Patent application number | Description | Published |
20140047560 | COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE MOBILE DEVICE CONTENT VIEWING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT - In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, through a secure viewing facility, where the secure viewing facility utilizes a camera or other biometric sensor to monitor an authorized user's actions in the determination of whether the secure viewing facility will permit the computer data content to be viewed on the computer's display, and/or in the control of the viewing process itself. | 02-13-2014 |
20140189483 | SPREADSHEET VIEWER FACILITY - In embodiments of the present invention improved capabilities are described for providing, on a server-based computing device, a spreadsheet viewer facility configured to render a spreadsheet document created by a spreadsheet application as an actively rendered spreadsheet document in a client spreadsheet viewer running on a client computing device without the use of the spreadsheet application running on the client computing device. | 07-03-2014 |
20140245015 | OFFLINE FILE ACCESS - In embodiments of the present invention improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in the secure database, each of the plurality of encryption keys providing access to the encrypted data file, the encrypted data file accessible as downloaded to a mobile computing device that is not connected to the network only through use of at least one of the plurality of encryption keys and presentation of a user secure identifier from a user of the mobile computing device, wherein the at least one of the plurality of encryption keys allows the user of the mobile computing device to access the encrypted data file a limited number of times. | 08-28-2014 |
Patent application number | Description | Published |
20120233448 | MANAGING SOFTWARE CHANGES - The claimed subject matter provides a system or method for managing software changes. An exemplary method comprises creating a reset boot loader, a last known good (LKG) boot loader, and a current boot loader, then pointing the reset boot loader, LKG boot loader, and current boot loader to a parent virtual hard disk (VHD) containing a default master image. An operation to perform is determined, and a service partition is booted into. The LKG boot loader or current boot loader is pointed to a child VHD loaded with another desired image based on the operation selected, and the system is rebooted into the parent VHD or child VHD pointed to by the current boot loader. | 09-13-2012 |
20120254361 | RANDOM FILE REQUEST FOR SOFTWARE ATTESTATION - Technologies pertaining to attesting to computer-executable code residing on a robot are described herein. An attestation server includes a database that comprises file paths that correspond to files on the robot at a time of manufacture of the robot. The database also includes file digests that are indicative of content of the files on the robot. The attestation server randomly selects a file path and transmits the file path to the robot. The robot accesses the file at the file path and computes a file digest for that file. The robot then transmits the file digest to the attestation server, which compares the file digest from the robot with the file digest in the database. If the file digests match, then the attestation server attests to the computer-executable code on the robot. | 10-04-2012 |
20120254624 | THREE PARTY ATTESTATION OF UNTRUSTED SOFTWARE ON A ROBOT - Various technologies pertaining to three-party attestation of untrusted software on a robot are described herein. A robot includes trusted firmware, which includes read-only instructions. The robot also includes untrusted software. An attestation server is in communication with the robot by way of a network stack in the untrusted software. Messages are selectively transmitted amongst the firmware, the untrusted software, and the attestation server in connection with attesting to the untrusted software. | 10-04-2012 |