Movatterモバイル変換


[0]ホーム

URL:


US20140282992A1 - Systems and methods for securing the boot process of a device using credentials stored on an authentication token - Google Patents

Systems and methods for securing the boot process of a device using credentials stored on an authentication token
Download PDF

Info

Publication number
US20140282992A1
US20140282992A1US14/209,950US201414209950AUS2014282992A1US 20140282992 A1US20140282992 A1US 20140282992A1US 201414209950 AUS201414209950 AUS 201414209950AUS 2014282992 A1US2014282992 A1US 2014282992A1
Authority
US
United States
Prior art keywords
authentication
user
data
token
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/209,950
Inventor
Thomas Charles Clancy, III
Brian Dougherty
David Alexander Hamrick
Grayson Gates Sharpe
Robert Austin Hanlin
Krzysztof Kamil Zienkiewicz
Christopher Michael Thompson
Christopher Jules White
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Optio Labs Inc
Original Assignee
Optio Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Optio Labs IncfiledCriticalOptio Labs Inc
Priority to US14/209,950priorityCriticalpatent/US20140282992A1/en
Assigned to Optio Labs, Inc.reassignmentOptio Labs, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WHITE, CHRISTOPHER JULES, HAMRICK, DAVID ALEXANDER, THOMPSON, CHRISTOPHER MICHAEL, ZIENKIEWICZ, KRZYSZTOF KAMIL, CLANCY, THOMAS CHARLES, III, DOUGHERTY, BRIAN, HANLIN, ROBERT AUSTIN, SHARPE, GRAYSON GATES
Publication of US20140282992A1publicationCriticalpatent/US20140282992A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and systems are provided for securing devices in which a secure external authentication token is used to verify user credentials prior to enabling the operating system of the device by loading or decrypting the operating system. Suitable external authentication tokens can include smartcards such as a common access card and may be verified by cryptographic processes either at a local server or via a remote credentials processor.

Description

Claims (20)

US14/209,9502013-03-132014-03-13Systems and methods for securing the boot process of a device using credentials stored on an authentication tokenAbandonedUS20140282992A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/209,950US20140282992A1 (en)2013-03-132014-03-13Systems and methods for securing the boot process of a device using credentials stored on an authentication token

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US201361780408P2013-03-132013-03-13
US201361779931P2013-03-132013-03-13
US201361781252P2013-03-142013-03-14
US201361785109P2013-03-142013-03-14
US201361790728P2013-03-152013-03-15
US14/209,950US20140282992A1 (en)2013-03-132014-03-13Systems and methods for securing the boot process of a device using credentials stored on an authentication token

Publications (1)

Publication NumberPublication Date
US20140282992A1true US20140282992A1 (en)2014-09-18

Family

ID=51529248

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US14/210,376Expired - Fee RelatedUS9578445B2 (en)2013-03-132014-03-13Systems and methods to synchronize data to a mobile device based on a device usage context
US14/209,950AbandonedUS20140282992A1 (en)2013-03-132014-03-13Systems and methods for securing the boot process of a device using credentials stored on an authentication token
US14/210,240AbandonedUS20140273857A1 (en)2013-03-132014-03-13Systems and methods to secure short-range proximity signals
US14/210,397AbandonedUS20140283136A1 (en)2013-03-132014-03-13Systems and methods for securing and locating computing devices

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/210,376Expired - Fee RelatedUS9578445B2 (en)2013-03-132014-03-13Systems and methods to synchronize data to a mobile device based on a device usage context

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/210,240AbandonedUS20140273857A1 (en)2013-03-132014-03-13Systems and methods to secure short-range proximity signals
US14/210,397AbandonedUS20140283136A1 (en)2013-03-132014-03-13Systems and methods for securing and locating computing devices

Country Status (1)

