate remediation of the electronic device may be queued. Upon reaching the end of the queue, the instruction is transmitted to the electronic device to initiate remediation of the electronic device. The instruction is received by the electronic device. The remediation policy is performed, which may include performing operations such as deleting an encryption key, deleting data, disabling a login capability, disabling a boot up functionality, disabling a function associated with the electronic device, transmitting data from the electronic device, transmitting a message from the electronic device, or generating information that indicates of a user of the electronic device. | 09-23-2010 |
20120100873 | Environment-Interactive Context-Aware Devices and Methods - Location-aware methods and systems are described. In one embodiment, a portable computing device determines its location by accessing one or more hierarchical tree structures each of which comprising multiple nodes that represent physical or logical locations, and traversing at least one node on the one or more hierarchical tree structures to ascertain the location. The device then acquires digital data associated with the determined location and that can permit the device to interact with a location environment. The device then enables interaction with the location environment based, at least in part, on the acquired digital data. | 04-26-2012 |
20120159178 | PROVIDING SECURITY SERVICES ON THE CLOUD - Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a computer system instantiates a signing service configured to sign software packages. The computer system receives a signing request from a computer user requesting that a selected software package be signed. The signing request includes a computed hash of the selected software package. The computer system generates a private and public key pair on behalf of the computer user and stores the private key of the generated key pair in a secure data store. | 06-21-2012 |
20130283056 | PROVIDING SECURITY SERVICES ON THE CLOUD - Embodiments are directed to the providing a cloud keying and signing service and to securing software package distribution on the cloud. In an embodiment, a computer system instantiates a signing service configured to sign software packages. The computer system receives a signing request from a computer user requesting that a selected software package be signed. The signing request includes a computed hash of the selected software package. The computer system generates a private and public key pair on behalf of the computer user and stores the private key of the generated key pair in a secure data store. | 10-24-2013 |