Patent application number | Description | Published |
20100107213 | Access Control State Determination Based on Security Policy and Secondary Access Control State - In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state. | 04-29-2010 |
20100211792 | COMMUNICATION CHANNEL ACCESS BASED ON CHANNEL IDENTIFIER AND USE POLICY - A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified. | 08-19-2010 |
20110019820 | COMMUNICATION CHANNEL CLAIM DEPENDENT SECURITY PRECAUTIONS - A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity. The security claims and digital signature are subsequently accessed when a computing device is to transfer data to and/or from the communication channel. The set of security claims is compared to a security policy of the computing device, and the entity that digitally signed the set of security claims is identified. One or more security precautions that the computing device is to use in transferring data to and/or from the communication channel are determined based at least in part on the comparing and the entity that has digitally signed the set of security claims. | 01-27-2011 |
20130007463 | COMMUNICATION CHANNEL ACCESS BASED ON CHANNEL IDENTIFIER AND USE POLICY - A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified. | 01-03-2013 |
20130145139 | REGULATING ACCESS USING INFORMATION REGARDING A HOST MACHINE OF A PORTABLE STORAGE DRIVE - Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine. | 06-06-2013 |
20130145440 | REGULATING ACCESS USING INFORMATION REGARDING A HOST MACHINE OF A PORTABLE STORAGE DRIVE - Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication. | 06-06-2013 |
Patent application number | Description | Published |
20110269680 | GLP-1 ANALOGS AND USES THEREOF - The present invention relates to a peptide selected from a group comprising GLP-1 analogs, its truncated forms, or pharmaceutically acceptable salts and derivatives thereof. The present invention further relates to a peptide selected from a group comprising GLP-1 analogs, its truncated forms, or pharmaceutically acceptable salts and derivatives thereof, wherein one or more aminoacids are substituted with a non-coded aminoacid. | 11-03-2011 |
20120141525 | UNIVERSAL INFLUENZA VACCINE BASED ON RECOMBINANT MODIFIED VACCINE ANKARA VIRUS (MVA) - The present invention relates to a novel influenza vaccine, a novel plasmid for preparing the same and a novel dosage form comprising the same. The present invention in particular relates to a recombinant modified vaccinia Ankara (MVA) virus comprising and capable of simultaneously expressing a cassette of at least four foreign genes from influenza virus, specifically an avian influenza virus, wherein the said genes are inserted at a non-essential site, within the MVA genome. The invention further relates to a recombinant modified vaccinia Ankara (MVA) virus comprising and capable of simultaneously expressing a cassette of not less than two foreign genes from influenza virus, wherein the said genes are inserted at a non-essential site, within the MVA genome, with the provision that at least one foreign gene is either PB2 or M2e. The invention also provides composition and methods of making the universal influenza vaccine. | 06-07-2012 |