CountryLink
US (4)US9578445B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104320265A (en)*2014-11-212015-01-28北京奇虎科技有限公司Authentication method and device for software platform
US9363670B2 (en)2012-08-272016-06-07Optio Labs, Inc.Systems and methods for restricting access to network resources via in-location access point protocol
US9578445B2 (en)2013-03-132017-02-21Optio Labs, Inc.Systems and methods to synchronize data to a mobile device based on a device usage context
US9609020B2 (en)2012-01-062017-03-28Optio Labs, Inc.Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
US9712530B2 (en)2012-01-062017-07-18Optio Labs, Inc.Systems and methods for enforcing security in mobile computing
US9773107B2 (en)2013-01-072017-09-26Optio Labs, Inc.Systems and methods for enforcing security in mobile computing
US9787681B2 (en)2012-01-062017-10-10Optio Labs, Inc.Systems and methods for enforcing access control policies on privileged accesses for mobile devices
US11546443B2 (en)*2020-09-112023-01-03Microsoft Technology Licensing, LlcConnected focus time experience that spans multiple devices

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9853864B2 (en)*2010-09-172017-12-26Printeron Inc.System and method for updating printer location information field
US8837728B2 (en)*2012-10-162014-09-16The Boeing CompanyServer algorithms to improve space based authentication
JP5974907B2 (en)*2013-01-172016-08-23株式会社デンソー Vehicle equipment
US9491033B1 (en)*2013-04-222016-11-08Amazon Technologies, Inc.Automatic content transfer
JP6459491B2 (en)*2014-03-202019-01-30カシオ計算機株式会社 Display device, display system, and program
JP6314595B2 (en)*2014-03-282018-04-25日本電気株式会社 POSITIONING DEVICE, POSITIONING SYSTEM, POSITIONING METHOD, AND POSITIONING PROGRAM
US10430779B2 (en)*2014-04-082019-10-01Capital One Services LlcSystems and methods for transacting at an ATM using a mobile device
US20150326617A1 (en)*2014-05-062015-11-12DoNotGeoTrack, Inc.Privacy Control Processes for Mobile Devices, Wearable Devices, other Networked Devices, and the Internet of Things
US9246913B2 (en)*2014-06-192016-01-26Verizon Patent And Licensing Inc.Sharing content using a dongle device
US10009745B2 (en)2014-08-252018-06-26Accenture Global Services LimitedValidation in secure short-distance-based communication and enforcement system according to visual objects
US9633493B2 (en)2014-08-252017-04-25Accenture Global Services LimitedSecure short-distance-based communication and validation system for zone-based validation
US9589402B2 (en)2014-08-252017-03-07Accenture Global Services LimitedRestricted area access control system
US9922294B2 (en)2014-08-252018-03-20Accenture Global Services LimitedSecure short-distance-based communication and enforcement system
US9514589B2 (en)2014-08-252016-12-06Accenture Global Services LimitedSecure short-distance-based communication and access control system
US10198586B1 (en)*2014-09-172019-02-05Securus Technologies, Inc.Provisioning of digital media files to resident media devices in controlled-environment facilities
US20170012964A1 (en)*2014-09-292017-01-12Identity Over IpProviding authentication of control instructions from a control device to a remotely-controllable physical interaction device using a remote control authentication token
KR101539292B1 (en)*2014-10-282015-07-27주식회사 퍼플즈Method of transmitting and receiving data in a wireless communication system using bluetooth low energy beacon and apparatus thereof
US9608999B2 (en)*2014-12-022017-03-28Accenture Global Services LimitedSmart beacon data security
US10325294B2 (en)*2014-12-102019-06-18Meijer, Inc.System and method for notifying customers of checkout queue activity
US10114351B2 (en)2015-03-052018-10-30Google LlcSmart-home automation system that suggests or autmatically implements selected household policies based on sensed observations
US20160337353A1 (en)*2015-05-112016-11-17Interactive Intelligence Group, Inc.System and method for multi-factor authentication
US11209972B2 (en)2015-09-022021-12-28D&M Holdings, Inc.Combined tablet screen drag-and-drop interface
US11113022B2 (en)2015-05-122021-09-07D&M Holdings, Inc.Method, system and interface for controlling a subwoofer in a networked audio system
EP3295577A4 (en)2015-05-122018-10-10D&M Holdings, Inc.System and method for negotiating group membership for audio controllers
US9743252B2 (en)*2015-06-112017-08-22Honeywell International Inc.System and method for locating devices in predetermined premises
KR102300583B1 (en)2015-06-262021-09-09삼성전자주식회사A service providing method using a beacon and electronic apparatus thereof
US11354683B1 (en)2015-12-302022-06-07Videomining CorporationMethod and system for creating anonymous shopper panel using multi-modal sensor fusion
US10262331B1 (en)2016-01-292019-04-16Videomining CorporationCross-channel in-store shopper behavior analysis
US10963893B1 (en)2016-02-232021-03-30Videomining CorporationPersonalized decision tree based on in-store behavior analysis
US10074225B2 (en)2016-04-182018-09-11Accenture Global Solutions LimitedValidation in secure short-distance-based communication and enforcement system according to visual object flow
US10387896B1 (en)2016-04-272019-08-20Videomining CorporationAt-shelf brand strength tracking and decision analytics
US10354262B1 (en)2016-06-022019-07-16Videomining CorporationBrand-switching analysis using longitudinal tracking of at-shelf shopper behavior
US11206223B2 (en)2016-06-302021-12-21Microsoft Technology Licensing, LlcSignal upload optimization
US10713355B2 (en)*2016-10-212020-07-14Qatar UniversityMethod and system for adaptive security in cloud-based services
GB201619580D0 (en)*2016-11-182017-01-04Blancco Tech Group Ip OySystem and method for repurposing or disposing of an it asset
KR101763904B1 (en)*2016-12-302017-08-14(주)엠더블유스토리System and method for synchronizing and centralizing of the file
US11284256B2 (en)*2019-03-252022-03-22Nanning Fugui Precision Industrial Co., Ltd.Method and system for automatic access to WI-FI network
US11283781B2 (en)*2019-04-092022-03-22Visa International Service AssociationProximity interaction system including secure encryption scheme
US11509642B2 (en)*2019-08-212022-11-22Truist BankLocation-based mobile device authentication
WO2021060894A1 (en)*2019-09-242021-04-01Samsung Electronics Co., Ltd.Method for generating diagrammatic representation of area and electronic device thereof
CN110853657B (en)*2019-11-182022-05-13北京小米智能科技有限公司Space division method, device and storage medium
US11343292B2 (en)*2019-11-292022-05-24Ricoh Company, Ltd.Information processing apparatus, information processing system, and remote sharing method
US11080733B2 (en)*2019-12-182021-08-03Visa International Service AssociationMethods and systems for harnessing location based data for making market recommendations
US12170659B1 (en)*2020-04-282024-12-17United Services Automobile Association (Usaa)Multi-factor authentication
US12210608B2 (en)*2020-12-032025-01-28Lenovo (Singapore) Pte. Ltd.Vehicle device authorization via secondary device
US11470162B2 (en)*2021-01-302022-10-11Zoom Video Communications, Inc.Intelligent configuration of personal endpoint devices
US12238091B1 (en)*2021-03-292025-02-25Oura Health OyMethods and apparatus for facilitating distribution of authenticated data with reduced hardware requirements
US12200134B2 (en)*2021-05-032025-01-14Brex Inc.Multifactor authentication through cryptography-enabled smart cards
US20230096370A1 (en)*2021-09-242023-03-30Apple Inc.Cross platform credential sharing
US12149555B2 (en)2021-12-282024-11-19SecureX.AI, Inc.Systems and methods for vulnerability assessment for cloud assets using imaging methods
US12299133B2 (en)2021-12-282025-05-13SecureX.AI, Inc.Systems and methods for prioritizing security findings using machine learning models
US12166785B2 (en)*2021-12-282024-12-10SecureX.AI, Inc.Systems and methods for predictive analysis of potential attack patterns based on contextual security information

