Method, apparatus, and system for biometric authentication of user identity
    1.
    发明申请
    Method, apparatus, and system for biometric authentication of user identity 审中-公开
    用户身份验证的方法,设备和系统

    公开(公告)号:US20070155366A1

    公开(公告)日:2007-07-05

    申请号:US11322585

    申请日:2005-12-30

    IPC分类号: H04M1/66

    摘要: Various methods and apparatuses are described for a portable computing device cooperating with a wireless phone handset. The portable computing device has a first wireless communication module that causes the portable computing device to act as a wireless base station. The portable computing device also has a biometric authentication module to authenticate access rights to applications and data files on the portable computing device based on one or more biometric features of the user of a wireless phone. The wireless phone may be a handset separate from the portable computing device. The wireless phone has a second wireless communication module configured to act as a wireless access device. The wireless phone also has a biometric sensor to convey the biometric features of the user of the wireless phone to the portable computing device.

    摘要翻译: 描述了与无线电话手机协作的便携式计算设备的各种方法和装置。 便携式计算设备具有使便携式计算设备充当无线基站的第一无线通信模块。 便携式计算设备还具有生物特征认证模块,用于基于无线电话的用户的一个或多个生物测定特征来认证对便携式计算设备上的应用和数据文件的访问权限。 无线电话可以是与便携式计算设备分离的手机。 无线电话具有被配置为用作无线接入设备的第二无线通信模块。 无线电话还具有生物特征传感器,以将无线电话用户的生物特征传送到便携式计算设备。

    Reliable reporting of location data
    3.
    发明授权
    Reliable reporting of location data 有权
    可靠的位置数据报告

    公开(公告)号:US07965702B2

    公开(公告)日:2011-06-21

    申请号:US11368374

    申请日:2006-03-03

    IPC分类号: H04L12/66 G06F7/04 G06F9/455

    摘要: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.

    摘要翻译: 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。

    Reliable reporting of location data
    4.
    发明申请
    Reliable reporting of location data 有权
    可靠的位置数据报告

    公开(公告)号:US20070153715A1

    公开(公告)日:2007-07-05

    申请号:US11368374

    申请日:2006-03-03

    IPC分类号: H04L12/56 H04J3/08

    摘要: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.

    摘要翻译: 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 安全环境可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool技术(VT)或可信平台模块(TPM)来创建。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。

    Reliable reporting of location data
    5.
    发明授权
    Reliable reporting of location data 有权
    可靠的位置数据报告

    公开(公告)号:US08804701B2

    公开(公告)日:2014-08-12

    申请号:US13113888

    申请日:2011-05-23

    IPC分类号: G06F21/00 H04L9/00 G06F9/455

    摘要: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.

    摘要翻译: 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。

    Reliable Reporting Of Location Data
    6.
    发明申请
    Reliable Reporting Of Location Data 有权
    位置数据的可靠报告

    公开(公告)号:US20110225626A1

    公开(公告)日:2011-09-15

    申请号:US13113888

    申请日:2011-05-23

    IPC分类号: G06F21/00

    摘要: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.

    摘要翻译: 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。

    File encryption, decryption and accessvia near field communication

    公开(公告)号:US09699657B2

    公开(公告)日:2017-07-04

    申请号:US13976097

    申请日:2011-12-20

    摘要: Methods and devices for NFC-tap file encryption, decryption and access via Near Field Communication (NFC) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an NFC-enabled wireless device for storage. The user can select an encrypted file stored in the computing device for access. As the user taps the computing device with the wireless device, the file name of the selected file is transmitted to the wireless device, which in turn transmits a decryption key for decrypting the selected file to the computing device. The computing device decrypts the selected file with the decryption key. The user can now access the decrypted file.

    Login via near field communication with automatically generated login information
    8.
    发明授权
    Login via near field communication with automatically generated login information 有权
    通过近场通信登录,自动生成登录信息

    公开(公告)号:US09520918B2

    公开(公告)日:2016-12-13

    申请号:US13976092

    申请日:2011-12-16

    摘要: Methods and devices for NFC tap login with automatically-generated login information are disclosed. A user can launch a browser application and log in a desired website without having to enter the user's username and password. The user can achieve this by tapping a Near Field Communication-enabled computing device with an NFC-enabled wireless device. The wireless device generates and stores the user's usernames and passwords corresponding to a number of websites, and provides the username and password for the desired website to the computing device via an NFC-based communication link. Through a browser application running on the computing device, the user can sign up an account at and log in the desired website.

    摘要翻译: 公开了具有自动生成的登录信息的NFC点击登录的方法和设备。 用户可以启动浏览器应用程序并登录所需的网站,而无需输入用户的用户名和密码。 用户可以通过利用具有NFC功能的无线设备敲击具有近场通信功能的计算设备来实现此目的。 无线设备生成并存储与多个网站相对应的用户的用户名和密码,并通过基于NFC的通信链路向所述计算设备提供所需网站的用户名和密码。 通过在计算设备上运行的浏览器应用程序,用户可以注册一个帐户并登录到所需的网站。

    FILE ENCRYPTION, DECRYPTION AND ACCESSVIA NEAR FIELD COMMUNICATION
    9.
    发明申请
    FILE ENCRYPTION, DECRYPTION AND ACCESSVIA NEAR FIELD COMMUNICATION 有权
    文件加密,分解和访问近场通信

    公开(公告)号:US20140208103A1

    公开(公告)日:2014-07-24

    申请号:US13976097

    申请日:2011-12-20

    IPC分类号: H04W12/08 G06F21/62

    摘要: Methods and devices for NFC-tap file encryption, decryption and access via Near Field Communication (NFC) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an NFC-enabled wireless device for storage. The user can select an encrypted file stored in the computing device for access. As the user taps the computing device with the wireless device, the file name of the selected file is transmitted to the wireless device, which in turn transmits a decryption key for decrypting the selected file to the computing device. The computing device decrypts the selected file with the decryption key. The user can now access the decrypted file.

    摘要翻译: 公开了通过近场通信(NFC)进行NFC-抽头文件加密,解密和访问的方法和装置。 用户可以选择存储在计算设备中的未加密文件进行加密。 加密后,将所选文件的文件名和用于加密所选文件的加密密钥发送到支持NFC的无线设备进行存储。 用户可以选择存储在计算设备中的加密文件进行访问。 当用户使用无线设备点击计算设备时,所选择的文件的文件名被发送到无线设备,无线设备又将用于解密所选择的文件的解密密钥发送到计算设备。 计算设备用解密密钥解密所选择的文件。 用户现在可以访问解密的文件。

    Secure credential management
    10.
    发明授权

    公开(公告)号:US08510553B2

    公开(公告)日:2013-08-13

    申请号:US11823985

    申请日:2007-06-29

    IPC分类号: H04L29/06

    摘要: Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store authentication data and an authentication supplicant (AS) logic to provide a response to an authentication communication (ACM) received from an authentication process. An authentication management (AM) logic may receive the ACM from a connection management (CM) logic associated with a host operating system (HOS), provide the ACM to the AS logic, and provide the response back to the CM logic. The apparatus may include a device management (DM) client logic to provide a secure connection to an operator DM server associated with the authentication process and to store authentication data provided by the operator DM server in the data store. The AS logic, AM logic, and DM logic may reside in firmware that is not accessible to the HOS.