Patent application number | Description | Published |
20080304486 | MULTIPLEXED DATA STREAM PROTOCOL - Multiplexed data stream protocols are described. In one embodiment, a method to provide a multiplexed data stream protocol includes packetizing a data stream to provide packets with headers and transmitting the packets through an interface which is not designed to use Internet Protocol (IP) addresses. The headers contain data for flow control and sequencing and are associated with a port for an application, and the headers allow multiple applications to maintain an arbitrary and changeable number of multiple concurrent sessions through the interface. The headers may be Transmission Control Protocol (TCP) like headers and may not include IP like headers. Systems, computer readable media, software architectures and other methods are also described. | 12-11-2008 |
20080307109 | FILE PROTOCOL FOR TRANSACTION BASED COMMUNICATION - File protocols for transaction based communication are described. In one embodiment, a method to provide a file transfer protocol includes receiving packets containing headers, the packets being received at a first network stack software through an interface, and extracting data from he packets and reconstructing a file from data in the packets. The extracting may be performed by a first network stack software, and the interface is not designed to use Internet Protocol (IP) addresses, and the headers contain data for flow control and sequencing and are associated with a port for a file transfer application, and the headers allow multiple applications to maintain multiple concurrent sessions through the interface, which may be a USB compliant or BLUETOOTH compliant interface. Systems, computer readable media, software architectures and other methods are also described. | 12-11-2008 |
20110179083 | Accessing Specialized Fileserver - A method and apparatus of a host that accesses files from a portable storage device with a shared filesystem is described. In an exemplary method, the host transmits a request to access the shared filesystem, where the shared filesystem includes a security policy that disallows one application accessing a file in the shared filesystem corresponding to another application. The host further receives an indication of the result of the request. | 07-21-2011 |
20110179096 | Specialized Network Fileserver - A method and apparatus of a portable storage device that provides a specialized network fileserver is described. In an exemplary method, the portable storage device retrieves a list of applications on the portable storage device, where each of the applications has a private filesystem. For each of the applications, the portable storage device determines if that application will share the corresponding private filesystem and adds that private filesystem to a shared filesystem of the portable storage device is that is shareable. The portable storage device further advertises the shared filesystem to a host that is coupled to the portable storage device. | 07-21-2011 |
20110179203 | Portable Storage Interface - A method and apparatus of a portable storage device that provides a tethering and portable storage service to a host is described. In an exemplary method, the portable storage device configures a tethering and a portable storage service interface for the host. The portable storage device provides the tethering service to a network for the host through the tethering interface. In addition, the portable storage device shares files stored on the portable storage device through the portable storage interface. | 07-21-2011 |
20110252234 | SYSTEM AND METHOD FOR FILE-LEVEL DATA PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Also disclosed is a method of verifying a password by decrypting a key bag, retrieving data from an encrypted file using an encryption key from the decrypted key bag, and verifying the password by comparing retrieved data with expected data. | 10-13-2011 |
20130024677 | SECURE BOOTING A COMPUTING DEVICE - A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image. | 01-24-2013 |
20130036298 | SECURELY RECOVERING A COMPUTING DEVICE - A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code. | 02-07-2013 |
20130081124 | TRUSTING AN UNVERIFIED CODE IMAGE IN A COMPUTING DEVICE - A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key. | 03-28-2013 |
20130103860 | PORTABLE STORAGE INTERFACE - A method and apparatus of a portable storage device that provides a tethering and portable storage service to a host is described. In an exemplary method, the portable storage device configures a tethering and a portable storage service interface for the host. The portable storage device provides the tethering service to a network for the host through the tethering interface. In addition, the portable storage device shares files stored on the portable storage device through the portable storage interface. | 04-25-2013 |
20150033030 | SECURELY RECOVERING A COMPUTING DEVICE - A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a read only memory (ROM) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code. | 01-29-2015 |