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030194094A1 (en)*1998-10-262003-10-16Lampson Butler W.System and method for secure storage data using a key
US20040255145A1 (en)*2003-05-062004-12-16Jerry ChowMemory protection systems and methods for writable memory
US20060020821A1 (en)*2004-07-242006-01-26International Business Machines Corp.System and method for data processing system planar authentication
US20080025503A1 (en)*2006-07-272008-01-31Samsung Electronics Co., Ltd.Security method using self-generated encryption key, and security apparatus using the same
US20100153697A1 (en)*2008-12-172010-06-17Jeremy FordMethods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node
US20110258426A1 (en)*2010-04-192011-10-20Apple Inc.Booting and configuring a subsystem securely from non-local storage
US20120254602A1 (en)*2011-03-012012-10-04Softex IncorporatedMethods, Systems, and Apparatuses for Managing a Hard Drive Security System
US20130124840A1 (en)*2011-11-112013-05-16International Business Machines CorporationSecure boot up of a computer based on a hardware based root of trust
US8874891B2 (en)*2010-05-202014-10-28Hewlett-Packard Development Company, L.P.Systems and methods for activation of applications using client-specific data
US8898481B1 (en)*2012-07-182014-11-25Dj Inventions, LlcAuditable cryptographic protected cloud computing communications system
US9191382B1 (en)*2012-06-142015-11-17Google Inc.User authentication using swappable user authentication services

