Patent application number | Description | Published |
20120198058 | Computer Network Service Providing System Including Self Adjusting Volume Enforcement Functionality - A Computer Network Service Providing System including Self Adjusting Volume enforcement functionality and methods for diminishing or minimizing volume leakage. | 08-02-2012 |
20130262874 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT - Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be encrypted, then integrated with original content using a steganographic technique. The resulting aggregated content may then be made available to users. Users may then extract the encrypted supplemental content from the original content. Those users having the proper privilege level may be given a cryptographic key to allow decryption of the supplemental content. Those without the necessary privilege will not be given this decryption key, and will therefore be unable to access the supplemental content. | 10-03-2013 |
20130263234 | Cross Access Login Controller - A method of controlling access to a network, the method comprising storing in a data repository first identifying detail relating to a second type of connection and associating the details with respective base credential relating to a first type of connection, and granting a request to access to network via second type of connection, the request comprises a second identifying detail, if correlation is found between the second identifying detail and the first identifying detail. | 10-03-2013 |
20140344584 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO SUPPLEMENTAL CONTENT INTEGRATED INTO EXISTING CONTENT - Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be encrypted, then integrated with original content using a steganographic technique. The resulting aggregated content may then be made available to users. Users may then extract the encrypted supplemental content from the original content. Those users having the proper privilege level may be given a cryptographic key to allow decryption of the supplemental content. Those without the necessary privilege will not be given this decryption key, and will therefore be unable to access the supplemental content. | 11-20-2014 |
20150271182 | Cross Access Login Controller - Systems and methods here may be used for authorizing network access including using a flow controller server in communication with a first gateway associated with a first network, a second gateway associated with a second gateway, and a repository, the flow controller server configured to, receive a first client device request to access the first network via the first gateway, receive a second client device request to access the second network via the second gateways, retrieve a validation response from the repository, wherein the validation response includes correlated client device identifier with client device credentials for the first network and second network. | 09-24-2015 |
20150380971 | SYSTEMS AND METHODS FOR SMART WIRELESS CHARGING - Systems and methods for power distribution allocation are provided. A system may establish a first wireless connection between the system and a first mobile device. The system may receive a first charge request from the first mobile device comprising first mobile device information, and may identify charging system policies based at least in part on the first charge request. The system may determine a first charge program for the first mobile device based at least in part on the first charge request and the one or more charging system policies, where the first charge program comprises a power allocation of the first mobile device with respect to other mobile devices connected to the charging system. The system may wirelessly charge the first mobile device, based at least in part on the first charge program. | 12-31-2015 |
20160036826 | SECURE CONTENT PACKAGING USING MULTIPLE TRUSTED EXECUTION ENVIRONMENTS - Technologies for secure content packaging include a source computing device that transmits a secure package to a destination computing device. The destination computing device establishes a content policy trusted execution environment and a key policy trusted execution environment. The content policy trusted execution environment may be established in a secure enclave using processor support. The key policy trusted execution environment may be established using a security engine. The key policy trusted execution environment evaluates a key access policy and decrypts a content key using a master wrapping key. The content policy trusted execution environment evaluates a content access policy and decrypts the content using the decrypted content key. Similarly, the source computing device authors the secure package using a content policy trusted execution environment and a key policy trusted execution environment. The master wrapping key may be provisioned to the computing devices during manufacture. Other embodiments are described and claimed. | 02-04-2016 |
20160044001 | NETWORK-ENABLED DEVICE PROVISIONING - Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed. | 02-11-2016 |