-
公开(公告)号:US20170126655A1
公开(公告)日:2017-05-04
申请号:US15403325
申请日:2017-01-11
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Valuiddin Ali , Manuel Novoa , Matthew J. Wagner
CPC classification number: H04L63/083 , G06F17/30994 , G06F21/31 , G06F21/602 , G06F2221/2103 , G06F2221/2131 , H04L63/062 , H04L63/10
Abstract: A computer security system comprises a security module adapted to control access to a secure computer resource by a user via a client based on verification of a security credential provided by the user. The computer security system also comprises verification data disposed on the client and accessible by the security module. The security module is adapted to enable the user to recover the security credential based on a response received from the user associated with the verification data.
-
公开(公告)号:US10296471B2
公开(公告)日:2019-05-21
申请号:US15511843
申请日:2014-09-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Slava Gomzin , Manuel Novoa , Binh T Truong
IPC: G06F13/10 , H04W76/14 , G06F13/14 , G06F1/16 , H04M1/725 , G06F13/22 , G06F13/40 , G06F21/44 , G06Q20/20 , H04W12/08 , H04L29/06 , H04W84/12
Abstract: An example processor-implemented method for accessing peripheral devices with the present disclosure includes establishing connection between a portable computing device and a dock, determining a pairing status between the portable computing device and the dock, and managing access to at least one peripheral device by the portable computing device based on the pairing status. The dock is associated with the at least one peripheral device.
-
公开(公告)号:US10164969B2
公开(公告)日:2018-12-25
申请号:US15403325
申请日:2017-01-11
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Valuiddin Ali , Manuel Novoa , Matthew J. Wagner
Abstract: A computer security system comprises a security module adapted to control access to a secure computer resource by a user via a client based on verification of a security credential provided by the user. The computer security system also comprises verification data disposed on the client and accessible by the security module. The security module is adapted to enable the user to recover the security credential based on a response received from the user associated with the verification data.
-
-