Family Cites Families (95)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6317868B1 (en)1997-10-242001-11-13University Of WashingtonProcess for transparently enforcing protection domains and access control as well as auditing operations in software components
US20080278408A1 (en)*1999-05-042008-11-13Intellimat, Inc.Floor display systems and additional display systems, and methods and computer program products for using floor display systems and additional display system
US6467086B1 (en)1999-07-202002-10-15Xerox CorporationAspect-oriented programming
US6901429B2 (en)2000-10-272005-05-31Eric Morgan DowlingNegotiated wireless peripheral security systems
US7461144B1 (en)2001-02-162008-12-02Swsoft Holdings, Ltd.Virtual private server with enhanced security
US7207041B2 (en)2001-06-282007-04-17Tranzeo Wireless Technologies, Inc.Open platform architecture for shared resource access management
US8726294B2 (en)2010-10-012014-05-13Z124Cross-environment communication using application space API
GB0123403D0 (en)2001-09-282001-11-21Tamesis LtdPublish subscribe system
US20030140088A1 (en)*2002-01-242003-07-24Robinson Scott H.Context-based information processing
US20050060365A1 (en)*2002-01-242005-03-17Robinson Scott L.Context-based information processing
US20030149874A1 (en)2002-02-062003-08-07Xerox CorporationSystems and methods for authenticating communications in a network medium
US8136155B2 (en)2003-04-012012-03-13Check Point Software Technologies, Inc.Security system with methodology for interprocess communication control
US7135635B2 (en)2003-05-282006-11-14Accentus, LlcSystem and method for musical sonification of data parameters in a data stream
US7751829B2 (en)*2003-09-222010-07-06Fujitsu LimitedMethod and apparatus for location determination using mini-beacons
US8880893B2 (en)2003-09-262014-11-04Ibm International Group B.V.Enterprise information asset protection through insider attack specification, monitoring and mitigation
US20050138416A1 (en)2003-12-192005-06-23Microsoft CorporationObject model for managing firewall services
US20050246453A1 (en)2004-04-302005-11-03Microsoft CorporationProviding direct access to hardware from a virtual environment
US7574709B2 (en)2004-04-302009-08-11Microsoft CorporationVEX-virtual extension framework
US7530093B2 (en)2004-04-302009-05-05Microsoft CorporationSecuring applications and operating systems
US7584502B2 (en)2004-05-032009-09-01Microsoft CorporationPolicy engine and methods and systems for protecting data
US20060048226A1 (en)2004-08-312006-03-02Rits Maarten EDynamic security policy enforcement
US7768420B2 (en)*2004-10-292010-08-03Intel CorporationOperation and control of wireless appliance networks
US7681226B2 (en)2005-01-282010-03-16Cisco Technology, Inc.Methods and apparatus providing security for multiple operational states of a computerized device
WO2006093917A2 (en)*2005-02-282006-09-08Trust DigitalMobile data security system and methods
US8836580B2 (en)*2005-05-092014-09-16Ehud MendelsonRF proximity tags providing indoor and outdoor navigation and method of use
US8266232B2 (en)2005-10-152012-09-11International Business Machines CorporationHardware processing of commands within virtual client computing environment
US8150816B2 (en)2005-12-292012-04-03Nextlabs, Inc.Techniques of optimizing policies in an information management system
US20070186274A1 (en)2006-02-072007-08-09Matsushita Electric Industrial Co., Ltd.Zone based security model
US8151323B2 (en)2006-04-122012-04-03Citrix Systems, Inc.Systems and methods for providing levels of access and action control via an SSL VPN appliance
US8387048B1 (en)2006-04-252013-02-26Parallels IP Holdings GmbHSeamless integration, migration and installation of non-native application into native operating system
US7865934B2 (en)2006-05-182011-01-04Microsoft CorporationAccess-control permissions with inter-process message-based communications
US8490191B2 (en)2006-06-212013-07-16Wibu-Systems AgMethod and system for intrusion detection
US7917963B2 (en)2006-08-092011-03-29Antenna Vaultus, Inc.System for providing mobile data security
US7966599B1 (en)2006-08-292011-06-21Adobe Systems IncorporatedRuntime library including a virtual file system
US7774599B2 (en)2006-09-152010-08-10Panasonic CorporationMethodologies to secure inter-process communication based on trust
US8533530B2 (en)2006-11-152013-09-10Qualcomm IncorporatedMethod and system for trusted/untrusted digital signal processor debugging operations
GB0623101D0 (en)*2006-11-202006-12-27British TelecommSecure network architecture
EP2126694A2 (en)2006-12-222009-12-02VirtualLogix SASystem for enabling multiple execution environments to share a device
US9185123B2 (en)2008-02-122015-11-10Finsphere CorporationSystem and method for mobile identity protection for online user authentication
US20080235587A1 (en)*2007-03-232008-09-25Nextwave Broadband Inc.System and method for content distribution
DE102007018096A1 (en)2007-04-172008-10-23Rohde & Schwarz Gmbh & Co. Kg Method for determining time differences between signals measured by at least two coupled measuring devices and measuring system and corresponding switching device
US20090025011A1 (en)2007-07-172009-01-22Tim NeilInter-process communication at a mobile device
US8626867B2 (en)*2007-07-272014-01-07Blackberry LimitedApparatus and methods for operation of a wireless server
ATE495622T1 (en)*2007-07-272011-01-15Research In Motion Ltd DEVICE AND METHOD FOR COORDINATION OF WIRELESS SYSTEMS
US8225329B1 (en)2007-09-132012-07-17Juniper Networks, Inc.Tail synchronized FIFO for fast user space packet access
US8505029B1 (en)2007-11-262013-08-06Adobe Systems IncorporatedVirtual machine communication
US8584229B2 (en)2007-12-212013-11-12Intel CorporationMethods and apparatus supporting access to physical and virtual trusted platform modules
US9058483B2 (en)2008-05-082015-06-16Google Inc.Method for validating an untrusted native code module
US8516095B2 (en)*2008-05-232013-08-20Research In Motion LimitedRemote administration of mobile wireless devices
US8335931B2 (en)2008-06-202012-12-18Imation Corp.Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
US8151349B1 (en)2008-07-212012-04-03Google Inc.Masking mechanism that facilitates safely executing untrusted native code
US20100031252A1 (en)2008-07-292010-02-04Compuware CorporationMethod And System For Monitoring The Performance Of An Application And At Least One Storage Device For Storing Code Which Performs The Method
US8607224B2 (en)2009-05-282013-12-10Yahoo! Inc.System for packaging native program extensions together with virtual machine applications
US20110055890A1 (en)2009-08-252011-03-03Gaulin PascalMethod and system to configure security rights based on contextual information
US8413241B2 (en)2009-09-172013-04-02Oracle America, Inc.Integrated intrusion deflection, detection and introspection
US20110151955A1 (en)2009-12-232011-06-23Exent Technologies, Ltd.Multi-player augmented reality combat
KR101640767B1 (en)2010-02-092016-07-29삼성전자주식회사Real-time virtual reality input/output system and method based on network for heterogeneous environment
US8938782B2 (en)2010-03-152015-01-20Symantec CorporationSystems and methods for providing network access control in virtual environments
US8533860B1 (en)2010-03-212013-09-10William GreciaPersonalized digital media access system—PDMAS part II
US8887308B2 (en)2010-03-212014-11-11William GreciaDigital cloud access (PDMAS part III)
US20130067488A1 (en)2010-05-192013-03-14Hughes Systique India Private LimitedMethod and system for efficient inter- process communication in a high availability system
KR101618417B1 (en)2010-06-042016-05-04보오드 오브 리젠츠, 더 유니버시티 오브 텍사스 시스템Methods and apparatuses for relaying data in a wireless communications system
US8582423B2 (en)2010-08-042013-11-12Alcatel LucentMulti-chassis inter-process communication
US20120215637A1 (en)*2010-09-132012-08-23Hermann Mark ESystem and method for performing social networking and loyalty program functions at a venue
US8613052B2 (en)2010-09-172013-12-17Universal Secure Registry, LlcApparatus, system and method employing a wireless user-device
US8849941B2 (en)2010-09-302014-09-30Microsoft CorporationVirtual desktop configuration and operation techniques
US9961550B2 (en)2010-11-042018-05-01Itron Networked Solutions, Inc.Physically secured authorization for utility applications
US8359016B2 (en)2010-11-192013-01-22Mobile Iron, Inc.Management of mobile applications
US20120258730A1 (en)*2010-11-292012-10-11Qualcomm IncorporatedEstimating access terminal location based on beacon signals from femto cells
US9350809B2 (en)*2011-01-312016-05-24Nokia Technologies OyMethod and apparatus for automatically determining communities of interest, for use over an ad-hoc mesh network, based on context information
US8612744B2 (en)2011-02-102013-12-17Varmour Networks, Inc.Distributed firewall architecture using virtual machines
US8769305B2 (en)2011-03-212014-07-01Moncana CorporationSecure execution of unsecured apps on a device
US20120255014A1 (en)2011-03-292012-10-04Mcafee, Inc.System and method for below-operating system repair of related malware-infected threads and resources
US8099596B1 (en)2011-06-302012-01-17Kaspersky Lab ZaoSystem and method for malware protection using virtualization
US8763112B2 (en)2011-07-022014-06-24Intel CorporationSystems and methods for power-on user authentication
US20130054812A1 (en)2011-08-222013-02-28Don DeCoteauSystem and method for dynamically assembling an application on a client device
US8521181B2 (en)*2011-09-192013-08-27Qualcomm IncorporatedTime of arrival based positioning system
US8966004B2 (en)2011-09-292015-02-24Comcast Cable Communications, LLC.Multiple virtual machines in a mobile virtualization platform
US8695060B2 (en)2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US9936351B2 (en)2011-10-262018-04-03Sling Media Pvt LtdApparatus systems and methods for proximity-based service discovery and session sharing
WO2013080096A1 (en)2011-11-292013-06-06Sony Mobile Communications AbSystem and method for providing secure inter-process communications
US8863129B2 (en)2011-12-062014-10-14International Business Machines CorporationAutomated caching and mirroring of immutable data in distributed virtual machines via native interface components
US20130312058A1 (en)2012-01-062013-11-21Optio Labs, Inc.Systems and methods for enhancing mobile security via aspect oriented programming
US9787681B2 (en)2012-01-062017-10-10Optio Labs, Inc.Systems and methods for enforcing access control policies on privileged accesses for mobile devices
JP2015508540A (en)2012-01-062015-03-19オプティオ ラブス リミテッド ライアビリティ カンパニー System and method for enhancing security in mobile computing
US9609020B2 (en)2012-01-062017-03-28Optio Labs, Inc.Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
US8844032B2 (en)2012-03-022014-09-23Sri InternationalMethod and system for application-based policy monitoring and enforcement on a mobile device
US9572029B2 (en)*2012-04-102017-02-14Imprivata, Inc.Quorum-based secure authentication
US9398519B2 (en)*2012-06-222016-07-19Apple Inc.Beacon frame monitoring
US9584528B2 (en)*2012-09-062017-02-28Qualcomm IncorporatedSecuring databases against piracy attacks
US9507653B2 (en)2012-09-122016-11-29Microsoft Technology Licensing, LlcInter-process communication channel
US8655307B1 (en)*2012-10-262014-02-18Lookout, Inc.System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US9773107B2 (en)2013-01-072017-09-26Optio Labs, Inc.Systems and methods for enforcing security in mobile computing
US10152706B2 (en)*2013-03-112018-12-11Cellco PartnershipSecure NFC data authentication
US9578445B2 (en)2013-03-132017-02-21Optio Labs, Inc.Systems and methods to synchronize data to a mobile device based on a device usage context

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030194094A1 (en)*1998-10-262003-10-16Lampson Butler W.System and method for secure storage data using a key
US20040255145A1 (en)*2003-05-062004-12-16Jerry ChowMemory protection systems and methods for writable memory
US20060020821A1 (en)*2004-07-242006-01-26International Business Machines Corp.System and method for data processing system planar authentication
US20080025503A1 (en)*2006-07-272008-01-31Samsung Electronics Co., Ltd.Security method using self-generated encryption key, and security apparatus using the same
US20100153697A1 (en)*2008-12-172010-06-17Jeremy FordMethods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node
US20110258426A1 (en)*2010-04-192011-10-20Apple Inc.Booting and configuring a subsystem securely from non-local storage
US8874891B2 (en)*2010-05-202014-10-28Hewlett-Packard Development Company, L.P.Systems and methods for activation of applications using client-specific data
US20120254602A1 (en)*2011-03-012012-10-04Softex IncorporatedMethods, Systems, and Apparatuses for Managing a Hard Drive Security System
US20130124840A1 (en)*2011-11-112013-05-16International Business Machines CorporationSecure boot up of a computer based on a hardware based root of trust
US9191382B1 (en)*2012-06-142015-11-17Google Inc.User authentication using swappable user authentication services
US8898481B1 (en)*2012-07-182014-11-25Dj Inventions, LlcAuditable cryptographic protected cloud computing communications system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9609020B2 (en)2012-01-062017-03-28Optio Labs, Inc.Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
US9712530B2 (en)2012-01-062017-07-18Optio Labs, Inc.Systems and methods for enforcing security in mobile computing
US9787681B2 (en)2012-01-062017-10-10Optio Labs, Inc.Systems and methods for enforcing access control policies on privileged accesses for mobile devices
US9363670B2 (en)2012-08-272016-06-07Optio Labs, Inc.Systems and methods for restricting access to network resources via in-location access point protocol
US9773107B2 (en)2013-01-072017-09-26Optio Labs, Inc.Systems and methods for enforcing security in mobile computing
US9578445B2 (en)2013-03-132017-02-21Optio Labs, Inc.Systems and methods to synchronize data to a mobile device based on a device usage context
CN104320265A (en)*2014-11-212015-01-28北京奇虎科技有限公司Authentication method and device for software platform
CN104320265B (en)*2014-11-212017-10-24北京奇虎科技有限公司Authentication method and authentication device for software platform
US11546443B2 (en)*2020-09-112023-01-03Microsoft Technology Licensing, LlcConnected focus time experience that spans multiple devices

Also Published As

Publication numberPublication date
US20140282857A1 (en)2014-09-18
US9578445B2 (en)2017-02-21
US20140283136A1 (en)2014-09-18
US20140273857A1 (en)2014-09-18

Similar Documents

PublicationPublication DateTitle
US20140282992A1 (en)Systems and methods for securing the boot process of a device using credentials stored on an authentication token
US11233630B2 (en)Module with embedded wireless user authentication
US10783232B2 (en)Management system for self-encrypting managed devices with embedded wireless user authentication
US11212283B2 (en)Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
AU2014235174B2 (en)Controlling physical access to secure areas via client devices in a networked environment
KR101699733B1 (en)Barcode authentication for resource requests
US10445487B2 (en)Methods and apparatus for authentication of joint account login
US9613205B2 (en)Alternate authentication
US9401915B2 (en)Secondary device as key for authorizing access to resources
US9723003B1 (en)Network beacon based credential store
EP2973188B1 (en)Secondary device as key for authorizing access to resources
CN104584023B (en) Method and apparatus for hardware-enforced access protection
WO2017197974A1 (en)Biometric characteristic-based security authentication method, device and electronic equipment
US10129299B1 (en)Network beacon management of security policies
KR20160097323A (en)Near field communication authentication mechanism
TW201737151A (en)Data security system with encryption
EP3788538B1 (en)Self-encrypting module with embedded wireless user authentication
US10063592B1 (en)Network authentication beacon

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:OPTIO LABS, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CLANCY, THOMAS CHARLES, III;DOUGHERTY, BRIAN;HAMRICK, DAVID ALEXANDER;AND OTHERS;SIGNING DATES FROM 20140530 TO 20140703;REEL/FRAME:033271/0068

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp